Also known as: LockBit 2.0, LockBit 3.0, LockBit Black, LockBit Green, ABCD Ransomware, Water Selkie, LockBit 4.0, LockBit Neo, LockBit 5.0, ChuongDong, LockBit-NG-Dev, SuperBlack
Core RaaS ransomware supporting Windows, Linux, and VMware ESXi. Known for fast encryption using AES-256 + RSA-2048 and automatic propagation via SMB and Group Policy.
Custom data exfiltration tool developed by LockBit operators. Rapidly extracts files to attacker infrastructure before encryption for double-extortion leverage.
Most commonly used post-exploitation framework by LockBit affiliates. Deployed via initial access vectors for reconnaissance, lateral movement, and pre-encryption staging.
Alternative C2 framework used by some LockBit affiliates to evade EDR detections that commonly flag Cobalt Strike. Supports syscall-level evasion.
Standard credential harvesting tool for extracting passwords, NTLM hashes, and Kerberos tickets to gain domain admin access before deploying ransomware.
Deployed widely by affiliates for persistent remote access. Installed on multiple endpoints to maintain access even if C2 beacons are detected and killed.
Alternative remote desktop tool used alongside AnyDesk for redundant persistent access to compromised networks.
Remote access tool deployed by some LockBit affiliates as additional persistent access mechanism, especially in managed service provider environments.
Network scanning tool used to map internal networks, identify domain controllers, backup servers, and high-value targets before ransomware deployment.
Network discovery tool used by affiliates to enumerate network shares, identify live hosts, and map infrastructure for maximum encryption coverage.
Active Directory reconnaissance tool that maps attack paths to domain admin. Affiliates use it to identify the shortest path from initial access to domain compromise.
AD query tool used for enumerating domain structure, group memberships, trust relationships, and identifying high-privilege accounts.
Sysinternals remote execution tool used for mass deployment of ransomware across domain-joined systems using compromised admin credentials.
Open-source credential recovery tool that extracts passwords from browsers, email clients, WiFi configurations, and other local credential stores.
Cloud storage syncing tool abused for large-scale data exfiltration to attacker-controlled Mega.nz, Backblaze, or other cloud storage accounts.
Used for disabling Windows Defender, deleting shadow copies, modifying Group Policy for ransomware deployment, and executing encoded payloads.
Microsoft Exchange vulnerabilities (CVE-2021-34473, CVE-2021-26855) exploited by affiliates for initial access to enterprise networks.
Post-exploitation framework used for maintaining access and lateral movement
| Type | Value |
|---|---|
| domain | lockbitapt[.]uz |
| ip | 185[.]215[.]113[.]39 |
| ip | 193[.]162[.]143[.]218 |
| hash | 80e8defa5377018b093b5b90de0f2957 |
| hash | e3f236e4aeb73f8f8f0b8e0e3f1d5c73 |
| ip | 166[.]62[.]100[.]62 |
| hash | Randomized 16-character file extensions |
| Domain / Host | Status |
|---|---|
lockbitapt[.]uzLockBit leak site mirror domain | offline |
185[.]215[.]113[.]39LockBit affiliate C2 infrastructure | offline |
193[.]162[.]143[.]218StealBit data exfiltration server | offline |
Infrastructure data reflects monitoring status only — no raw fingerprint data is exposed.
CISA - Understanding Ransomware Threat Actors: LockBit
https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-165a
NCA - Operation Cronos: International Disruption of LockBit
https://www.nationalcrimeagency.gov.uk/news/nca-leads-international-investigation-targeting-worlds-most-harmful-ransomware-group
U.S. DOJ - Lockbit Leader Dmitry Khoroshev Unmasked and Sanctioned
https://www.justice.gov/opa/pr/us-and-uk-disrupt-lockbit-ransomware-variant
LockBit 5.0: Ransomware Gang Returns in Force - Check Point Research
https://blog.checkpoint.com/research/lockbit-returns-and-it-already-has-victims/
New LockBit 5.0 Targets Windows, Linux, ESXi - Trend Micro
https://www.trendmicro.com/en_us/research/25/i/lockbit-5-targets-windows-linux-esxi.html
LockBit Leak Provides Insight into RaaS Enterprise - TRM Labs
https://www.trmlabs.com/resources/blog/lockbit-leak-provides-insight-into-raas-enterprise
Apache ActiveMQ Exploit Leads to LockBit Ransomware - The DFIR Report
https://thedfirreport.com/2026/02/23/apache-activemq-exploit-leads-to-lockbit-ransomware/
LockBit Ransomware Hacked, Insider Secrets Exposed - Help Net Security
https://www.helpnetsecurity.com/2025/05/09/lockbit-hacked-data-leaked/
Inside LockBit's Admin Panel Leak - Trellix
https://www.trellix.com/blogs/research/inside-the-lockbits-admin-panel-leak-affiliates-victims-and-millions-in-crypto/
Joint Technical Advisory on LockBit 3.0 and 4.0 - Singapore CSA
https://isomer-user-content.by.gov.sg/36/1f56c162-080e-4e49-a005-abf1fd9bd0e4/Joint%20Technical%20Advisory%20on%20LockBit%203.0%20and%204.0%20(2%20May%202025).pdf
Ransomware TTPs in Shifting Threat Landscape - Google Mandiant
https://cloud.google.com/blog/topics/threat-intelligence/ransomware-ttps-shifting-threat-landscape/
LockBit 3.0: Inside the Ransomware-as-a-Service
https://www.trendmicro.com/vinfo/us/security/news/ransomware-spotlight/ransomware-spotlight-lockbit
Operation Cronos: International action against LockBit
https://www.europol.europa.eu/media-press/newsroom/news/operation-cronos-law-enforcement-strikes-against-lockbit
U.S. Department of Justice - Russian National Charged in Connection with Lockbit Ransomware Attacks
https://www.justice.gov/opa/pr/russian-national-charged-connection-lockbit-ransomware-attacks