In recent years, the cybersecurity landscape has witnessed the emergence of several sophisticated and notorious ransomware groups that have wreaked havoc on organizations worldwide.
Among these malevolent actors, the LockBit Ransomware-as-a-Service (RaaS) gang has emerged as a dominant force, inflicting significant harm on both large and small enterprises across the globe. Under the RaaS model, LockBit's modus operandi is to maintain the functionality of its ransomware variant and offer access to it, along with its infrastructure, to third-party hackers known as affiliates.
Originating as "ABCD" ransomware with files encrypted under the ".abcd" extension, LockBit has undergone significant metamorphosis since its initial detection in September 2019. Over the years, the threat actors responsible for LockBit have relentlessly updated and fortified the ransomwares' features and capabilities.
This blog delves into the nefarious activities of LockBit, shedding light on its evolution, tactics, and impact on the cybersecurity realm to gain deeper insights into their attack methods and countermeasures.
LockBit Ransomware and its affiliate network have had a significant negative impact on organizations worldwide. In 2022, LockBit was the most active global ransomware group and RaaS provider, claiming a high number of victims on their data leak site. Operating under the RaaS model, LockBit allows affiliates to access and deploy its ransomware in exchange for a share of the ransom payments. LockBit stands out from other RaaS groups by assuring timely payment to affiliates, engaging in negative publicity against competitors, and offering a user-friendly interface for its ransomware.
Since its first detection in September 2019, LockBit has continuously evolved, advertising itself as the fastest ransomware to encrypt files. It has similarities with Darkside/black matter ransomware and is believed to be part of the LockerGoga & MegaCortex family. LockBit's ransomware is self-spreading but targets specific companies capable of paying large ransoms.
In Australia, LockBit accounted for 18% of reported ransomware incidents from April 2022 to March 2023, while in Canada, it was responsible for 22% of attributed ransomware incidents in 2022. In New Zealand, LockBit ransomware comprised 23% of all ransomware reports in 2022. Within the United States, 16% of State, Local, Tribal, and Tribunal (SLTT) government ransomware incidents reported to the MS-ISAC were identified as LockBit attacks. The FBI has recorded approximately 1,700 LockBit attacks in the U.S. since 2020, with total ransoms paid to LockBit amounting to approximately $91 million since its first observed activity in the U.S. in January 2020. Operational activity related to LockBit in France has been significant, with the National Cybersecurity Agency of France (ANSSI) handling 80 alerts linked to LockBit ransomware, accounting for 11% of all ransomware cases handled by ANSSI since July 2020.
The impact of LockBit has also been felt through leak sites, where attackers publish names and captured data of victims who refuse to pay ransom or hush money. Up until Q1 2023, a total of 1,653 alleged victims were observed on LockBit leak sites. LockBit and its affiliates use the double extortion tactic, exfiltrating data and threatening to disclose it unless the ransom is paid. According to reports, LockBit was responsible for 15% of ransomware attacks in Q1 2022 and 40% in May 2022. Victims are concentrated in North America and Europe, with industries such as professional services, government, and manufacturing being most affected.
Of the confirmed incidents, LockBit 2.0 (LockBit Red) was observed 26 times, LockBit 3.0 (LockBit Black) 23 times, LockBit 21 times and the LockBit Green once. These figures and observations reflect the widespread impact of LockBit Ransomware across different regions and industries, highlighting the urgency for vigilant cybersecurity measures to counter this growing threat.
September 2019:
January 2020:
June 2021:
October 2021:
March 2022:
September 2022:
January 2023:
April 2023:
The timeline above showcases the evolutionary journey of LockBit Ransomware, highlighting its continuous development and adaptation to become a formidable threat in the realm of ransomware attacks. Connections between LockBit and BlackMatter, a rebranded form of the DarkSide ransomware, have been identified by researchers. LockBit's subsequent versions, including LockBit Green with Conti's source code integration and macOS targeting, demonstrate the group's ongoing innovation and determination to remain a significant player in the ransomware landscape. Additionally, the introduction of the world's first ransomware bug bounty program with Zcash cryptocurrency payment option showcases the group's pursuit of innovation and expansion of its operations.
Through the study of multiple different samples obtained from various versions of LockBit across different time windows, we gain valuable insights into the attack stages and modus operandi of this formidable malware. Detonations of these samples provide crucial information (screenshots below) that offer a clear understanding of the sophisticated attack stages employed by LockBit Ransomware.
LockBit ransomware is a sophisticated threat that employs various techniques to compromise and encrypt victim networks. The attack follows a multi-stage process, starting with initial access and network expansion, followed by system information collection and encryption, and culminating in ransomware payload execution and persistence.
LockBit gains initial access through methods like SMB brute forcing, as observed in the emerging LockBit campaign. After obtaining access, the attackers deploy credential dumping tools like Mimikatz to collect login credentials and privilege escalation tools like ProxyShell to gain higher privileges.
To move laterally across the network, LockBit uses tools like PsExec or Cobalt Strike for remote execution.
Additionally, it employs obfuscated PowerShell and batch scripts to establish persistence and evade detection, as described in the Seqrite blog.
LockBit ransomware, like LockBit Black, collects essential system information like hostname, domain details, and network configurations. It uses this data to identify valuable targets for encryption. The ransomware employs a multi-threaded approach to encrypt data rapidly, focusing on shared drives. Examples of this behavior can be seen in the attack chain and anti-forensic activity of LockBit Black.
LockBit employs several techniques for persistence. It disables Windows volume shadow copies and deletes system and security logs to hinder recovery efforts. The ransomware uses UAC bypass methods, including abusing the legitimate fodhelper.exe, to elevate privileges without user approval. Persistence mechanisms involve modifying RDP and authentication settings, as evidenced in the Seqrite blog. LockBit also employs SysInternals Autologon to ensure automatic logins after system reboots.
The series of commands mentioned appears to be a part of the execution flow of the LockBit ransomware.
"C:\Windows\System32\cmd.exe" /c vssadmin delete shadows /all /quiet & wmic shadowcopy delete & bcdedit /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no
This is a compound command that performs multiple operations in sequence, separated by the & symbol. It consists of the following commands:
This is another compound command that performs multiple actions sequentially:
"C:\Windows\System32\cmd.exe" /C ping 127.0.0.7 -n 3 > Nul & fsutil file setZeroData offset=0 length=524288 "C:\Users\Admin\AppData\Local\Temp\614900470417e8f6073775d11cbc4cbca14c6db6.exe" & Del /f /q "C:\Users\Admin\AppData\Local\Temp\614900470417e8f6073775d11cbc4cbca14c6db6.exe"
These commands are indicative of LockBit ransomware's attempt to carry out multiple activities, including disabling recovery options, deleting backup copies, and attempting to cover its tracks by removing traces of its executable. The ransomware aims to maximize its impact by hindering any means of data recovery or system restoration for the victim.
Upon completing the encryption process, LockBit changes the file icons with its own icon. It then drops a ransom note, altering the user's desktop wallpaper with instructions on how to contact the attackers. LockBit Black has been observed engaging in anti-forensic activities, including clearing event logs, terminating multiple tasks, and deleting services simultaneously.
Following are some of the commonly observed MITRE Techniques used by LockBit2 and LockBit3 –
Initial Access
Execution
Persistence
Privilege Escalation
Defense Evasion
Discovery
Lateral Movement
Impact
List of extracted IOCs are attached to this post. Stay tuned for new IOCs, rules, and other content that will be added via Netwitness Live.
With the infamous Conti ransomware group disbanded due to source code leaks during the Russia-Ukraine war, LockBit has risen to the forefront as a leading ransomware threat. Continuously evolving and expanding its tactics and capabilities, LockBit remains a formidable adversary, posing a significant challenge for cybersecurity professionals and organizations worldwide. As cyber threat actors continue to develop their own versions, it becomes crucial for organizations to take proactive steps to ensure their protection against these evolving threats.
Thanks a lot @Will_G and @ArthurF for valuable feedback. And thank you @Sarthak for initial research efforts.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.