Since january 2020, affiliates using lockbit have attacked organizations of varying sizes across an array of critical infrastructure sectors, including financial services, food and agriculture, education, energy, government and emergency services, healthcare, manufacturing, and transportation. Lockbit will automatically vet for valuable targets, spread the infection, and encrypt all accessible computer systems on a network. According to reliaquest, the newly returned lockbit has formed a coalition with prominent raas groups dragonforce and qilin, a partnership poised to drive more frequent and effective ransomware attacks.
How LockBit 2.0 Ransomware Works
Law enforcement officials say they’ve identified, sanctioned, and indicted the person behind lockbitsupp, the administrator at the heart of lockbit’s $500 million hacking rampage.
No system is safe anymore
The newest variant of lockbit ransomware targets windows, linux, and vmware esxi systems simultaneously. Trend micro has sounded the alarm over the new lockbit 5.0 ransomware strain, which it warns is significantly more dangerous than past versions due to its newfound ability to simultaneously target windows, linux, and vmware esxi environments. Lockbit have created a new leak site on which they have inflated apparent activity by publishing victims targeted prior to the nca taking control of its services in february, as well as taking. Lockbit ransomware is malicious software designed to block user access to computer systems in exchange for a ransom payment