LockBit Ransomware Returns With More Effective Attacks

Share post:

Cybersecurity researchers at Trend Micro have been recording an increase in LockBit ransomware campaigns since July. This ransomware-as-a-service first appeared in September 2019 and was quite successful.

LockBit authors claim that LockBit 2.0 is one of today’s fastest file-encrypting ransomware variants in ads in underground forums. Those claims have proven interesting to cybercriminals seeking to make money from ransomware.

Trend Micro researchers have observed several LockBit ransomware campaigns in recent weeks, mainly targeting organizations in Chile, the U.K., Italy and Taiwan.

While LockBit remained under the radar for much of this year, it launched a major attack against Accenture’s professional services company.

LockBit also appears to have benefited from the apparent disappearance of ransomware gangs including REvil and Darkside, with affiliates of those groups turning towards LockBit as their pathway to launch fresh ransomware attacks.

Hackers often gain access to networks via compromised Remote Desktop Protocol (RDP) or VPN accounts that have been leaked or stolen. Alternatively, LockBit attacks sometimes attempt to trick insiders into accessing them with legitimate credentials.

LockBit also succeeds by copying the steps of notorious ransomware groups through certain tactics, techniques and procedures (TTPs) during attacks. LockBit, for example, now uses Ryuk’s Wake-on-LAN function and sends packets to wake offline devices to help them move sideways around networks and compromise as many machines as possible.

LockBit also uses a tool that was previously used by Egregor ransomware – printers in the network to print out ransom notes.

Like many of the most notorious ransomware groups, LockBit adds a double extortion element to the attacks by stealing the victim’s data and threatening to release it if the ransom is not paid as soon as a period expires.

For more information, read the original story in ZDNet.

SUBSCRIBE NOW

Related articles

Cyber Security Today, June 14, 2024 – Employee downloaded a file that led to hospital chain’s ransomware attack

An employee downloaded a file that led to hospital chain's ransomware attack Welcome to Cyber Security Today. It's Friday...

Cyber Security Today, June 12, 2024 – More Snowflake storage victims found, Microsoft issues new Windows patches,

More Snowflake storage victims found, Microsoft issues new Windows patches, and more. Welcome to Cyber Security Today. It's Wednesday,...

Former OpenAI employee alleges plan for AGI bidding war

In a recent interview, former OpenAI safety researcher Leopold Aschenbrenner made startling claims about his ex-employer's strategy regarding...

Malicious code in millions of installs traced to Microsoft Visual Studio

A group of Israeli researchers found thousands of potentially harmful extensions on the Visual Studio Code (VSCode) Marketplace,...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways