Cyber Crime

Evolution of the LockBit Ransomware operation relies on new techniques

Experts documented the evolution of the LockBit ransomware that leverages multiple techniques to infect targets and evade detection.

The Cybereason Global Security Operations Center (GSOC) Team published the Cybereason Threat Analysis Reports that investigates the threat landscape and provides recommendations to mitigate their attacks.

The researchers focused on the evolution of the Lockbit ransomware, they detailed two infections occurring at two very different time periods highlighting the evolution of the operations.

Cybereason researchers documented the evolution of the Lockbit ransomware that uses multiple techniques to infect target systems. The ransomware operators are improving their techniques to disable Endpoint detection and response (EDR) tools and other security solutions.

“LockBit operates on a RaaS (Ransomware as a Service) model. The affiliates that use LockBit’s services conduct their attacks according to their preference and use different tools and techniques to achieve their goal. As the attack progresses further along the kill chain, the activities from different cases tend to converge to similar activities.” reads the analysis published by the experts.

Lockbit RaaS enables affiliates to use existing ransomware tools and infrastructure to carry out their own attacks sharing a percentage of the payment.

In the first attack documented by the researchers, which took place in Q4 2021, the affiliates working with LockBit gang used their own malware and tools to compromise the targets. In most of the infections analyzed by the researchers, threat actors compromised the target networks by exploiting a misconfigured service, particularly a publicly opened RDP port. 

“In other cases, affiliates would use a more traditional phishing email that will allow them to remotely connect to a network via an employee’s computer, or utilize malicious attachments, downloads, application patch exploits or vulnerabilities to gain access to a network.” continues the report.

Once the threat actors established an initial foothold on the compromised network, they start the reconnaissance activity and credentials extraction using tools such as Mimikatz and Netscan.

The second infection detailed by the researchers took place in Q2 2022. The researchers detailed the various stages of the attack, from the initial compromise, lateral movements, establishing persistence, escalation of privileges, and the final ransomware development.

The attackers leveraged net.exe to create a domain account and elevate their privileges to “domain administrator,” then they used the accounts to achieve persistence and spread on the victim’s network.

The researchers also noticed the use of Ngrok, a legitimate reverse proxy tool that allows the attackers to create a tunnel to servers located behind firewalls.

The threat actors also infected additional machines in the target network with the malware “Neshta,” which is a file infector that injects its malicious code to targeted executable files.

“At this point, the LockBit affiliate had completed all the necessary steps to execute the LockBit payload and commence encryption:

  • Persistence on the network through multiple infected machines
  • Access to top-privilege accounts
  • Collected and exfiltrated victim data
  • List of most assets through network discovery and scans” concludes the report.

The experts also shared Indicators of Compromise, along with Mitre mapping.

Recently, the Lockbit ransomware operation has released LockBit 3.0, which has important noveòties such as a bug bounty program, Zcash payment, and new extortion tactics. The gang has been active since at least 2019 and today it is one of the most active ransomware gangs.

Follow me on Twitter: @securityaffairs and Facebook

[adrotate banner=”9″][adrotate banner=”12″]

Pierluigi Paganini

(SecurityAffairs – hacking, Lockbit)

[adrotate banner=”5″]

[adrotate banner=”13″]

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

LockBit published data stolen from Simone Veil hospital in Cannes

LockBit ransomware operators have published sensitive data allegedly stolen from the Simone Veil hospital in…

14 hours ago

Russia-linked APT28 and crooks are still using the Moobot botnet

The Ubiquiti EdgeRouter botnet is still used by Russia-linked group APT28 and cybercriminals organizations. Trend Micro…

16 hours ago

Dirty stream attack poses billions of Android installs at risk

Microsoft devised an attack technique, dubbed 'Dirty Stream,' impacting widely used Android applications, billions of…

22 hours ago

ZLoader Malware adds Zeus’s anti-analysis feature

Zloader continues to evolve, its authors added an anti-analysis feature that was originally present in…

24 hours ago

Ukrainian REvil gang member sentenced to 13 years in prison

A Ukrainian national, a member of the REvil group, has been sentenced to more than…

2 days ago

Pro-Russia hackers target critical infrastructure in North America and Europe

Government agencies from the US, Canada and the UK warn of Russian threat actors targeting…

2 days ago

This website uses cookies.