{"id":2369,"date":"2021-06-16T16:56:53","date_gmt":"2021-06-16T07:56:53","guid":{"rendered":"https:\/\/cyberenso.jp\/?page_id=2369"},"modified":"2021-07-08T11:07:59","modified_gmt":"2021-07-08T02:07:59","slug":"lockbit-ransomware","status":"publish","type":"page","link":"https:\/\/cyberenso.jp\/en\/types-of-ransomware\/lockbit-ransomware\/","title":{"rendered":"LockBit Ransomware"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"2369\" class=\"elementor elementor-2369\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-808bd3d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"808bd3d\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6fcef81\" data-id=\"6fcef81\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-0cd10bc elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0cd10bc\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-dcbd297\" data-id=\"dcbd297\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-eca7737 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"eca7737\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;bounce&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-xl\">LOCKBIT RANSOMWARE<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-caf344d elementor-widget elementor-widget-image\" data-id=\"caf344d\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/ransomware-2315203_1920.jpg?fit=700%2C400&amp;ssl=1\" title=\"ransomware-2315203_1920\" alt=\"ransomware-2315203_1920\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-cc93eef elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"cc93eef\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-5a90d0b\" data-id=\"5a90d0b\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a3cecc6 elementor-widget elementor-widget-text-editor\" data-id=\"a3cecc6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<h4 style=\"text-align: left;\"><strong><span style=\"color: #444444;\">Introduction<\/span><\/strong><\/h4><p style=\"text-align: left;\">LockBit ransomware, formerly known as ABCD ransomware made its first appearance in 2019 as it was being distributed by phishing emails and brute force attacks on exposed machines. <br \/>Attacks involving the LockBit ransomware have been frequent and have been recorded to target organisations of medium to large size from many countries including United States, China, India, Indonesia, Ukraine, and various countries throughout Europe. <br \/>There is no decryptor for any of the active variants of the LockBit ransomware and the average ransom required is $57,600 which can be paid via TOR chat link addresses provided in the ransomware note. <\/p><h3 style=\"text-align: left;\"><strong><span style=\"color: #444444;\">Modus Operandi<\/span><\/strong><\/h3><h5 style=\"text-align: left;\"><strong><span style=\"color: #444444;\">Initial access<\/span><\/strong><\/h5><p>The infection vectors used by threat actors are phishing emails and brute force attacks on the target\u2019s exposed servers. As soon as they have gained access to a compromised machine, they execute a remote PowerShell script which downloads another script from a heavily obfuscated google sheets document that connects to a C&amp;C server to retrieve and install a PowerShell module which is a backdoor installer module. During the heavy usage of PowerShell, the threat actor renames their copies of PowerShell and the binary used to run Microsoft HTML Application Host (mshta.exe) to evade monitoring. After the backdoor is installed, it creates a Task Scheduler to executes a VBScript that downloads a second backdoor from another C&amp;C server and executes the second backdoor whenever the compromised machines restarts.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-f09d2c1\" data-id=\"f09d2c1\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6392626 elementor-widget elementor-widget-text-editor\" data-id=\"6392626\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<h5><strong>Installation<\/strong><\/h5><p>The threat actor then runs a PowerShell command that retrieves a .png which is .NET loader from a compromised website and then it is used to execute the download of the final payload of LockBit. The payload is a base64 string encrypted with AES, so it is decrypted and then the .NET loader checks for vbc.exe or downloads vbc.exe before using vbc.exe to compile and execute the decrypted payload. Then LockBit is loaded into memory by using performing a technique of process hollowing, where the LockBit creates a new process in a suspended state, then writes its malicious code into the process before resuming the execution of the suspended process. LockBit will scan the network for shadow copies and then deletes any shadow copies that were found. It also kills processes and stop services related to antivirus, database, backup, and document editing software from a list of predefined service and process names.<\/p><h5><strong>Encryption<\/strong><\/h5><p>LockBit Ransomware use AES and RSA cryptography algorithms to encrypt all the target files. While LockBit is encrypting the files, it will also attempt to scans the whole target\u2019s network and then tries to connect to the other machines via SMB port 445. Whenever it connects to another machine, it attempts to run a PowerShell script that downloads the LockBit malware onto another machine and therefore spreads the ransomware through the target\u2019s network.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>LOCKBIT RANSOMWARE Introduction LockBit ransomware, formerly known as ABCD ransomware made its first appearance in 2019 as it was being distributed by phishing emails and brute force attacks on exposed machines. Attacks involving the LockBit ransomware have been frequent and have been recorded to target organisations of medium to large size from many countries including United States, China, India, Indonesia,<span class=\"excerpt-hellip\"> [\u2026]<\/span><\/p>\n","protected":false},"author":1,"featured_media":2388,"parent":3201,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-2369","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/pages\/2369"}],"collection":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/comments?post=2369"}],"version-history":[{"count":17,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/pages\/2369\/revisions"}],"predecessor-version":[{"id":4329,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/pages\/2369\/revisions\/4329"}],"up":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/pages\/3201"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/media\/2388"}],"wp:attachment":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/media?parent=2369"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}