- Table of contents
LockBit Ransomware hits again
Introduction
Launched in September 2019 and formerly known as ‘ABCD’, LockBit is a ransomware-as-a-service (RaaS) threat that was updated in June 2021 and improved on the group’s earlier claims of having the fastest encryption process on the ransomware scene (Figure 1).
Much like other RaaS offerings, LockBit operates an affiliate profit sharing program in which up-to eighty percent of a ransom payment can be earned whilst the operators claim the remainder.
Reportedly only requiring the affiliate to gain access to a ‘core’ server, such as a Windows Domain Controller (DC), the advertised feature set (Figure 2) suggests that the LockBit ransomware will distribute itself across the network in addition to automating steps that aid in detection evasion, complicating post-incident analysis and preventing data restoration.
As is common with many ‘big game hunter’ ransomware threats, LockBit and their affiliates utilize the double extortion tactic, stealing data and threatening its release to encourage ransom payments.
As seen in the recent high-profile incident involving Accenture, a multinational consulting and professional services firm, LockBit share details of their victims on a Tor-hosted leak site (Figure 3) along with a timer the counts down to the date and time at which stolen data will be published unless the ransom payment is received.
In Accenture’s case, LockBit have reportedly demanded a fifty million US Dollar ($50M) ransom with the countdown for payment of expiring at 20:43:00 UTC on August 13, 2021.
Potentially indicating the scale of data theft from Accenture and no doubt taking into account the firm’s profitability, this ransom demand is considerably higher than LockBit’s previously reported average ransom of $85,000.
Notably, whilst Accenture are currently in the headlines, details of some thirty-eight additional victims are currently listed on LockBit’s leak site with deadlines expiring anywhere between hours and thirteen days (as at the time of writing). Aside from demonstrating that LockBit and their affiliates are highly capable, there is no apparent pattern of victim geography or sector.
Whilst it is well known that most ransomware groups won’t target organizations located within the Commonwealth of Independent States (CIS), it comes as no surprise that current LockBit victims are located across Asia, North America, South America and Western Europe. Additionally, there appears to be no consistency in the targeted industry or sector with current victims including financials, manufacturing, petrochemicals and retail.
Initial Intrusion
Whilst each affiliate will likely have their own preferred tactics, techniques and procedures (TTP) to distribute LockBit, most big game hunter ransomware groups operate in a similar manner when it comes to the initial intrusion vector.
Although targeted phishing campaigns may remain a useful method of gaining access to user credentials and/or delivering a payload to an endpoint, many ransomware threat actors continue to target exposed Windows Remote Desktop instances with brute-force attacks as well as exploiting known vulnerabilities in exposed network devices such as VPN gateways.
Specifically, the Australian Cyber Security Centre (ACSC) have recently observed LockBit as exploiting a three-year-old vulnerability in Fortinet FortiOS and FortiProxy products, CVE-2018-13379, that allows an unauthenticated threat actor to download system files via specially crafted HTTP requests and, presumably in these incidents, gain access to credentials and subsequently the target network.
Concerningly, as highlighted in commentary following the recent Accenture incident, recent reports suggest that LockBit have sought to recruit employees of target networks which, depending on the insider threat’s access, could save the ransomware group a considerable amount of time and effort.
Whilst it is hoped that most employees would ignore and/or report any nefarious recruitment attempt, cash rich ransomware groups will be more than able to offer lucrative incentives that some may find hard to resist, especially if they already hold some grievance against their employer.
Data Theft Phase
Although the initial infection vector may differ from one victim to another, the objective upon gaining access to the victim network remains consistent: the exfiltration of sensitive and valuable data, prior to encryption, to exert maximum pressure on the victim and encourage prompt payment of any ransom demand.
As recently observed during the Cyberint Research investigation into the Conti Ransomware ‘manuals and tools’ leak, many groups utilize Rclone, a legitimate opensource tool used to synchronize and manage data on local, cloud and virtual file systems.
Seeking to again optimize their operation, LockBit have developed their own data stealing method dubbed ‘StealBit’ that, according to their claims (Figure 4), is significantly faster than exfiltrating data to common cloud services using Rclone.
Encryption Phase
To prevent interference with the encryption process, it is typical for ransomware threats to terminate processes or services, such as applications or backup utilities that may ‘lock’ files open, as well as endpoint security solutions that may detect the threat.
Whilst many threats utilise Windows command line utilities, such as net.exe stop <PROCESS>
or taskkill.exe /IM <PROCESS> /F
, LockBit directly calls functions within the Windows API to achieve the same outcome, likely attempting to further evade detection where endpoint monitoring is in place.
Subsequently, point-in-time backup copies of data created using the Windows Volume Shadow Copy Service (VSS) are deleted in advance of the encryption process using a single line command that also includes steps to hamper recovery efforts:
"%WINDIR%System32cmd.exe" /c vssadmin delete shadows /all /quiet & wmic shadowcopy delete & bcdedit /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no
Aside from utilizing the VSS administrative tool, vssadmin.exe
, and the Windows Management Instrumentation utility, wmic.exe
, to delete existing volume shadow copies, the Boot Configuration Data (BCD) editor, bcdedit.exe
, is used to ensure that subsequent system boot failures are ignored and the recovery boot option disabled.
When deployed within an Active Directory (AD) environment and on a Windows Domain Controller (DC), LockBit version 2.0 makes use of Group Policy Objects (GPO) to both disable Windows Defender and distribute, then execute, the ransomware across the network.
Utilizing similar tactics to those ransomware threats that use PowerShell to interact with Windows Defender, a GPO is created to disable real-time monitoring, prevent the upload of samples to Microsoft and supress notifications.
Additionally, a User Account Control (UAC) bypass technique is utilized in the ransomware distribution and execution GPO leading to silent execution on any affected Windows host.
Once complete, a PowerShell command is used to force the update of GPOs, causing them to be pushed to all machines in the domain:
powershell.exe -Command "Get-ADComputer -filter * -Searchbase '%s' | foreach{ Invoke-GPUpdate -computer $_.name -force -RandomDelayInMinutes 0}"
Having prepared for the encryption process, LockBit version 2.0 utilizes an AES encryption algorithm that is performed on files ‘in-place’ to prevent recovery from disk and, upon completion, the file extension .lockbit
is appended.
Clean-up Phase
In an attempt to prevent post-incident analysis, LockBit version 2.0 attempts to delete itself upon completion using the following command:
"%WINDIR%System32cmd.exe" /C ping 127.0.0.7 -n 3 > Nul & fsutil file setZeroData offset=0 length=524288 "%TEMP%<LOCKBIT_BINARY>.exe" & Del /f /q "%TEMP%<LOCKBIT_BINARY>.exe"
Seemingly using the ping
command as a delay mechanism, presumably allowing the ransomware process to terminate, the File System utility is used to prevent the malicious executable from being recovered by overwriting the first 524KB with zeros, fsutil file setZeroData offset=0 length=524288
, and then forcibly deleting the file, Del /f
.
Ransom Note
To ensure that the victim is informed of the encryption, LokiBot version 2.0 utilizes three methods to display the ransom note. The first of which, and typical for threats of this nature, is the creation of a text file ransom note named Restore-My-Files.txt
(Figure 5) within folders that contain encrypted data.
For the benefit of victims sat in front of an encrypted machine, a HTML application (HTA) file is saved as %HOMEPATH%DesktopLockBit_Ransomware.hta
and launched upon the conclusion of the process to display a full screen notification (Figure 6).
Figure 6 – HTA ransom note
Finally, the Desktop wallpaper is changed and displays a similar message to the HTA ransom note, albeit without the ability for the victim to click on the URLs.
In 2024 a large number of LockBit operatives were arrested and LockBitSupp’s identity was revealed.
Recommendations
- Given the continued success of big game hunter ransomware attacks, it is critical that organizations take steps to reduce the attack surface of hosts exposed to the internet such as network devices and servers.
- Maintain a robust patch management process to ensure that security updates and patches are applied in a timely fashion, including hardware appliances such as VPN gateways, to prevent known vulnerabilities from being exploited.
- Monitor for, and alert on, the anomalous modification of security settings or configurations, such as those observed with Windows Defender.
- Consideration should be given to continuously monitoring endpoint security events as an early warning of suspicious behavior, for example, host-to-host communications indicating lateral movement or high-volume disk operations indicating mass file encryption or exfiltration.
- Consider monitoring for, and alerting on, the anomalous execution of legitimate Windows command line tools such as the use of
net.exe
,taskkill.exe
,vssadmin.exe
andwmic.exe
. - Disable administrative tools and script interpreters to prevent misuse by malicious payloads or threat actors.
- Limit user permissions according to the principal of least privilege (POLP).
- Secure sensitive data, adhering to any legal or regulatory requirements, to prevent unauthorized access, be that internal or external in origin.
- Ensure that disaster recovery plans and backup policies take into account regular backups, verification of data integrity and offline storage to facilitate restoration in the event of a catastrophic incident.
- Make use of network segregation to limit communications between nodes, especially endpoints, to provide damage limitation and limit the propagation of threats.
Indicators of Compromise
In addition to the following indicators of compromise (IOC), consideration should be given to reading the Cyberint Research Conti IOC report given the overlap in tactics, techniques and procedures (TTP) used by big game hunter ransomware groups.
Commands
The unexpected execution of the following commands, as observed during the execution of LockBit version 2.0, may be indicative of nefarious activity.
- Boot Configuration Data Editor:
bcdedit /set {default} bootstatuspolicy ignoreallfailures
bcdedit /set {default} recoveryenabled no
- Ransom Note Display:
%WINDIR%SysWOW64mshta.exe %HOMEPATH%DesktopLockBit_Ransomware.hta
- Ransomware Deletion:
"%WINDIR%System32cmd.exe" /C ping 127.0.0.7 -n 3 > Nul & fsutil file setZeroData offset=0 length=524288 "%TEMP%<LOCKBIT_BINARY>.exe" & Del /f /q "%TEMP%<LOCKBIT_BINARY>.exe"
- Volume Shadow Copy Deletion:
vssadmin delete shadows /all /quiet
wmic shadowcopy delete
Files (SHA256)
Whilst the LockBit version 2.0 ransomware binary will change from victim to victim, the following samples have been recently observed and are beneficial to those that wish to understand more about the threat.
0545f842ca2eb77bcac0fd17d6d0a8c607d7dbc8669709f3096e5c1828e1c049
0d6524b9a1d709ecd9f19f75fa78d94096e039b3d4592d13e8dbddf99867182d
bcbb1e388759eea5c1fbb4f35c29b6f66f3f4ca4c715bab35c8fc56dcf3fa621
d089d57b8b2b32ee9816338e96680127babc5d08a03150740a8459c29ab3ba78
f32e9fb8b1ea73f0a71f3edaebb7f2b242e72d2a4826d6b2744ad3d830671202
Notably, the LockBit_Ransomware.hta
file is consistent across recently observed LockBit version 2.0 samples:
90f3a33919fdd766e90fd96f8f20a92c2d1376b7cfdc8b738c2f8e7e6c7498b1
Although the Restore-My-Files.txt
ransom note will vary from victim to victim due to the inclusion of a unique identifier.
Registry
The Windows Desktop wallpaper is set to a temporary bitmap file by updating the HKCUControl PanelDesktopWallpaper
Registry key and providing a filename within the %TEMP%
directory.
URLs
The following URLs are provided within the ransom notes as a method to contact the threat actors and/or observe previously leaked data.
hxxp://lockbitapt6vx57t3eeqjofwgcglmutr3a35nygvokja5uuccip4ykyd[.]onion
hxxp://lockbitsap2oaqhcun3syvbqt6n5nzt7fqosc6jdlmsfleu3ka4k2did[.]onion
hxxp://lockbitsup4yezcd5enk5unncx3zcy7kw6wllyqmiyhvanjj352jayid[.]onion
hxxps://bigblog[.]at
hxxps://decoding[.]at
Additionally, the following URLs have previously been used by the threat group:
hxxp://lockbit-decryptor[.]top
hxxp://lockbitks2tvnmwk[.]onion