The LockBit Comeback: How the Group Evolved After a Global Takedown

Picus Labs | 15 MIN READ

| December 05, 2025

LockBit is recognized as one of the most prominent and pervasive Ransomware-as-a-Service (RaaS) operations, operating since 2019 and consistently growing to become a significant global cyber threat. The operation functions using an affiliate model and frequently targets numerous critical sectors worldwide, including the financial, healthcare, manufacturing, and technology industries. A double extortion tactic is employed, wherein data is encrypted on victim systems, and the victims are simultaneously threatened with the public release of stolen data if the ransom is not paid.

The ransomware itself is highly complex, featuring sophisticated anti-analysis and obfuscation techniques. Heavy obfuscation is utilized through methods such as dynamic API resolution via hashing, and in recent versions (like LockBit 5.0), payloads are loaded through DLL reflection.

In February 2024, a major international law enforcement action (Operation Cronos) significantly disrupted the group's infrastructure. The operation led to the compromise of the administration panel and the public release of internal affiliate and victim data. Following the disruption, victim decryption keys were offered, and it was revealed that stolen data was frequently retained even after ransoms had been paid. Subsequently, a clear drop in new infections was observed, and efforts to maintain the illusion of normal operation included reposting old victims to new leak sites.

The current status of LockBit is characterized by its resilience and aggressive resurgence following the major law enforcement disruption. Despite the reputational damage and initial setback, the group resurfaced for its sixth anniversary in early September 2025, announcing and deploying LockBit 5.0. LockBit 5.0 is considered significantly more dangerous than its predecessors [1], indicating the group is actively evolving its codebase and remains a potent cyber threat.

In this blog, we will examine the technical characteristics of LockBit ransomware and its evolution over the years.

LockBit 3.0 (LockBit Black)

The technical analysis of LockBit v3.0, also known as LockBit Black, reveals a sophisticated ransomware variant that incorporates custom cryptographic implementations and advanced anti-analysis techniques. This variant is modeled after the BlackMatter family, which itself originated from the Darkside ransomware family [2].

Core Cryptography and Encryption Scheme

Encryption Algorithms

LockBit v3.0 employs a hybrid cryptographic approach, utilizing both symmetric and asymmetric encryption to secure the files and the keys used for encryption [2].

The sample uses a modified version of the Salsa20 algorithm. It uses a 64-byte key for file encryption, whereas the standard Salsa20 uses a 32-byte key.

The ransomware uses a custom implementation of the RSA algorithm at a 1024-bit key size to encrypt critical key material. The 1024-bit public key is embedded within the ransomware configuration, and this implementation uses no padding.

Key Management Hierarchy

The encryption system follows a layered key-management structure [2]. At the lowest level, each file’s data is encrypted in chunks using a 64-byte file_encryption_key with the modified Salsa20 algorithm. The file_encryption_key itself is not stored in plaintext; instead, a separate 64-byte random Salsa20 key is generated to protect the file_encryption_key, and this second key is designated as the key_encryption_key.

To secure this further, the key_encryption_key is encrypted using a built-in 1024-bit RSA public key. This forms the top layer of protection, ensuring that only a holder of the corresponding RSA private key can recover the key_encryption_key. As an optimization to limit the number of expensive RSA operations, the same key_encryption_key is reused across 1,000 files before a new one is generated.

Encrypted File Structure

Files are processed by dividing them into chunks of 0x20000 bytes. These chunks form alternating groups: before group, skip group, and after group [2]. 

Chunks in the before and after groups are encrypted using Salsa20. Chunks in the skip group are left unencrypted. The overall structure ends with a footer, which contains the structures necessary for decryption.

Evasion and Anti-Analysis Techniques

LockBit v3.0 includes numerous techniques to thwart analysis and maximize impact.

Anti-Analysis and Obfuscation

  • API Resolution and Trampolines: The ransomware manually resolves Windows Application Programming Interfaces (APIs) using a hashing algorithm applied to DLLs and export names, avoiding import hash tracking [2]. It iterates through DLL files in the System32 directory [3]. Instead of calling the resolved APIs directly, it allocates small memory chunks to build trampoline code that calculates and jumps to the target API address, complicating static analysis [2].
  • Anti-Debugging: The sample performs checks on the Windows HEAP structure, specifically examining the Flag and ForceFlag fields, which change when a debugger is present. If a debugger is detected, the process may attempt to crash by modifying the HEAP structure handle. It also checks for debugger-enabled memory corruption guardrails (magic constants like 0xABABABAB). It conceals threads via NtSetInformationThread() with ThreadHideFromDebugger; and encrypts the DbgUiRemoteBreakin() function via NtProtectVirtualMemory() and RtlEncryptMemory() to trigger a crash if a debugger attempts to attach later [2].

Defense Evasion and System Compromise

LockBit 3.0 uses the Trusted Installer service access token to enumerate, stop, and delete predefined Windows Security Services (including SecurityHealthService, WinDefend, and various Windows Defender drivers) that were listed in its configuration.

If required privileges are not found (specifically Domain Admin membership), it attempts to gain access by locating the operating system process, such as explorer.exe, and duplicating its access token using functions like ZwOpenProcessToken and NtDuplicateToken [3]:

status = (*ntdll.NtOpenProcess)
          (&ProcessHandle,MAXIMUM_ALLOWED,&security_descriptor.Sacl,&ClientId);
if (status == 0) {
    /* get token handle for process */
    status = (*ntdll.ZwOpenProcessToken)(ProcessHandle,MAXIMUM_ALLOWED,&TokenHandle);
    if (status == 0) {
        security_descriptor._0_4_ = 0xc;
        security_descriptor.Owner = param_2;
        security_descriptor.Group._0_1_ = 0;
        security_descriptor.Group._1_1_ = 0;
        security_descriptor.Sacl = FILE_READ_EA | FILE_WRITE_EA;
        security_descriptor.Dacl = 0x0;
        (*ntdll.NtDuplicateToken)
          (TokenHandle,MAXIMUM_ALLOWED,&security_descriptor.Sacl,0,token_type,
          &NewTokenHandle);

The ransomware includes checks to prevent operation in certain countries, including Russia, Ukraine, Belarus, and others. It also checks if the system started in safe mode, setting a registry key to run on the next normal boot if necessary.

Execution and File Impact

LockBit 3.0 performs encryption in a multi-threaded manner.

Files that are encrypted receive a unique extension (e.g., .IzYqBW5pa). The ransomware modifies the file system icon association in the registry (HKEY_CLASSES_ROOT) and drops an icon file (e.g., C:\ProgramData\IzYqBW5pa.ico) to change the icons of encrypted files to the LockBit "B" logo.

A ransom note ([unique ID].README.txt) (e.g., xEC9do6g6.README.txt) is dropped in every target directory. The content of the note is decrypted at runtime [3].

When configured, the sample communicates with a C2 server over TLS 1.2 using the HTTP POST method. Variables and values within the POST request data are AES-encrypted, and the User-Agent string is randomized.

LockBit-NG-Dev

During the February 2024 law enforcement takedown of the LockBit server, authorities discovered an advanced prototype known as LockBit-NG-Dev, which was likely intended to become LockBit 4.0.

Architectural Changes

Unlike previous versions written in C/C++, this new version is written in .NET and appears to be compiled using CoreRT [4].

Also, the binary is packed using MPRESS, likely a measure to evade static file detections.

Configuration and Initialization

Unlike variants that hardcode behavior directly into the main execution flow, LockBit-NG-Dev relies on an embedded JSON configuration that is decrypted at runtime. This configuration dictates the entire operational scope, including target dates, encryption modes, and ransom note details [4].

{
  "MinDate": "2022-06-01",
  "MaxDate": "2023-09-16",
  "AppendedExtension": "locked_for_lockbit",
  "NoteFilename": "README_<REDACTED>.txt",
  "NoteContent": null,
  "ID": <REDACTED>,
  "ChangeFilename": true,
  "SkipHiddenFiles": true,
  "DeleteVolumeShadowCopies": true,
  "DeleteWindowsSystemBackups": true,
  "EfficiencyMode": true,
  "SelfDelete": false,
  "DropNoteBeforeEncryption": true,
  "StopProcesses": false,
  "ProcessesToStop": [],
  "StopServices": false,
  "ServicesToStop": [],
  "IncludeFiles": false,
  "FileSet": ["<REDACTED>.txt"],
  "IncludeDirectories": false,
  "DirectoryList": ["C:\\windows", "C:\\ProgramData", "C:\\Program Files (x86)", "C:\\Program Files", "C:\\msys64"],
  "IncludeExtensions": false,
  "NoneSet": [".exe", ".dll", ".tmp", ".url", ".lnk", "locked_for_lockbit"],
  "FastSet": [],
  "IntermitttentSet": [".sql", ".csv"],
  "FullSet": [".txt"],
  "BufferSize": 4096,
  "Percent": 0.025,
  "Segmentation": 256,
  "PublicKey": "-----BEGIN RSA PUBLIC KEY-..."
}

Upon initialization, the malware establishes a mutex using the ID value found in the configuration. If this mutex already exists, the process terminates immediately to prevent concurrent infections [4].

Defense Evasion and Pre-Encryption Routines

Before the encryption phase begins, the malware executes several routines to ensure maximum impact and hinder recovery efforts.

The malware checks the StopProcesses and StopServices flags. If enabled, it iterates through the ProcessesToStop and ServicesToStop lists provided in the JSON configuration and terminates them. This action ensures that file handles held by active applications (such as databases or security tools) are released, allowing them to be encrypted [4].

To prevent victims from restoring files via local recovery options, LockBit-NG-Dev executes specific commands based on the configuration flags DeleteVolumeShadowCopies and DeleteWindowsSystemBackups [4].

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" vssadmin Delete Shadows /All /Quiet

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" wbadmin DELETE BACKUP -keepVersions:0 -quiet

To remove forensic evidence after the attack execution, the malware checks the SelfDelete flag. If enabled, it executes a PowerShell command that terminates the ransomware process and overwrites the executable's on-disk data with null bytes using fsutil [4].

powershell.exe -Stop-Process -Id {process_id} -Force; fsutil.exe file setZeroData offset=0 length=9999999999 "{Path_of_ransomware}"

Encryption Mechanisms

LockBit-NG-Dev utilizes AES for file encryption, with the AES keys subsequently encrypted using the RSA public key embedded in the configuration. The malware supports three distinct encryption modes [4]:

  1. Fast Mode: Encrypts only the first 0x1000 bytes of the file. This is typically applied to files listed in the FastSet. The exact size is determined by the BufferSize.
  2. Intermittent Mode: Encrypts specific blocks of the file at intervals. The density of encryption is controlled by the Percent field, and the gap between blocks is defined by the Segmentation field.
  3. Full Mode: Encrypts the entire file content.

When ChangeFilename is set to true, the encrypted files are renamed to a random string. To allow for potential decryption, the original filename is preserved within the file structure [4].

LockBit 5.0

A new iteration of the LockBit ransomware family, version 5.0, has been identified in the wild. This version represents a continued evolution of the group's capabilities, targeting Windows, Linux, and VMware ESXi environments [5]. Analysis indicates that while the core functionalities have been preserved to maintain operational consistency, significant technical improvements and evasion techniques have been introduced. These updates aim to complicate analysis and delay the development of detection signatures.

Cross-Platform Execution and Configuration

The ransomware maintains a consistent command-line interface across its Windows, Linux, and ESXi variants, allowing operators to deploy it with similar parameters regardless of the operating system. Most remarkable ones are given below [5]:

  • -i (Invisible Mode): This argument activates a stealth operation state. When enabled, the malware encrypts files without appending the 16-character extension, suppresses the creation of ransom notes, and preserves the original file modification timestamps to blend in with legitimate system activity.
  • -m <mode> (Encryption Scope): Defines the operational radius of the attack. Operators can specify local to restrict encryption to the infected machine, net to target network shares specifically, or all to compromise the entire available environment.
  • -w (Anti-Forensics): This flag triggers a wiping routine that overwrites free disk space after the encryption process is complete.

Anti-Forensics and Defense Evasion

To evade detection and impede forensic investigation, LockBit 5.0 implements several countermeasures [5]:

ETW Patching

The malware patches the EtwEventWrite API in user mode by overwriting the function's beginning with a 0xC3 (RET) instruction. This effectively disables Windows Event Tracing, preventing security solutions from monitoring its activities.

Service Termination

It contains a hardcoded list of 63 service name hashes. The malware hashes the names of running services and compares them against this list. If a match is found, the service is terminated to disable security tools or backup solutions. 

Example Service Hashes: FEF56F15, BEC3470B, 9757464D, 88CE6B8E, 826AC445...

Log Clearing

Upon the completion of the encryption process, the EvtClearLog API is used to wipe all event logs, removing traces of the attack.

Encryption and Victim Interaction

The ransomware encrypts files and appends a randomized 16-character extension to the filenames (e.g., .1a2b3c4d5e6f7g8h). 

A ransom note is generated, directing victims to a Tor-based data leak site. This site includes a "Chat with Support" section, streamlining the negotiation process between the attackers and the victim [5].

How Picus Simulates LockBit Ransomware Attacks?

We also strongly suggest simulating LockBit Ransomware Attacks to test the effectiveness of your security controls against real-life cyber attacks using the Picus Security Validation Platform. You can also test your defenses against hundreds of other ransomware variants, such as HybridPetya, Yurei, BlackNevas, and CyberVolk, within minutes with a 14-day free trial of the Picus Platform.

Picus Threat Library includes the following threats for the LockBit Ransomware Campaign:

Threat ID

Threat Name

Attack Module

41037

LockBit 5.0 Ransomware Download Threat

Network Infiltration

40664

LockBit 5.0 Ransomware Email Threat

E-mail Infiltration

73178

LockBit 4.0 Ransomware Download Threat

Network Infiltration

75649

LockBit 4.0 Ransomware Email Threat

E-mail Infiltration

74169

LockBit Green Ransomware Download Threat

Network Infiltration

43227

LockBit Green Ransomware Email Threat

E-mail Infiltration

33121

LockBit Black Ransomware Download Threat

Network Infiltration

42440

LockBit Black Ransomware Email Threat

E-mail Infiltration

24168

LockBit 3.0 Ransomware Download Threat - 1

Network Infiltration

71275

LockBit 3.0 Ransomware Email Threat - 1

E-mail Infiltration

89603

LockBit 3.0 Ransomware Download Threat - 2

Network Infiltration

22700

LockBit 3.0 Ransomware Email Threat - 2

E-mail Infiltration

76668

LockBit 3.0 Malware Downloader Download Threat

Network Infiltration

30789

LockBit 3.0 Malware Downloader Email Threat

E-mail Infiltration

56526

LockBit 2.0 Ransomware Download Threat

Network Infiltration

42142

LockBit 2.0 Ransomware Email Threat

E-mail Infiltration

55537

LockBit Ransomware Download Threat - 1

Network Infiltration

59891

LockBit Ransomware Email Threat - 1

E-mail Infiltration

46488

LockBit Ransomware Download Threat - 2

Network Infiltration

89233

LockBit Ransomware Email Threat - 2

E-mail Infiltration

51639

LockBit Ransomware Campaign

macOS Endpoint

46724

LockBit Ransomware Campaign

Linux Endpoint

36990

LockBit Malware Attack Campaign

Windows Endpoint

Start simulating emerging threats today and get actionable mitigation insights with a 14-day free trial of the Picus Security Validation Platform.

Key Takeaways

  • The LockBit operation remained functional and regained momentum after the global 2024 disruption, returning with LockBit 5.0 for its sixth anniversary.
  • LockBit 3.0 features modified Salsa20, custom RSA-1024 without padding, layered key management, selective file chunk encryption, and extensive anti-analysis capabilities.
  • LockBit 3.0 uses token duplication, security service removal, and safe mode checks to maintain execution and evade defenses.
  • LockBit-NG-Dev shifts to a .NET CoreRT implementation with MPRESS packing and relies entirely on a decrypted JSON configuration to control behavior.
  • LockBit-NG-Dev supports multiple encryption modes, configurable file targeting, recovery disruption routines, and optional self-deletion through PowerShell and fsutil.
  • LockBit 5.0 introduces cross-platform operation, invisible mode, selectable encryption scope, ETW patching, service termination using hashed identifiers, and event log clearing.

References

[1] “New LockBit 5.0 Targets Windows, Linux, ESXi,” Trend Micro. Accessed: Nov. 25, 2025. [Online]. Available: https://www.trendmicro.com/en_us/research/25/i/lockbit-5-targets-windows-linux-esxi.html

[2] N. Huỳnh, H. Nguyen, and T. Duong, “Dissecting LockBit v3 ransomware,” Calif. Accessed: Nov. 25, 2025. [Online]. Available: https://blog.calif.io/p/dissecting-lockbit-v3-ransomware

[3] D. Behling, “LockBit 3.0 Ransomware Unlocked,” VMware Security Blog. Accessed: Nov. 25, 2025. [Online]. Available: https://blogs.vmware.com/security/2022/10/lockbit-3-0-also-known-as-lockbit-black.html

[4] “LockBit attempts to stay afloat with a new version.” Accessed: Nov. 26, 2025. [Online]. Available: https://www.trendmicro.com/content/dam/trendmicro/global/en/research/24/b/lockbit-attempts-to-stay-afloat-with-a-new-version/technical-appendix-lockbit-ng-dev-analysis.pdf

[5] “New LockBit 5.0 Targets Windows, Linux, ESXi,” Trend Micro. Accessed: Nov. 26, 2025. [Online]. Available: https://www.trendmicro.com/tr_tr/research/25/i/lockbit-5-targets-windows-linux-esxi.html

Frequently Asked Questions (FAQs)

Here are the most asked questions about LockBit.

What is LockBit ransomware?

LockBit is a prominent Ransomware-as-a-Service operation that has been active since 2019 and functions using an affiliate model. It employs a double extortion tactic where data is encrypted, and victims are threatened with public release if ransoms are not paid. The ransomware targets critical industries worldwide and is highly complex, featuring sophisticated anti-analysis and obfuscation techniques.

What is the current operational status of LockBit following the Operation Cronos takedown?

LockBit remains a potent cyber threat and has shown aggressive resilience despite the Operation Cronos law enforcement action in February 2024. The group resurfaced for its sixth anniversary in September 2025 by deploying LockBit 5.0. This latest version involves an evolving codebase that is considered significantly more dangerous than previous iterations.

How does LockBit 3.0 (LockBit Black) manage encryption keys?

LockBit 3.0 utilizes a layered key management hierarchy where file data is encrypted using a modified Salsa20 algorithm with a 64-byte key. This file encryption key is protected by a secondary Salsa20 key, which is then encrypted using a 1024-bit RSA public key. The system reuses the same key encryption key for 1,000 files to limit expensive RSA operations.

What specific anti-analysis techniques are used by LockBit 3.0?

LockBit 3.0 manually resolves Windows APIs using hashing to evade import tracking and builds trampoline code to complicate static analysis. The ransomware also performs checks on the Windows HEAP structure to detect debuggers and will attempt to crash the process if one is found. It further conceals threads and encrypts specific functions to trigger crashes during later attachment attempts.

How does the LockBit-NG-Dev prototype differ from previous versions?

LockBit-NG-Dev is written in .NET and compiled using CoreRT rather than C/C++ and is packed using MPRESS to evade detection. It relies on a JSON configuration decrypted at runtime to dictate operations like target dates and encryption modes. This variant also includes specific flags for terminating processes, deleting shadow copies, and removing forensic evidence via self-deletion.

What new evasion capabilities were introduced with LockBit 5.0?

LockBit 5.0 implements an invisible mode that encrypts files without changing extensions or timestamps to blend in with legitimate activity. It patches the EtwEventWrite API to disable Windows Event Tracing and utilizes a hardcoded list of service name hashes to terminate security tools. The malware also wipes all event logs using the EvtClearLog API after encryption completes.

Table of Contents

Ready to start? Request a demo