LockBit Ransomware Gang
By Suleyman Ozarslan, PhD August 22, 2022 Ransomware
LockBit is a prominent ransomware group known for technically advanced and high impact variants. Formerly called the ABCD group, LockBit operates a Ransomware as a Service model that recruits affiliates and accelerates development through public bug bounty style programmes. The group advertises itself as the fastest encrypting ransomware in the market, a claim that attracts a large affiliate base and increases the volume of attacks. LockBit relies on double extortion, which combines data theft with file encryption to pressure victims into payment. High profile incidents have included Accenture, the Ministry of Justice in France, and Bangkok Airways.
LockBit affiliates use a broad playbook. Initial access often comes from phishing, exposed remote services, valid accounts purchased from initial access brokers, or exploitation of known vulnerabilities. Once inside a network, operators perform discovery, move laterally, and escalate privileges using living off the land binaries and common admin tools. Many intrusions include the theft of credentials, the disabling of security software, and the removal of backups or shadow copies to maximise impact. LockBit variants support Windows, Linux, and VMware ESXi, which allows encryption across mixed environments. The operation maintains a leak site for publishing stolen data and manages negotiations through structured playbooks. Organisations can reduce risk by enforcing multi factor authentication, hardening remote access, patching exposed services, segmenting critical assets, monitoring for data exfiltration, and continuously validating controls against real attacker techniques.

Associated Groups |
Aliases - ABCD, Bitwise Spider, Water Selkie |
Associated Country |
Russia |
First Seen |
September 2019 |
Target Sectors |
Education, Energy, Financial Services, Government, Healthcare, Legal, Manufacturing, Retail, Technology,Telecommunication, Transportation |
Target Countries |
United States, Italy, Australia, Brazil, France, India, Mexico, Morocco, Taiwan, United Arab Emirates, United Kingdom |

Business Models |
Ransomware-as-a-service (RaaS) Double Extortion Initial Access Brokers (IABs) Company Insiders Criminal Bug Bounty |
Extortion Tactics |
File Encryption Data Leakage |
Initial Access Methods |
Exploit Public-Facing Application Phishing |
Impact Methods |
Data Encryption Data Exfiltration |

Application |
Vulnerability |
CVV |
CVSS |
Microsoft Exchange |
ProxyShell RCE |
9.8 Critical |
|
Microsoft Exchange |
ProxyShell Privilege Escalation |
9.8 Critical |
|
Microsoft Exchange |
ProxyShell Security Feature Bypass |
7.2 High |
|
F5 BIG-IP |
iControl REST API RCE |
8.8 High |
|
Fortinet FortiGate SSL VPN |
Path Traversal |
9.8 Critical |
|
SonicWall SSLVPN |
SQL Injection |
9.8 Critical |

MITRE ATT&CK Tactic |
Tools |
Execution |
PowerShell PowerShell Empire PSExec Windows Task Scheduler Windows Command Shell |
Persistence |
Reg.exe |
Privilege Execution |
UACme |
Defence Evasion |
GMER GPEdit.msc Invoke-GPUpdate mshta Process Hacker wewtutil |
Credential Access |
Comsvcs.dll Minidump Hakops Keylogger Mimikatz |
Discovery |
ADfind.exe Advanced Port Scanner PsGetSi |
Lateral Movement |
PSExec |
Command and Control |
AnyDesk Metasploit Meterpreter |
Exflitration |
Mega StealBit infostealer malware |
Impact |
LockBit ransomware Vssadmin BCDEdit |
-
[1] S. Özarslan, “MITRE ATT&CK T1086 PowerShell.” https://www.picussecurity.com/resource/blog/picus-10-critical-mitre-attck-techniques-t1086-powershell (accessed Jul. 06, 2022).
-
[2] “GitHub - EmpireProject/Empire: Empire is a PowerShell and Python post-exploitation agent,” GitHub. https://github.com/EmpireProject/Empire (accessed Jul. 06, 2022).
-
[3] “PsExec - Windows Sysinternals.” https://docs.microsoft.com/en-us/sysinternals/downloads/psexec (accessed Jul. 06, 2022).
-
[4] S. Özarslan, “MITRE ATT&CK T1053 Scheduled Task.” https://www.picussecurity.com/resource/blog/picus-10-critical-mitre-attck-techniques-1053-scheduled-task (accessed Jul. 06, 2022).
-
[5] H. C. Yüceel, “T1059 Command and Scripting Interpreter of the MITRE ATT&CK Framework.” https://www.picussecurity.com/resource/t1059-command-and-scripting-interpreter-of-the-mitre-attck-framework (accessed Jul. 06, 2022).
-
[6] S. Özarslan, “MITRE ATT&CK T1060 Registry Run Keys / Startup Folder.” https://www.picussecurity.com/resource/blog/picus-10-critical-mitre-attck-techniques-t1060-registry-run-keys-startup-folder (accessed Jul. 06, 2022).
-
[7] “GitHub - hfiref0x/UACME: Defeating Windows User Account Control,” GitHub. https://github.com/hfiref0x/UACME (accessed Jul. 06, 2022).
-
[8] “GMER - Rootkit Detector and Remover.” http://www.gmer.net (accessed Jul. 06, 2022).
-
[9] “Website.” [Online]. Available: https://raw.githubusercontent.com/DISREL/Conti-Leaked-Playbook-TTPs/main/Conti-Leaked-Playbook-TTPs.pdf
-
[10] JasonGerend, “Invoke-GPUpdate.” https://docs.microsoft.com/en-us/powershell/module/grouppolicy/invoke-gpupdate (accessed Jul. 06, 2022).
-
[11] H. C. Yüceel, “T1218 Signed Binary Proxy Execution of the MITRE ATT&CK Framework.” https://www.picussecurity.com/resource/t1218-signed-binary-proxy-execution-of-the-mitre-attck-framework (accessed Jul. 06, 2022).
-
[12] P. Hacker, “Process Hacker.” https://processhacker.sourceforge.io (accessed Jul. 06, 2022).
-
[13] H. C. Yüceel, “Lockbit 2.0 Ransomware: TTPs Used in Emerging Ransomware Campaigns.” https://www.picussecurity.com/resource/lockbit-2.0-ransomware-ttps-used-in-emerging-ransomware-campaigns (accessed Jul. 06, 2022).
-
[14] S. Özarslan, “MITRE ATT&CK T1003 Credential Dumping.” https://www.picussecurity.com/resource/blog/picus-10-critical-mitre-attck-techniques-t1003-credential-dumping (accessed Jul. 05, 2022).
-
[15] “HAKOPS Keylogger 16 - 12.04.2018,” TurkHackTeam, Apr. 12, 2018. https://www.turkhackteam.org/konular/hakops-keylogger-16-12-04-2018.1699779/ (accessed Jul. 06, 2022).
-
[16] “GitHub - gentilkiwi/mimikatz: A little tool to play with Windows security,” GitHub. https://github.com/gentilkiwi/mimikatz (accessed Jul. 06, 2022).
-
[17] “AdFind.” http://www.joeware.net/freetools/tools/adfind/index.htm (accessed Jul. 06, 2022).
-
[18] “Advanced Port Scanner – free and fast port scanner.” https://www.advanced-port-scanner.com (accessed Jul. 06, 2022).
-
[19] “PsGetSid - Windows Sysinternals.” https://docs.microsoft.com/en-us/sysinternals/downloads/psgetsid (accessed Jul. 06, 2022).
-
[20] “The Fast Remote Desktop Application –,” AnyDesk. https://anydesk.com/en (accessed Jul. 06, 2022).
-
[21] “Metasploit,” Metasploit. https://www.metasploit.com/ (accessed Jul. 06, 2022).
-
[22] “MEGA.” https://mega.io/ (accessed Jul. 06, 2022).
-
[23] F. Fkie, “StealBit (Malware Family).” https://malpedia.caad.fkie.fraunhofer.de/details/win.stealbit (accessed Jul. 06, 2022).
-
[24] H. C. Yüceel, “MITRE ATT&CK T1490 Inhibit System Recovery - The Ransomware’s Favorite.” https://www.picussecurity.com/resource/mitre-attck-t1490-inhibit-system-recovery-the-ransomwares-favorite (accessed Jul. 06, 2022).