LockBit ransomware secretly building next-gen encryptor before takedown

  • February 22, 2024
  •  
  • 08:51 AM
  •  
  • 0

LockBit ransomware secretly building next-gen encryptor before takedown

LockBit ransomware developers were secretly building a new version of their file encrypting malware, dubbed LockBit-NG-Dev - likely to become LockBit 4.0, when law enforcement took down the cybercriminal's infrastructure earlier this week.

As a result of the collaboration with the National Crime Agency in the UK, cybersecurity company Trend Micro analyzed a sample of the latest LockBit development that can work on multiple operating systems.

LockBit next-gen

While previous LockBit malware is built in C/C++, the latest sample is a work-in-progress written in .NET that appears to be compiled with CoreRT, and packed with MPRESS.

Trend Micro says that the malware includes a configuration file in JSON format that outlines the execution parameters such as execution date range, ransom note details, unique IDs, RSA public key, and other operational flags.

Encrypted configuration
Decrypted configuration (Trend Micro)

Although the security firm says the new encryptor lacks some features present in previous iterations (e.g. ability to self-propagate on breached networks, printing ransom notes on victim's printers), it appears to be in its final development stages, already offering most of the expected functionality.

It supports three encryption modes (using AES+RSA), namely "fast," "intermittent," and "full," has custom file or directory exclusion, and can randomize the file naming to complicate restoration efforts.

File encrypted in the intermittent mode
File encrypted in the intermittent mode (Trend Micro)

Additional options include a self-delete mechanism that overwrites LockBit's own file contents with null bytes.

Trend Micro has published a deeply technical analysis of the malware, which reveals the full configuration parameters for LockBit-NG-Dev.

The discovery of the new LockBit encrypter is another blow law enforcement dealt to LockBit operators through Operation Cronos. Even if backup servers are still controlled by the gang, restoring the cybercriminal business should be a tough challenge when the source code for the encrypting malware is known to security researchers.

البحث
الأقسام
إقرأ المزيد
Ever downloaded say 700 "T's" and need to ZIP all Folder/Files?
You must have 7zip installed...Create a Folder for your downloadsThen create a new text file and...
بواسطة AFFA 2024-02-22 20:22:38 0 128
SECURITY Microsoft reveals how hackers breached its Exchange Online accounts
January 26, 2024   10:23 AM   0 Microsoft confirmed that the...
بواسطة AFFA 2024-01-26 17:13:30 0 179
Microsoft: April Windows Server updates cause NTLM auth failures
May 1, 2024   11:17 AM   0 Microsoft has confirmed customer...
بواسطة AFFA 2024-05-01 15:28:05 0 27
Microsoft pulls Edge update causing 'Out of Memory' crashes
March 1, 2024   10:44 AM   0 Microsoft has pulled the Microsoft...
بواسطة AFFA 2024-03-01 18:55:33 0 114
Hackers poison source code from largest Discord bot platform
March 25, 2024   02:00 PM   0 The Top.gg Discord bot community...
بواسطة AFFA 2024-03-26 14:53:43 0 77