# Ransomware Spotlight: LockBit **[trendmicro.com/vinfo/us/security/news/ransomware-spotlight/ransomware-spotlight-lockbit](https://www.trendmicro.com/vinfo/us/security/news/ransomware-spotlight/ransomware-spotlight-lockbit)** LockBit By Trend Micro Research The LockBit intrusion set, tracked by Trend Micro as Water Selkie, has one of the most active ransomware operations today. With LockBit’s strong malware capabilities and affiliate program, organizations should keep abreast of its machinations to effectively spot risks and defend against attacks. ----- View infographic of "Ransomware Spotlight: LockBit" [LockBit first emerged as the ABCD ransomware on September 2019, which was improved to become one of the most prolific ransomware](https://www.trendmicro.com/vinfo/us/security/definition/ransomware) families today. Through their professional operations and strong affiliate program, LockBit operators proved that they were in it for the long haul. Thus, being acquainted with their tactics will help organizations fortify their defenses for current and future ransomware attacks. ## What do organizations need to know about LockBit? [LockBit uses a ransomware-as-a-service (RaaS) model and consistently conceived new ways to stay ahead of its competitors. Its double](https://www.trendmicro.com/vinfo/us/security/definition/ransomware-as-a-service-raas) extortion methods also adds more pressure to victims, raising the stakes of their campaigns. One of its notable tactics was the creation and use of the malware StealBit, which automates data exfiltration. This tool was seen with the release of [LockBit 2.0, the latest known version, which has been touted by its creators for having the fastest and most efficient encryption](https://www.trendmicro.com/en_us/research/21/h/lockbit-resurfaces-with-version-2-0-ransomware-detections-in-chi.html) among its competition. In October 2021, LockBit also expanded to Linux hosts, specifically ESXi servers, in its release of Linux-ESXI Locker version 1.0. This variant is capable of targeting Linux hosts and could have a big impact on targeted organizations. Another side of LockBit’s operations is its recruitment of and marketing to affiliates. It has been known to hire network access brokers, cooperate with other criminal groups (such as the now defunct Maze), recruit company insiders, and sponsor underground technical writing contests to recruit talented hackers. Using such tactics, the LockBit group has built itself into one of the most professional organized criminal gangs in the criminal underground. [The tactics we’ve enumerated are evident in their attack on Accenture in 2021. Experts suspect that an insider helped the group gain access to](https://www.zdnet.com/article/accenture-says-lockbit-ransomware-attack-caused-no-impact-on-operations-or-clients/) the firm’s network. LockBit also reportedly published a small part of the stolen data from the attack. ----- Figure 1. LockBit’s timeline of notable activities ## The impact of LockBit and insights from Water Selkie Our investigation into the intrusion set behind LockBit, which we track as Water Selkie, reveals the effectiveness and impact of the tactics we have discussed. The key takeaways are the following: **The malware’s performance is a strong selling point. The malware’s speed and capabilities are widely known because the group** uses them as selling points. The threat group’s efforts to publicize their malware’s capabilities have established it as the ransomware with one of the fastest and most efficient encryption methods. **It considers external pressures and issues faced by its potential targets. Water Selkie’s operators have indicated a preference for** victims in Europe who fear breaching EU’s General Data Protection Regulation (GDPR). They continue to also consider the US to have lucrative targets, but see that data privacy laws can affect their chances of getting a successful payout. In general, they are attuned to geopolitical issues that they can use to their advantage. **Banks on the strength of its affiliate program. As mentioned earlier, a contributing factor in LockBit’s success is how well it recruits** trustworthy and capable affiliates. Evidence also suggests that several of its affiliates are involved in multiple RaaS operations, which helps Water Selkie innovate and keep up with its competition. In return, Water Selkie prides itself on its professional operation that can be trusted by affiliates. **It has more in store for the future. Water Selkie clearly ramped up operations in the second half of 2021. We see that the intrusion set** will either maintain or increase their level of activity in the first half of 2022. Organizations should also expect more supply chain attacks [in the future according to an interview conducted with one of LockBit’s operators.](https://ke-la.com/lockbit-2-0-interview-with-russian-osint/) With LockBit affiliates being likely involved in other RaaS operations, its tactics slipping into those of other ransomware groups isn’t a farfetched notion. Organizations would therefore benefit from recognizing LockBit’s tactics, techniques, and procedures (TTPs) laid out in the next sections. ## Top affected industries and countries In this section, we discuss Trend Micro™ Smart Protection Network™ data, which are detections of LockBit attempts to compromise organizations. LockBit has been detected all over the globe, with the US seeing most of the attack attempts from June 2021 to January 20, 2022, followed by India and Brazil. Like many ransomware families LockBit avoids Commonwealth of Independent States (CIS) countries. ----- Figure 2. Countries with the highest number of attack attempts per machine for LockBit ransomware (July 1, 2021 to January 20, 2022) _Source: Trend Micro™ Smart Protection Network™ infrastructure_ We saw the most LockBit-related detections in the healthcare industry followed by the education sector. LockBit threat actors have [claimed](https://www.avertium.com/blog/an-in-depth-look-at-lockfile-and-lockbit) [that they do not attack healthcare, educational, and charity institutions. This “contradictory code of ethics,” has been noted by the US](https://www.healthcareitnews.com/news/hhs-cybersecurity-agency-sounds-alarm-lockbit-ransomware-variant) Department of Health Services (HHS) who warns the public not to rely on such statements as these tend to dissolve in the face of easy targets. Figure 3. Industries with the highest number of attack attempts per machine for LockBit ransomware (July 1, 2021 to January 20, 2022) _Source: Trend Micro Smart Protection Network infrastructure_ Overall, we saw increased LockBit-related activity following the release of LockBit 2.0, peaking in November 2021. ----- gu e oc t o t y detect o s pe ac e (Ju y, 0 to Ja ua y 0, 0 ) Source: Trend Micro Smart Protection Network infrastructure ## Targeted regions and sectors according to LockBit leak site In this section, we examine the number of attacks recorded on LockBit’s leak site, which represents successfully compromised organizations who, as of writing, have refused to pay ransom. In our foray into the leak site of LockBit operators from December 16, 2021 to January 15, [2022, we observed that they had the highest number of recorded victims among active ransomware groups at 41, followed by Conti at 29. Do](https://www.trendmicro.com/vinfo/us/security/news/ransomware-spotlight/ransomware-spotlight-conti) [note, however, that LockBit has been accused of artificially inflating the number of their victims.](https://www.lemagit.fr/actualites/252510802/Ransomware-comment-la-franchise-LockBit-20-gonfle-artificiellement-ses-chiffres) Looking into the list of their victims, it appears that more than half of the organizations are based in North America, followed by Europe and Asia Pacific. Figure 5. Regional distribution of LockBit victims according to the group’s leak site (December 16, 2021 to January 15, 2022) LockBit targets organizations indiscriminately, in that their victims come from many different sectors compared to other groups. In the abovementioned time period, they have victims coming from financial, professional services, manufacturing, and construction sectors, just to name a few. The majority of LockBit’s victims have been either small or small and medium-size businesses (SMBs) – 65.9% and 14.6% respectively, with enterprises only comprising 19.5%. That’s at odds with a group like Conti who victimized 44.8% of enterprises and 34.5% SMBs, and only victimized 20.7% of small businesses. Figure 6. Sector distribution of LockBit victims according to the group’s leak site (December 16, 2021 to January 15, 2022) In our observation of the activities within the LockBit leak site for the same time period, majority of attacks took place during weekdays, approximately 78% of the total, while 22% happened during the weekend. ## Infection chain and techniques Operating as a RaaS, LockBit infection chains show a variety of tactics and tools employed, depending on the affiliates involved in the attack. Affiliates typically buy access to targets from other threat actors, who typically obtain it via phishing, exploiting vulnerable apps, or brute forcing remote desktop protocol (RDP) accounts. Here are some of the observed infection flows of LockBit variants: ----- Figure 7. A LockBit 1.0 campaign that used PowerShell Empire to perform command and control after gaining access to the system Figure 8. A LockBit 1.0 campaign that used Microsoft RAS to access other systems Figure 9. A LockBit 1.0 campaign that used Meterpreter to perform command and control after gaining access to the system ----- Figure 10. A LockBit 1.0 campaign that did not involve any network scanning as it directly deployed the payload after gaining access to the system Figure 11. LockBit 2.0 infection chain that uses StealBit for automated data exfiltration **Initial Access** LockBit operators mostly gain access via compromised servers or RDP accounts that are usually bought or obtained from affiliates. In some instances, it arrived via spam email or by brute forcing insecure RDP or VPN credentials. It can also arrive via exploiting Fortinet VPN’s [CVE-2018-13379 vulnerability.](https://nvd.nist.gov/vuln/detail/CVE-2018-13379) **Execution** LockBit is usually executed via command line as it accepts parameters of file path or directories if desired to only encrypt specific paths. It may also be executed via created scheduled tasks. This is usually the case if it is propagated in other machines. There are also reports of it being executed using PowerShell Empire, a pure PowerShell post-exploitation agent. ----- Aside from using credentials obtained from affiliates. LockBit attacks were also observed using Mimikatz to further gather credentials. **Defense Evasion** Some infections were observed to have GMER, PC Hunter, and/or Process Hacker. These are tools that are usually used to disable security products. In some observed attacks, a Group Policy was created to disable Windows Defender. **Discovery** Network Scanner, Advanced Port Scanner, and AdFind were also used to enumerate connected machines in the network. Probably to locate the Domain Controller or Active Directory server as these are usually the best targets for deploying ransomware with network encryption or propagation. **Lateral Movement** LockBit can self-propagate via SMB connection using obtained credentials. Some samples can self-propagate and execute via Group Policy. In some instances, PsExec or Cobalt Strike were used to move laterally within the network. **Exfiltration** Uploads stolen files via cloud storage tools like MEGA or FreeFileSync. Sometimes, the StealBit malware (also sold by the threat actors) was used instead to exfiltrate stolen files. **Impact** The ransomware payload will proceed with encryption routine upon execution. Encryption includes both local and network encryption. It encrypts files using AES and encrypts AES key with RSA encryption. The AES Key is generated using BCryptGenRandom. For faster encryption, it only encrypts the first 4KB of a file and appends it to “.lockbit.” It will also replace the desktop wallpaper with a note that includes a statement where it tries to recruit insiders or affiliates within companies. ----- gu e Sa p e a pape used by oc t LockBit also sends a WoL packet to ensure that network drives are active for its network encryption; this behavior was first observed on the [Ryuk ransomware.](https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/addressing-threats-like-ryuk-via-trend-micro-xdr) LockBit also has the capability to print its ransom note using connected printers using WinSpool APIs, which is probably inspired by [Egregor ransomware.](https://www.trendmicro.com/en_ph/research/20/l/egregor-ransomware-launches-string-of-high-profile-attacks-to-en.html) ## MITRE tactics and techniques **Initial** **Access** **Execution** **Persistence** **Privilege Escalation** **Defense Evasion** **Discovery** **Lateral** **Movement** **Exfiltrat** **T1566 -** Phishing _Arrives via_ _phishing_ _emails_ **T1190 -** Exploit public-facing application _Arrives via_ _any the_ _following_ _exploits:•_ _CVE-2018-_ _13379_ **T1078 - Valid** accounts _Has been_ _reported to_ _make use of_ _compromised_ _accounts to_ _access_ _victims via_ _RDP or VPN_ **T1106 -** Execution through API _Uses native_ _API to_ _execute_ _various_ _commands/_ _routines_ **T1059 -** Command and scripting interpreter _Uses_ _various_ _scripting_ _interpreters_ _like_ _PowerShell_ _and_ _Windows_ _command_ _shell_ **T1204 -** User execution _User_ _execution is_ _needed to_ _carry out_ _the payload_ _from the_ _spear_ _phishing_ _link or_ _attachments_ **T1547 -** Boot or logon autostart execution _Creates_ _registry run_ _entries_ **T1134 - Access token** manipulation _Use AdjustTokenPrivilege_ _API to modify token attribute_ _to_ _SE_PRIVILEGE_ENABLED_ **T1548 - Abuse Elevation** Control Mechanism _Makes use of_ _ucmDccwCOMMethod in_ _UACME, a github collection_ _of UAC bypass techniques_ **T1140 - Deobfuscate/Decode** Files or Information _Strings to be used_ _throughout the routine are_ _encrypted using XOR or_ _Subtraction._ **T1562 - Impair defenses** _Disables security related_ _services via terminating_ _them. May include using_ _tools like PC Hunter, Process_ _Hacker, KillAV/KillProc_ **T1574 - Hijack execution flow** _DLL side-loading can also be_ _used as a form of defense_ _evasion_ **T1218 - Signed Binary Proxy** Execution _Executes mshta to open the_ _ransom note_ **T1484 - Domain Policy** Modification _It releases group policy_ _update that will be able to_ _terminate AV tools and_ _create scheduled tasks to_ _execute the propagated_ _copies via SMB_ **T1070 - Indicator Removal** on Host _It is capable of deleting_ _Windows event logs and its_ _executable file to remove_ _traces_ **T1083 -** File and directory discovery _Searches_ _for specific_ _files and_ _directory_ _related to_ _its_ _encryption_ **T1135 -** Network Share Discovery _Enumerate_ _network_ _share for_ _its network_ _encryption_ **T1018** - Remote system discovery _Makes use_ _of tools for_ _network_ _scans_ **T1057** - Process discovery _Discovers_ _certain_ _processes_ _for process_ _termination_ **T1570 -** Lateral tool transfer _Can make_ _use of RDP,_ _SMB admin_ _shares, or_ _PsExec to_ _transfer the_ _ransomware_ _or tools_ _within the_ _network_ **T1567 -** Exfiltrati over web service _Syncs fil_ _a specifi_ _cloud_ _storage,_ _such as_ _MegaSy_ _FreeFile_ **T1041** - Exfiltra Over C2 Channel _Exfiltrati_ _using_ _StealBit_ ## Summary of malware, tools, and exploits used Security teams can watch out for the presence of the following malware tools and exploits that are typically used in LockBit attacks: **Initial Entry** **Execution** **Discovery** **Lateral** **Movement** **Defense Evasion** **Exfiltration** Phishing emails RDP/Valid accounts Exploit: CVE-201813379 ## Recommendations Scheduled tasks Windows commandline Network Scanner Group Policy SMB PsExec KillAV/KillProc PC Hunter Process Hacker StealBit FreeFileSync MegaSync ----- s e t o ed ea e, e e pect t e oc t to co t ue ts e e o act ty, ot c ease t t e co g o t s o ou d scuss o, LockBit also demonstrates both consistent and versatile operations that adapt to current trends that affect the threat landscape. Organizations therefore should also keep abreast of the latest shifts that could influence their own security measures. To help defend systems against similar threats, organizations can establish security frameworks that can allocate resources systematically for establishing a solid defense against ransomware. Here are some best practices that can be included in these frameworks: **Audit and inventory** Take an inventory of assets and data Identify authorized and unauthorized devices and software Make an audit of event and incident logs **Configure and monitor** Manage hardware and software configurations Grant admin privileges and access only when necessary to an employee’s role Monitor network ports, protocols, and services Activate security configurations on network infrastructure devices such as firewalls and routers Establish a software allow list that only executes legitimate applications **Patch and update** Conduct regular vulnerability assessments Perform patching or virtual patching for operating systems and applications Update software and applications to their latest versions **Protect and recover** Implement data protection, backup, and recovery measures Enable multifactor authentication (MFA) **Secure and defend** Employ sandbox analysis to block malicious emails Deploy the latest versions of security solutions to all layers of the system, including email, endpoint, web, and network Detect early signs of an attack such as the presence of suspicious tools in the system Use advanced detection technologies such as those powered by AI and machine learning **Train and test** Regularly train and assess employees on security skills Conduct red-team exercises and penetration tests A multilayered approach can help organizations guard the possible entry points into the system (endpoint, email, web, and network). Security solutions can detect malicious components and suspicious behavior could help protect enterprises. [Trend Micro Vision One™ provides multilayered protection and behavior detection, which helps block questionable behavior and tools](https://www.trendmicro.com/en_us/business/products/detection-response.html) early on before the ransomware can do irreversible damage to the system. [Trend Micro Cloud One™ Workload Security protects systems against both known and unknown threats that exploit vulnerabilities. This](https://www.trendmicro.com/en_us/business/products/hybrid-cloud/cloud-one-workload-security.html) protection is made possible through techniques such as virtual patching and machine learning. [Trend Micro™ Deep Discovery™ Email Inspector employs custom sandboxing and advanced analysis techniques to effectively block](https://www.trendmicro.com/en_us/business/products/user-protection/sps/email-and-collaboration/email-inspector.html) malicious emails, including phishing emails that can serve as entry points for ransomware. ----- e d c o pe O e o e s e t e e auto ated t eat detect o a d espo se aga st ad a ced co ce s suc as e ess t eats and ransomware, ensuring the protection of endpoints. ## Indicators of Compromise (IOCs) The IOCs for this article can be found [here. Actual indicators might vary per attack.](https://documents.trendmicro.com/images/TEx/articles/iocs_lockbit_spotlightt0LVE8b.txt) -----