# LockBit 2.0: How This RaaS Operates and How to Protect Against It **unit42.paloaltonetworks.com/lockbit-2-ransomware/** Amer Elsad, JR Gumarin, Abigail Barr June 9, 2022 By [Amer Elsad,](https://unit42.paloaltonetworks.com/author/amer-elsad/) [JR Gumarin and](https://unit42.paloaltonetworks.com/author/jr-gumarin/) [Abigail Barr](https://unit42.paloaltonetworks.com/author/abigail-barr/) June 9, 2022 at 6:00 AM [Category: Ransomware,](https://unit42.paloaltonetworks.com/category/ransomware/) [Threat Briefs and Assessments](https://unit42.paloaltonetworks.com/category/threat-briefs-assessments/) Tags: [LockBit 2.0,](https://unit42.paloaltonetworks.com/tag/lockbit-2-0/) [RaaS](https://unit42.paloaltonetworks.com/tag/raas/) This post is also available in: 日本語 [(Japanese)](https://unit42.paloaltonetworks.jp/lockbit-2-ransomware/) ## Executive Summary LockBit 2.0 is ransomware as a service (RaaS) that first emerged in June 2021 as an upgrade to its predecessor LockBit (aka ABCD Ransomware), which was first observed in September 2019. Since its inception, the LockBit 2.0 RaaS attracted affiliates via recruitment campaigns in underground forums, and thus became particularly prolific during the third quarter of calendar year 2021. The LockBit 2.0 operators claimed to have the fastest encryption software of any ----- active ransomware strain as of June 2021, claiming accordingly that this added to its effectiveness and ability to disrupt the ransomware landscape. [While several top-tier RaaS affiliate programs, such as Babuk, DarkSide and](https://unit42.paloaltonetworks.com/darkside-ransomware/) [REvil (aka](https://unit42.paloaltonetworks.com/revil-threat-actors/) Sodinokibi) disappeared from the underground in 2021, LockBit 2.0 continued to operate and gradually became one of the most active ransomware operations. While Conti was recognized as being the most prolific ransomware deployed in 2021 per our 2022 Unit 42 Ransomware Threat Report, LockBit 2.0 is the most impactful and widely deployed ransomware variant we have observed in all ransomware breaches during the first quarter of 2022, considering both leak site data and data from cases handled by Unit 42 incident responders. According to data analysis of ransomware groups’ dark web leak sites, LockBit 2.0 was the most impactful RaaS for five consecutive months. As of May 25, LockBit 2.0 accounted for 46% of all ransomware-related breach events for 2022. And the LockBit 2.0 RaaS leak site has the most significant number of published victims, with over 850 in total. Additionally, LockBit 2.0 has affected many companies globally, with top victims based in the U.S., Italy and Germany. Its most highly targeted industry verticals include professional services, construction, wholesale and retail, and manufacturing. Palo Alto Networks customers receive protections against LockBit 2.0 attacks from Cortex XDR, as well as from the WildFire cloud-delivered security subscription for the NextGeneration Firewall. (Please see the Conclusion section for more detail.) Related Unit 42 Topics [Ransomware,](https://unit42.paloaltonetworks.com/category/ransomware/) [Ransomware Threat Report](https://unit42.paloaltonetworks.com/2022-ransomware-threat-report-highlights/) ## Table of Contents LockBit 2.0 Overview Victimology Leak Site Data Unit 42 Incident Response Data on LockBit 2.0 LockBit 2.0 Tactics, Techniques and Procedures LockBit 2.0 Technical Details LockBit 3.0 Courses of Action Conclusion Appendix A Additional Resources ## LockBit 2.0 Overview ----- LockBit 2.0 is another example of RaaS that leverages double extortion techniques as part of the attack to pressure victims into paying the ransom. In some cases, LockBit 2.0 operators have performed DDoS attacks on the victims' infrastructure as well as using a leak site. This practice is known as triple extortion, a tactic observed in groups like BlackCat, Avaddon and SunCrypt in the past. [Like other ransomware families such as BlackByte, LockBit 2.0 avoids systems that use](https://unit42.paloaltonetworks.com/blackbyte-ransomware/) Eastern European languages, including many written with Cyrillic alphabets. Unlike other RaaS programs that don't require the affiliates to be super technical or savvy, LockBit 2.0 operators allegedly only work with experienced penetration testers, especially [those experienced with tools like Metasploit and Cobalt Strike. Affiliates are tasked with](https://unit42.paloaltonetworks.com/tag/cobalt-strike/) gaining initial access to the victim network, allowing LockBit 2.0 to conduct the rest of the attack. LockBit 2.0 has been observed changing infected computers’ backgrounds to a ransomware note. The ransomware note was also used to recruit insiders from victim organizations. The notes claimed the threat actors would pay “millions of dollars” to insiders who provided access to corporate networks or facilitated a ransomware infection by opening a phishing email and/or launching a payload manually. The threat actors also expressed interest in other access methods such as RDP, VPN and corporate email credentials. In exchange, they offer a cut of the paid ransom. ### Victimology LockBit 2.0 targets organizations opportunistically. The operators work with initial access brokers to save time and allow for a larger profit potential. While typically seeking victims of opportunity, LockBit 2.0 does appear to have victim limitations. The group announced that they would not target healthcare facilities, social services, educational institutions, charitable organizations and other organizations that “contribute to the survival of the human race”. However, despite these claims, there have been instances of affiliates undermining these guidelines by still opting to attack industry verticals such as healthcare and education. Organizations in Europe and the U.S. are hit more often by LockBit 2.0 than those in other countries, likely due to the high profitability and insurance payouts. ### Leak Site Data During the first calendar year quarter of 2022, LockBit 2.0 persisted as the most impactful and the most deployed ransomware variant we observed in all ransomware breaches shared on leak sites. ----- Figure 1. Ransomware leak site data from the first calendar year quarter of 2022. According to leak site data analysis, LockBit 2.0 was the most impactful RaaS for five consecutive months. As of May 25, LockBit 2.0 accounted for 46% of all ransomware-related breach events for 2022 shared on leak sites. Additionally, the LockBit 2.0 RaaS leak site has the most significant number of published victims, with over 850 in total. The site itself typically features information such as victim domains, a time tracker and measures of how much data was compromised. ----- Figure 2. LockBit 2.0 leak site extortion site. LockBit 2.0 [claims that they have demanded ransom from at least 12,125 companies, as](https://twitter.com/vxunderground/status/1523323798266785792) shown in the figure below. ----- Figure 3. Source: VX-underground. According to leak site data for LockBit 2.0, since its inception in June 2021, the RaaS has affected many companies globally, with top victims based in the U.S., Italy and Germany. Figure 4. LockBit 2.0 geographical impact chart. LockBit 2.0 has also impacted various victims across multiple industry verticals. Its most highly targeted industry verticals include professional services, construction, wholesale and retail and manufacturing. ----- Figure 5. LockBit 2.0 impacted industry vertical chart. When looking at leak site data across all ransomware families, we’ve observed LockBit 2.0 targeting the highest number of organizations in the following regions: JAPAC, EMEA, and LATAM. ### Unit 42 Incident Response Data on LockBit 2.0 Cases handled by Unit 42 security consultants involving LockBit 2.0 since its appearance in June 2021 demonstrate shorter dwell times and less flexibility in negotiation in the beginning of FY 2022 (measured October-September) in comparison to the end of FY 2021. The following data is broken into fiscal years and quarters based on when the threat actor breached the network, not when the activity was noticed by a client. LockBit 2.0 has shown a decrease in dwell time in FY 2022. From the last two quarters of FY 2021 to the first two quarters of FY 2022, there has been an average 37-day difference. ----- Figure 6. LockBit 2.0 average dwell time by fiscal quarter. The difference in initial and final ransom demands over the past fiscal year has been converted to percentages and then averaged. The graph below demonstrates that at the end of FY 2021, threat actors using LockBit 2.0 were much more open to negotiations of ransom amounts; during that time the ransom was dropped approximately 83% from the initial ask on average. In comparison, we see less flexibility in FY 2022 Q1 and Q3 – threat actors only offered an average of about 30% as a price drop. FY 2022 Q2 is not included due to lack of sufficient information. ----- Figure 7. LockBit 2.0 average difference in initial vs final ransom amount, shown as percentages. ## LockBit 2.0 Tactics, Techniques and Procedures Technically speaking, we have observed LockBit 2.0 affiliates leveraging the following tactics, techniques and procedures: **TA0001 Initial** **Access** T1078 Valid Accounts T1133 External Remote Services T1190 Exploit PublicFacing Applications **TA0002 Execution** T1053.005 Scheduled Task/Job Credentials that have either been reused across multiple platforms or have previously been exposed. Additionally, this includes VPN accounts – not just domain and local accounts. Affiliates have been seen brute forcing exposed RDP services and compromising accounts with weak passwords. Vulnerabilities such as ProxyShell (CVE-2021-34473) and improper SQL sanitization (CVE-2021-20028) have been observed being utilized as footholds into the environment. Scheduled Task. LockBit 2.0 can be executed via scheduled tasks. ----- T1059 Command and Scripting Interpreter **TA0003 Persistence** T1053.005 Scheduled Task/Job T1078 Valid Accounts T1136.001 Create Account T1505.003 Server Software Component **TA0004 Privilege** **Escalation** T1068 Exploitation for Privilege Escalation T1548.002 Abuse Elevation Control Mechanism: Bypass User Account Control **TA0005 Defense** **Evasion** T1070 Indicator Removal on Host T1140 Deobfuscate/Decode Files or Information LockBit 2.0 is typically executed via command line arguments via a hidden window. Windows SysInternals PsExec has been utilized for both persistence and execution purposes. Its ability to execute processes on other systems spread the ransomware and assisted in reconnaissance activities. Scheduled Task. It was quite common to see scheduled tasks used to create persistence for the ransomware executable, PsExec, and occasionally some defense evasion batch scripts. Compromised accounts may be used to maintain access to the network. In rare cases, LockBit 2.0 has been observed to create accounts for persistence with simple names, such as “a.” With the upsurgence of ProxyShell, webshells have become more common entry points. The ProxyShell elevation of privilege on the Exchange PowerShell Backend (CVE-2021-34523), Windows Background Intelligent Transfer Service (BITS) improperly handling symbolic links (CVE2020-0787), and abusing the CMSTPLUA COM interface have all been seen as methods of privilege escalation. LockBit 2.0 has utilized a UAC bypass tool. Indicators, such as logs in Windows Event Logs or malicious files, are typically removed using wevtutil, a batch script, or CCleaner. Most PowerShell scripts involved in LockBit 2.0 cases are Base64 encoded. ----- T1484.001 Domain Policy Modification: Group Policy Modification T1562.001 Impair Defenses: Disable or Modify Tools T1564.003 Hide Artifacts: Hidden Window **TA0006 Credential** **Access** T1003 OS Credential Dumping T1555 Credentials from Password Stores **TA0007 Discovery** T1046 Network Service Discovery T1057 Process Discovery T1082 System Information Discovery T1614 System Location Discovery **TA00008 Lateral** **Movement** T1021 Remote Services LockBit 2.0 has been seen using the PowerShell module InvokeGPUpdate to update the group policy. Windows Defender, other anti-malware solutions and monitoring tools are disabled utilizing a process explorer tool, a batch script or a specially crafted command line script. Affiliates use hidden windows to hide malicious activity from plain sight. As seen with other ransomware cases, Mimikatz is a key player in dumping credentials but LockBit 2.0 has been occasionally seen utilizing MiniDump as well. LockBit 2.0 has been seen utilizing numerous tools to dump passwords from password stores and Chrome using GrabChrome and GrabRFF. Both Advanced Port Scanner and NetScan have been used to discover local network infrastructure devices and services running on remote hosts. Active Directory queries for remote systems have been performed by ADFind. Process Explorer, Process Monitor and PCHunter have been utilized to discover any anti-malware or monitoring software and terminate it. LockBit 2.0 enumerates system information such as hostname, shares, and domain information. Attempts to check the language settings. Although Cobalt Strike has many capabilities beneficial to threat actors in ransomware attacks, it was mainly seen in LockBit 2.0 investigations acting as a command and control beacon, a method of lateral movement and a tool for downloading/executing files. ----- T1021.002 Remote Services: SMB/Windows Admin Shares **TA0010 Exfiltration** T1030 Data Transfer Size Limits T1041 Exfiltration over C2 Channel **TA0011 Command** **and Control** T1219 Remote Access Software **TA0040 Impact** T1486 Data Encrypted for Impact LockBit 2.0 has been known to self-propagate via SMB. In some cases, LockBit 2.0 will limit the data transfer sizes to fly under the radar of any monitoring services a client may have set up. MEGASync is the leading way for LockBit 2.0 affiliates to exfiltrate data from clients with it being occasionally replaced by RClone. AnyDesk has been the most common legitimate desktop software used to establish an interactive command and control channel, with ConnectWise seen slightly less frequently. LockBit 2.0 is known for its extortion tactics, encrypting devices and demanding a ransom. T1489 Service Stop During the defense evasion phase, anti-malware and monitoring software is often disabled. Firewall rules have occasionally been seen being disabled as well. ## LockBit 2.0 Technical Details LockBit 2.0 was developed using the Assembly and Origin C programming languages and leverages advanced encryption standard (AES) and elliptic-curve cryptography (ECC) algorithms to encrypt victim data. It can affect both Windows and Linux OS, as the operator released a Linux version of LockBit 2.0 to target VMware ESXi hypervisor systems in October 2021, coded exclusively in the C programming language. The LockBit group claimed that LockBit 2.0 is “the fastest encryption software all over the world” and provided a comparative table showing the encryption speed of various ransomware samples. ----- Figure 8. LockBit encryption comparative table | Source: LockBit blog. LockBit 2.0 also contains a self-spreading feature, clears logs and can print the ransom note on network printers until the paper runs out. A management panel that affiliates can use to manage victims and affiliate accounts, generate new ransomware builds and generate the decryptor if the demanded ransom is paid also exists. ----- Figure 9. LockBit 2.0 management panel. Source: ProDaft. LockBit 2.0 operators also released an information-stealer dubbed StealBit, which was developed to support affiliates of the LockBit 2.0 RaaS when exfiltrating data from breached companies. StealBit contains the following capabilities: Operates as a file grabber and dumps/uploads victim data to the LockBit victimshaming site. No reliance on third-party cloud file-sharing services, where data can be easily removed if the victim submitted a complaint. The download speed is limited only by internet connection bandwidth, so it is possible to clone folders from corporate networks and upload them to the LockBit victim shaming blog quickly. The operator of LockBit 2.0 has provided a comparative table speed showing the information stealer compared to other tools. Figure 10. LockBit 2.0 download speed, according to LockBit 2.0 operator. ----- ## LockBit 3.0 There was a bug that existed in LockBit 2.0 that allowed researchers to revert the encryption process on an MSSQL database. After the bug’s disclosure, LockBit forum members discussed how the bug will not exist in LockBit’s next iteration. Moreover, on March 17, LockBit forum members mentioned the release of LockBit’s next version in one or two weeks. [On March 25, VX underground posted a tweet with details of this new version, dubbed](https://twitter.com/vxunderground/status/1528801206923141122) LockBit Black. Figure 11. LockBit Black post-infection desktop wallpaper (Source: VX-underground). ## Courses of Action Several adversarial techniques were observed in this activity and the following measures are suggested within Palo Alto Networks products and services to ensure mitigation of threats related to LockBit 2.0 ransomware, as well as other malware using similar techniques: **Product / Service** **Course of Action** **Initial Access, Execution, Persistence, Privilege Escalation,** **Defense Evasion** ----- The courses of action below mitigate the following techniques: [Exploit Public-Facing Application [T1190], Command and Scripting](https://attack.mitre.org/techniques/T1190) [Interpreter [T1059], Local Account [T1136.001], Web Shell](https://attack.mitre.org/techniques/T1059) [[T1505.003], Exploitation for Privilege Escalation [T1068], Indicator](https://attack.mitre.org/techniques/T1505/003) [Removal on Host [T1070], Deobfuscate/Decode Files or Information](https://attack.mitre.org/techniques/T1070) [[T1140], Disable or Modify Tools [T1562.001], Hidden Window](https://attack.mitre.org/techniques/T1140) [[T1564.003], Valid Accounts [T1078], External Remote Services](https://attack.mitre.org/techniques/T1564/003) [[T1133], Scheduled Task [T1053.005], Bypass User Account Control](https://attack.mitre.org/techniques/T1133) [[T1548.002], Group Policy Modification [T1484.001]](https://attack.mitre.org/techniques/T1548/002) THREAT PREVENTION Ensure a secure Vulnerability Protection Profile is applied to all security rules allowing traffic Ensure a Vulnerability Protection Profile is set to block attacks against critical and high vulnerabilities, and set to default on medium, low, and informational vulnerabilities Ensure DNS sinkholing is configured on all anti-spyware profiles in use Ensure an anti-spyware profile is configured to block on all spyware severity levels, categories, and threats Ensure a secure anti-spyware profile is applied to all security policies permitting traffic to the internet Ensure passive DNS monitoring is set to enabled on all anti-spyware profiles in use CORTEX XSOAR Deploy XSOAR Playbook Cortex XDR - Isolate Endpoint Deploy XSOAR Playbook - Block Account Generic Deploy XSOAR Playbook - Access Investigation Playbook Deploy XSOAR Playbook - Impossible Traveler NEXT-GENERATION FIREWALLS Ensure 'Service setting of ANY' in a security policy allowing traffic does not exist ----- Ensure application security policies exist when allowing traffic from an untrusted zone to a more trusted zone Ensure 'Security Policy' denying any/all traffic to/from IP addresses on Trusted Threat Intelligence Sources Exists Ensure that the User-ID service account does not have interactive logon rights Define at least one 'Include Network'. Ensure that User-ID is only enabled for internal trusted interfaces Ensure that 'Include/Exclude Networks' is used if User-ID is enabled Ensure remote access capabilities for the User-ID service account are forbidden. Ensure that the User-ID Agent has minimal permissions if User-ID is enabled CORTEX XDR PREVENT Enable AntiMalware Protection Enable Anti-Exploit Protection Configure Host Firewall Profile Configure Behavioral Threat Protection under the Malware Security Profile **Credential Access** The courses of action below mitigate the following techniques: [OS Credential Dumping [T1003], Credentials from Password Stores](https://attack.mitre.org/techniques/T1003) [[T1555]](https://attack.mitre.org/techniques/T1555) CORTEX XDR PREVENT Enable AntiExploit Protection Enable Anti-Malware Protection **Discovery** The below courses of action mitigate the following techniques: [Network Service Scanning [T1046], Process Discovery [T1057],](https://attack.mitre.org/techniques/T1046) [System Location Discovery [T1614], System Information Discovery](https://attack.mitre.org/techniques/T1614) [[T1082]](https://attack.mitre.org/techniques/T1082) ----- CORTEX XDR PREVENT Configure Behavioral Threat Protection under the Malware Security Profile NEXT-GENERATION FIREWALLS Ensure that all zones have Zone Protection Profiles with all Reconnaissance Protection settings enabled, tuned, and set to appropriate actions Ensure 'Service setting of ANY' in a security policy allowing traffic does not exist Ensure 'Security Policy' denying any/all traffic to/from IP addresses on Trusted Threat Intelligence Sources Exists Ensure application security policies exist when allowing traffic from an untrusted zone to a more trusted zone CORTEX XSOAR Deploy XSOAR Playbook - Port Scan **Lateral Movement** The courses of action below mitigate the following techniques: [Remote Services [T1021], SMB/Windows Admin Shares [T1021.002]](https://attack.mitre.org/techniques/T1021) NEXT-GENERATION FIREWALLS Ensure remote access capabilities for the User-ID service account are forbidden. Ensure that User-ID is only enabled for internal trusted interfaces Ensure that the User-ID Agent has minimal permissions if User-ID is enabled Ensure that the User-ID service account does not have interactive logon rights Ensure that 'Include/Exclude Networks' is used if User-ID is enabled ----- Ensure that security policies restrict User-ID Agent traffic from crossing into untrusted zones CORTEX XSOAR Deploy XSOAR Playbook - Block Account Generic Deploy XSOAR Playbook - Access Investigation Playbook **Command and Control** The courses of action below mitigate the following techniques: [Remote Access Software [T1219]](https://attack.mitre.org/techniques/T1219) NEXT-GENERATION FIREWALLS Ensure that the Certificate used for Decryption is Trusted Ensure application security policies exist when allowing traffic from an untrusted zone to a more trusted zone Ensure 'Security Policy' denying any/all traffic to/from IP addresses on Trusted Threat Intelligence Sources Exists Ensure 'SSL Forward Proxy Policy' for traffic destined to the internet is configured Ensure 'SSL Inbound Inspection' is required for all untrusted traffic destined for servers using SSL or TLS Ensure 'Service setting of ANY' in a security policy allowing traffic does not exist THREAT PREVENTION Ensure DNS sinkholing is configured on all anti-spyware profiles in use Ensure passive DNS monitoring is set to enabled on all anti-spyware profiles in use Ensure a secure anti-spyware profile is applied to all security policies permitting traffic to the Internet Ensure that antivirus profiles are set to block on all decoders except 'imap' and 'pop3' Ensure an anti-spyware profile is configured to block on all spyware severity levels, categories, and threats ----- Ensure a secure antivirus profile is applied to all relevant security policies URL FILTERING Ensure secure URL filtering is enabled for all security policies allowing traffic to the internet Ensure all HTTP Header Logging options are enabled Ensure that PAN-DB URL Filtering is used Ensure that URL Filtering uses the action of ‘block’ or ‘override’ on the URL categories Ensure that access to every URL is logged CORTEX XSOAR Deploy XSOAR Playbook - PANOS Query Logs for Indicators **Exfiltration** The courses of action below mitigate the following techniques: [Data Transfer Size Limits [T1030], Exfiltration Over C2 Channel](https://attack.mitre.org/techniques/T1030) [[T1041]](https://attack.mitre.org/techniques/T1041) THREAT PREVENTION Ensure DNS sinkholing is configured on all anti-spyware profiles in use Ensure that antivirus profiles are set to block on all decoders except 'imap' and 'pop3' Ensure an anti-spyware profile is configured to block on all spyware severity levels, categories, and threats Ensure passive DNS monitoring is set to enabled on all anti-spyware profiles in use Ensure a secure anti-spyware profile is applied to all security policies permitting traffic to the Internet Ensure a secure antivirus profile is applied to all relevant security policies ----- URL FILTERING Ensure that PANDB URL Filtering is used Ensure that access to every URL is logged Ensure that URL Filtering uses the action of ‘block’ or ‘override’ on the URL categories Ensure secure URL filtering is enabled for all security policies allowing traffic to the internet Ensure all HTTP Header Logging options are enabled CORTEX XSOAR Deploy XSOAR Playbook - Block URL Deploy XSOAR Playbook - PAN-OS Query Logs for Indicators Deploy XSOAR Playbook - Block IP DNS SECURITY Enable DNS Security in AntiSpyware profile NEXT-GENERATION FIREWALLS Setup NetFlow Monitoring Ensure application security policies exist when allowing traffic from an untrusted zone to a more trusted zone Ensure 'Service setting of ANY' in a security policy allowing traffic does not exist Ensure 'Security Policy' denying any/all traffic to/from IP addresses on Trusted Threat Intelligence Sources Exists **Impact** The courses of action below mitigate the following techniques: [Data Encrypted for Impact [T1486], Service Stop [T1489]](https://attack.mitre.org/techniques/T1486) CORTEX XSOAR Deploy XSOAR Playbook Ransomware Manual for incident response. ----- _†These capabilities are part of the NGFW security subscriptions service_ _Note: This is not an all-inclusive list of the protections provided by Palo Alto Networks. This is_ _a subset of our current Courses of Action initiative and will be updated as the project_ _progresses._ ## Conclusion LockBit 2.0 and its evolution over time is a perfect example to illustrate the persistence, increasing complexity and impact brought by the ransomware landscape as a whole. With claims of this RaaS offering the fastest encryption on the ransomware market, coupled with the fact that it has been delivered in high volume by experienced affiliates, this RaaS poses a significant threat. LockBit’s continuation with operations and its next iteration coming up on the horizon means that organizations and their security teams need to stay vigilant in the ever-evolving threat landscape. Palo Alto Networks detects and prevents LockBit 2.0 ransomware in the following ways: [WildFire: All known samples are identified as malware.](https://www.paloaltonetworks.com/products/secure-the-network/wildfire) [Cortex XDR:](https://www.paloaltonetworks.com/cortex/cortex-xdr) Identifies indicators associated with LockBit 2.0. Anti-Ransomware Module to detect LockBit 2.0 encryption behaviors on Windows. Local Analysis detection for LockBit 2.0 binaries on Windows. [Next-Generation Firewalls: DNS Signatures detect the known C2 domains, which are](https://www.paloaltonetworks.com/network-security/next-generation-firewall) [also categorized as malware in Advanced URL Filtering.](https://www.paloaltonetworks.com/network-security/advanced-url-filtering) If you think you may have been compromised or have an urgent matter, get in touch with the [Unit 42 Incident Response team or call:](http://start.paloaltonetworks.com/contact-unit42.html) North America Toll-Free: 866.486.4842 (866.4.UNIT42) EMEA: +31.20.299.3130 APAC: +65.6983.8730 Japan: +81.50.1790.0200 Palo Alto Networks has shared these findings, including file samples and indicators of compromise, with our fellow Cyber Threat Alliance members. CTA members use this intelligence to rapidly deploy protections to their customers and to systematically disrupt [malicious cyber actors. Learn more about the Cyber Threat Alliance.](http://www.cyberthreatalliance.org/) ## Appendix A In August 2021, a Russian blogger published a 22-minute interview with an alleged representative of the group behind LockBit 2.0 called “LockBitSupp” on a YouTube channel [called “Russian-language open source intelligence (OSINT).” The same Russian blogger](https://www.youtube.com/watch?v=ldgmx4ZCfFg) ----- previously published interviews with a representative of the group behind the REvil ransomware-as-a-service (RaaS), hackers and security experts. **Some key takeaways from the claims made in the interview were:** The LockBit 2.0 threat actor claimed the group’s RaaS was unlikely to be rebranded since the team allegedly was a business that was honest with their customers – suggesting a supposed contrast between LockBit 2.0 and Avaddon, DarkSide and REvil affiliates. The LockBit 2.0 ransomware disregarded keyboard layout, but it allegedly would not run on a host where the system language was set to any of the languages spoken in the Commonwealth of Independent States region. The group did not devise attacks on companies of their choice; they simply worked with initial access to any corporate network they obtained elsewhere, since this was more profitable and saved time. The team selected targets for ransomware attacks based on the company’s finances — the bigger, the better. The location also did not matter. However, team members allegedly did not attack healthcare facilities, social services, educational institutions and charitable organizations or any other organization that “contributed to the survival of the human race.” [Note that Unit 42 case data does include indications that threat actors using LockBit 2.0 have targeted healthcare organizations at times.] The threat actor claimed that the largest number of victims who paid ransom were company representatives who did not care about creating backup copies and did not protect their sensitive data. According to the threat actor’s claims, companies that violated regulations about collecting and handling customer or user personal information were among those eager to pay. The threat actor claimed that there generally were only a few companies who refused to pay ransom on principle, while most of the victims evaluated profit and loss to decide whether or not to pay a ransom. LockBit 2.0 operators allegedly almost always offered discounts to their victims since the goal was to streamline attacks. The threat actor claimed that the COVID-19 pandemic facilitated ransomware attacks significantly, saying it was easy to compromise home computers of employees who work remotely and use them as a springboard to access other networked systems. Companies in Europe and the U.S. were hit with ransomware much more often than companies based in other countries allegedly because of high profit and insurance and not because of language barriers. Ransomware operators usually recruit negotiators, who coerce victims to pay ransom, since professional penetration testers allegedly lack the time for chatter. ## Additional Resources ----- [LockBit 3.0: Another Upgrade to the World s Most Active Ransomware](https://socradar.io/lockbit-3-another-upgrade-to-worlds-most-active-ransomware/) [Ransomware Groups to Watch: Emerging Threats](https://unit42.paloaltonetworks.com/emerging-ransomware-groups/) [Average Ransom Payment Up 71% This Year, Approaches $1 Million](https://www.paloaltonetworks.com/blog/2022/06/average-ransomware-payment-update/) [2022 Unit 42 Ransomware Threat Report Highlights](https://unit42.paloaltonetworks.com/2022-ransomware-threat-report-highlights/) **Get updates from** **Palo Alto** **Networks!** Sign up to receive the latest news, cyber threat intelligence and research from us [By submitting this form, you agree to our Terms of Use and acknowledge our Privacy](https://www.paloaltonetworks.com/legal-notices/terms-of-use) Statement. -----