{"id":100159,"date":"2020-04-30T21:01:50","date_gmt":"2020-05-01T04:01:50","guid":{"rendered":"\/blogs\/?p=100159"},"modified":"2024-07-09T02:44:59","modified_gmt":"2024-07-09T09:44:59","slug":"tales-from-the-trenches-a-lockbit-ransomware-story","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/tales-from-the-trenches-a-lockbit-ransomware-story\/","title":{"rendered":"Tales From the Trenches; a Lockbit Ransomware Story"},"content":{"rendered":"<p>Co-authored by Marc RiveroLopez.<\/p>\n<p>In collaboration with <a href=\"https:\/\/northwave-security.com\/en\/\" target=\"_blank\" rel=\"noopener noreferrer\">Northwave<\/a><\/p>\n<p>As we highlighted previously across two blogs, targeted ransomware attacks have increased massively over the past months. In our\u00a0<a href=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/csi-evidence-indicators-for-targeted-ransomware-attacks\/\">first article<\/a>, we discussed the growing pattern of targeted ransomware attacks where the primary infection stage is often an info-stealer kind of malware used to gain credentials\/access to determine if the target would be valuable for a ransomware attack. In the\u00a0<a href=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/csi-evidence-indicators-for-targeted-ransomware-attacks-part-ii\" target=\"_blank\" rel=\"noopener noreferrer\">second part<\/a>, we described the reconnaissance phase of an attacker that controls an infected host or a valid account to access a remote service. Many of them are using a similar manual modus operandi as we highlighted in the earlier blogs.<\/p>\n<p>We believe there is real opportunity to learn from incident response cases and previous attacks, hence why this blog is dubbed &#8216;tales from the trenches&#8217;. In collaboration with\u00a0<a href=\"https:\/\/northwave-security.com\/en\/\" target=\"_blank\" rel=\"noopener noreferrer\">Northwave<\/a>, this article describes a real-life case of a targeted ransomware attack. During one of their recent incident responses, Northwave encountered a relatively new family of ransomware called LockBit performing a targeted attack. First sighted in late 2019, under the name .abcd virus, this piece of ransomware was more a revision than evolution when compared with earlier attacks. Like the previous posts in this blog series, we describe the different stages of the attack and recovery, including a thorough analysis of the ransomware and the attackers behind it.<\/p>\n<p>In this blog we\u2019ll cover:<\/p>\n<ul>\n<li><a href=\"#LockBit Telemetry Map\">Targeted Countries<\/a><\/li>\n<li><a href=\"#Initial Access\">Attack Analysis<\/a>\n<ul>\n<li><a href=\"#Initial Access\">Initial Access<\/a><\/li>\n<li><a href=\"#Infiltrating the Network\">Network Infiltration<\/a><\/li>\n<li><a href=\"#Credentials &amp; Privileges\">Credentials and Privileges<\/a><\/li>\n<li><a href=\"#Lateral Movement\">Lateral Movement<\/a><\/li>\n<li><a href=\"#Deployment of the Ransomware\">Ransomware Deployment<\/a><\/li>\n<li><a href=\"#Malware Analysis\">Malware Analysis<\/a><\/li>\n<li><a href=\"#Payload Analysis\">Payload Analysis<\/a><\/li>\n<li><a href=\"#Technical Analysis\">Technical Analysis<\/a><\/li>\n<\/ul>\n<\/li>\n<li><a href=\"#Tales from the Underground\">Insights from the Underground<\/a><\/li>\n<li><a href=\"#Recovery\">Recovery<\/a><\/li>\n<li><a href=\"#Conclusion\">Conclusion<\/a><\/li>\n<\/ul>\n<h2>LockBit Telemetry Map<\/h2>\n<p>We gathered telemetry through our McAfee Global Threat Intelligence GTI database on the different LockBit samples we analyzed in our research. The global spread is currently limited as this ransomware is relatively new and heavily targeted.<\/p>\n<h2>Initial Access<\/h2>\n<p>As in all ransomware cases, the attacker has to gain initial access to the network somehow. In this particular case the attacker performed a brute force attack on a web server containing an outdated VPN service. Based on our research it took several days for the brute force to crack the password of the &#8216;Administrator&#8217; account. With this account, belonging to the administrator group, the attacker immediately obtained the proverbial \u201ckeys to the kingdom\u201d with all the necessary permissions to perform a successful attack. Unfortunately, this is not a unique case; external facing systems should always have multi-factor authentication enabled when possible. Besides, a security organization should have a least privilege strategy when it comes to accessing systems. Targeted ransomware attackers are successfully leveraging the \u201chuman factor\u201d integrally. It is no longer the typical \u201cend-user clicking on a malicious link\u201d causing the complete lock-up of a company. The human factor in targeted ransomware attacks goes much deeper. Attackers successfully leverage weaknesses in security policy and misconfigurations across an entire organization; from end-user to Domain Administrator.<\/p>\n<h2>Infiltrating the Network<\/h2>\n<p>To infiltrate the network, the attacker had to take several steps to make sure the ransomware attack was successful. An attacker always wants to infect as many systems as possible to effectively halt the business process and urge the victim to pay the ransom.<\/p>\n<h2>Credentials &amp; Privileges<\/h2>\n<p>As mentioned previously, the attacker was successful in guessing the password of the Administrator account using a brute force attack. With this, the attacker immediately had all the necessary privileges for deploying the ransomware successfully. In other cases, as we described in <a href=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/csi-evidence-indicators-for-targeted-ransomware-attacks-part-ii\/?hilite=%27csi%27\" target=\"_blank\" rel=\"noopener noreferrer\">our second blog<\/a>, the attacker often uses known post-exploitation frameworks, for privilege escalation, lateral movement and performing any additional actions on their objective. Since quite a few of these frameworks are readily available we often call this the \u201cGitHubification\u201d of attack tools. In this case however, the attacker could actually skip this step and continue with the network reconnaissance and deployment of the ransomware immediately, since a high privileged account was already compromised.<\/p>\n<h2>Lateral Movement<\/h2>\n<p>With the administrator-level account, the attacker used SMB to perform network reconnaissance, resulting in an overview of accessible hosts. Subsequently, the attacker used the internal Microsoft Remote Access Server (RAS) to access these systems using either the administrator or the LocalSystem account. The LocalSystem account is a built-in Windows account. It is the most authoritative account on a Windows local instance (more potent than any admin account). Using these accounts, the attacker owned these systems and could do anything they wanted, including turning off any end-point security products. Interestingly, both the lateral movement and the deployment of the ransomware was entirely automated.<\/p>\n<h2>Deployment of the Ransomware<\/h2>\n<p>This specific case was a classic hit and run. After gaining access to the initial system using the brute-forced administrator account, the attacker logged in and deployed the ransomware almost immediately. For the attacker, this was a relatively straightforward process since the ransomware spreads itself. The deployment of the ransomware on one single host remotely instructed the other hosts in the network to run the following PowerShell command:<\/p>\n<p>This command retrieves a .png file from a website that has probably been compromised. There are two versions of the .png file, one for .NET version 4 and one for version 3.5. The PowerShell command checks which version it needs by getting the version number of the common language runtime that is running the current process. If this starts with &#8216;V4&#8217;, the .png for version 4 is downloaded; otherwise it downloads the .png for version 3.5 via the URLs below:<\/p>\n<ul>\n<li>https:\/\/espet[.]se\/images\/rs35.png<\/li>\n<li>https:\/\/espet[.]se\/images\/rs40.png<\/li>\n<\/ul>\n<p>What is interesting in this case is that each distinct host downloads the ransomware itself. Hence, the attacker only needed access to one system with an account having enough privileges to automatically make all other hosts in the network download and execute it.<\/p>\n<h2>Malware Analysis<\/h2>\n<p>For our analysis, we will use the file found in our investigation, the details of which are:<\/p>\n<table style=\"height: 410px;\" width=\"778\">\n<tbody>\n<tr>\n<td width=\"66\"><strong>\u00a0<\/strong><\/td>\n<td width=\"520\"><strong>File name: rs35.png<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"66\"><strong>SHA1<\/strong><\/td>\n<td width=\"520\">488e532e55100da68eaeee30ba342cc05810e296<\/td>\n<\/tr>\n<tr>\n<td width=\"66\"><strong>SHA256<\/strong><\/td>\n<td width=\"520\">ca57455fd148754bf443a2c8b06dc2a295f014b071e3990dd99916250d21bc75<\/td>\n<\/tr>\n<tr>\n<td width=\"66\"><strong>size<\/strong><\/td>\n<td width=\"520\">546.00 KB<\/td>\n<\/tr>\n<tr>\n<td width=\"66\"><strong>PDB<\/strong><\/td>\n<td width=\"520\">c:\\users\\user\\work\\code\\dotnet\\regedit-64\\regedit-64\\obj\\release\\rs35.pdb<\/td>\n<\/tr>\n<tr>\n<td width=\"66\"><strong>guid<\/strong><\/td>\n<td width=\"520\">84e7065-65fe-4bae-a122-f967584e31db<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2>Technical Analysis<\/h2>\n<p>The file we found in our investigation was a dropper renamed as a .png file. When first opening the .png files we were expecting a real image file, with perhaps some steganography inside, but what we saw instead was the header of a portable executable, so no steganography pictures this time. The PE was compiled in Microsoft Visual C# v7.0 \/ Basic .NET, .NET executable -&gt; Microsoft.<\/p>\n<p>Entropy-wise it seems quite tidy too, not showing any stray sections or big spikes in the graph. This behavior indicates that the writer of the malware did not use obfuscation.<\/p>\n<p>This file is a .NET launcher. Examining the Main() function in the code shows that an array containing a particularly long AES encrypted base64 string (in the variable named &#8216;exeBuffer&#8217;) carries the executable for the actual ransomware.<\/p>\n<p>This encrypted string is decrypted using the key ENCRYPTION29942. The first 32 bytes of the long ExeBuffer string are used as the salt in the encryption scheme, where ENCRYPTION29942 is the passphrase.<\/p>\n<p>Remarkably, the script checks for the existence of vbc.exe on its designated host. Usually, this binary is a digitally signed executable from Microsoft; however, in this case, the malware uses it for process hollowing.<\/p>\n<p>By statically analyzing the file we can spot the usage of:<\/p>\n<ul>\n<li>NtUnmapViewOfSection\n<ul>\n<li>LockBit uses this API in order to unmap the original code in execution<\/li>\n<\/ul>\n<\/li>\n<li>NtWriteVirtualMemory\n<ul>\n<li>The malware writes the base address of the injected image into the PEB via\u00a0NtWriteVirtualMemory<\/li>\n<\/ul>\n<\/li>\n<li>VirtualAllocEx\n<ul>\n<li>To allocate the space before injecting the malicious code<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>The VBC utility is the visual basic compiler for Windows and LockBit uses it to compile and execute the code on the fly directly in execution. If the vbc utility does not exist on the system, the malware downloads the original vbc.exe file from the same malicious URL as seen before. After executing vbc.exe, the malware replaces the objects in memory with the code for deploying the ransomware (as deduced from the exeBuffer).<\/p>\n<h2>Payload Analysis<\/h2>\n<p>Analysis of the exeBuffer shows several appealing elements. It starts with a UAC Bypass via\u00a0<em>{3E5FC7F9-9A51-4367-9063-A120244FBEC7}<\/em>\u00a0exploiting the\u00a0ICMLuaUtil\u00a0elevated COM Interface-Object<a href=\"#_ftn1\" name=\"_ftnref1\">[1]<\/a>, as seen in other ransomware families like Trickbot and MedusaLocker.<\/p>\n<p>Subsequently, the script uses another variant of the UAC Bypass. The CLSID\u00a0<em>{D2E7041B-2927-42fb-8E9F-7CE93B6DC937}<\/em>\u00a0refers to the ColorDataProxy COM Object which is classified as the same Bypass method in hfiref0x&#8217;s\u00a0UACME\u00a0#43<a href=\"#_ftn2\" name=\"_ftnref2\">[2]<\/a>.<\/p>\n<p>In order to be stealthier, LockBit ransomware loads its modules dynamically instead of having them hardcoded in the IAT and uses LoadLibraryA. This method is employed to avoid detection by static engines.<\/p>\n<p>In execution, the malware accesses the Service Manager using the function \u201cOpenSCManagerA\u201d and saves the handle. It checks if it fails the last error with the \u201cGetLastError\u201d function, against the error ERROR_ACCESS_DENIED.<\/p>\n<p>Upon access to the Service Manager, LockBit creates a thread to manage services, terminate processes and delete the shadow volumes plus the contents of the recycle bin.<\/p>\n<p>In this thread the malware has the name of services that it will try to manage hardcoded to try to make them more obfuscated:<\/p>\n<p>The list of services LockBit tries to stop are:<\/p>\n<ul>\n<li>DefWatch (Symantec Antivirus)<\/li>\n<li>ccEvtMgr (Norton AntiVirus Event Manager)<\/li>\n<li>ccSetMgr (Common Client Settings Manager\u00a0Service of Symantec)<\/li>\n<li>SavRoam (Symantec Antivirus)<\/li>\n<li>sqlserv<\/li>\n<li>sqlagent<\/li>\n<li>sqladhlp<\/li>\n<li>Culserver<\/li>\n<li>RTVscan (Symantec Antivirus Program)<\/li>\n<li>sqlbrowser<\/li>\n<li>SQLADHLP<\/li>\n<li>QBIDPService (<em>QuickBooks<\/em>by\u00a0<em>Intuit<\/em>.)<\/li>\n<li>QuickBoooks.FCS (<em>QuickBooks<\/em>by\u00a0<em>Intuit<\/em>.)<\/li>\n<li>QBCFMonitorService (<em>QuickBooks<\/em>by\u00a0<em>Intuit<\/em>.)<\/li>\n<li>sqlwriter<\/li>\n<li>msmdsrv (Microsoft SQL Server Analysis or Microsoft SQL Server)<\/li>\n<li>tomcat6 (Apache Tomcat)<\/li>\n<li>zhundongfangyu (this belongs to the 360 security product from Qihoo company)<\/li>\n<li>vmware-usbarbitator64<\/li>\n<li>vmware-converter<\/li>\n<li>dbsrv12 (Creates, modifies, and deletes SQL Anywhere services.)<\/li>\n<li>dbeng8 (Sybase&#8217;s Adaptive Server Anywhere version 8 database program)<\/li>\n<li>wrapper (Java Service?)<\/li>\n<\/ul>\n<p>If one of these services is found by the malware querying the status of it, with the function \u201cQueryServiceStatusEx\u201d, LockBit will get all the depending modules when correct and safe and it will stop the service with the function \u201cControlService\u201d.<\/p>\n<p style=\"text-align: center;\">\n<p>LockBit will prepare Unicode obfuscated strings that contain a command to delete the shadow volumes and disable the protections in the next boot of the system.<\/p>\n<p>The malware has these strings in the rdata section, as widely observed in all malware families, and in its own code as show in the previous screenshots. The malware uses both strings.<\/p>\n<p>During its execution, LockBit will create a snapshot of the processes running in the system and will search to see if certain processes are part of this list with the function \u201cOpenProcess\u201d and, in case the process is present, it will finish it with the \u201cTerminateProcess\u201d function.<\/p>\n<p>The list of processes that LockBit will check are:<\/p>\n<table style=\"height: 397px;\" width=\"447\">\n<tbody>\n<tr>\n<td width=\"143\"><strong>wxServer<\/strong><\/td>\n<td width=\"177\"><strong>wxServerView<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"143\"><strong>sqlservr<\/strong><\/td>\n<td width=\"177\">RAgui<\/td>\n<\/tr>\n<tr>\n<td width=\"143\"><strong>supervise<\/strong><\/td>\n<td width=\"177\">Culture<\/td>\n<\/tr>\n<tr>\n<td width=\"143\"><strong>RTVScan<\/strong><\/td>\n<td width=\"177\">DefWatch<\/td>\n<\/tr>\n<tr>\n<td width=\"143\"><strong>sqlbrowser<\/strong><\/td>\n<td width=\"177\">winword<\/td>\n<\/tr>\n<tr>\n<td width=\"143\"><strong>QBW32<\/strong><\/td>\n<td width=\"177\">QBDBMgr<\/td>\n<\/tr>\n<tr>\n<td width=\"143\"><strong>qbupdate<\/strong><\/td>\n<td width=\"177\">QBCFMonitorService<\/td>\n<\/tr>\n<tr>\n<td width=\"143\"><strong>axlbridge<\/strong><\/td>\n<td width=\"177\">QBIDPService<\/td>\n<\/tr>\n<tr>\n<td width=\"143\"><strong>httpd<\/strong><\/td>\n<td width=\"177\">fdlauncher<\/td>\n<\/tr>\n<tr>\n<td width=\"143\"><strong>MsDtSrvr<\/strong><\/td>\n<td width=\"177\">tomcat6<\/td>\n<\/tr>\n<tr>\n<td width=\"143\"><strong>zhudongfangyu<\/strong><\/td>\n<td width=\"177\">vmware-usbarbitator64<\/td>\n<\/tr>\n<tr>\n<td width=\"143\"><strong>vmware-converter<\/strong><\/td>\n<td width=\"177\">dbsrv12<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>This \u201cprocess check function\u201d is performed through a trick using the \u201cPathRemoveExtensionA\u201d function and removing the .exe extension from the list. Using this technique, the check process is more obfuscated.<\/p>\n<p>In our analysis, we saw how the ransomware dynamically uses the function \u201cIsWow64Process\u201d to check if the victim OS is running a x64 system and then uses the functions \u201cWow64DisableWow64FsRedirection\u201d and \u201cWow64RevertWow64FsResdirection\u201d. If the malware can access the functions, it will use the first to destroy all shadow volumes and the protections of the OS in the next boot and, later, will recover the redirection with the other function. In the case that it cannot get these functions, LockBit will delete the shadow volume directly through the function \u201cShellExecuteA\u201d or with the function \u201cCreateProcessA\u201d.<\/p>\n<p>Deletion of files within the recycle bin is executed with the function \u201cSHEmptyRecycleBinW\u201d.<\/p>\n<p style=\"text-align: center;\">\n<p>Static analysis of the sample shows that LockBit will check the machine to see if it has support for\u00a0 AES instructions in the processor with the \u201ccpuid\u201d opcode.<\/p>\n<p>Another check made by the ransomware is for the existence of the SS2 set of instructions:<\/p>\n<p>After finishing this process, the malware will try to delete itself with the next command using \u201cShellExecuteExW\u201d:<\/p>\n<h2>The Ransom Note<\/h2>\n<p>The ransom note is rather compact because the author hardcoded the content right in the code without using any obfuscation or encryption. The text file containing the ransom note is created in every directory after encryption and called\u00a0<em>Restore-My-Files.txt<\/em>.<\/p>\n<h2>Victim Information Stored in the Registry Key<\/h2>\n<p>LockBit in execution will create two keys in the infected system with the values full and public.<\/p>\n<p>Those keys are created in the following hive\u00a0<strong>HKEY_CURRENT_USER\\SOFTWARE\\LockBit<\/strong>. The data stored in these keys belongs to the infected victim in order to be able to identify them in the future.<\/p>\n<p>Lastly, after finishing the encryption, the desktop wallpaper is changed to a message for the user, saying that LockBit encrypted the host.<\/p>\n<h2>LockBit Filemarker<\/h2>\n<p>Some of the ransomware we analyzed shares a common file marker across all the encrypted files in order to verify the origin. This digital marker can be used there in the control panel in order to verify that this was the ransomware that encrypted the files.<\/p>\n<p>This is an example for the first version of LockBit, where file marker was using:<\/p>\n<p style=\"text-align: center;\">C8 41 D0 BE AB 3F 0D 59 7B BF CF 40 C8 81 63 CD<\/p>\n<p>If we compare two encrypted files, we can spot how the file marker matches in both encrypted files:<\/p>\n<h2>SMB Spreading<\/h2>\n<p>Analyzing LockBit in our environment, we identified the possibility to spread locally in the same local network. Analyzing the network traffic, we spotted the use of multiple ARP requests to find other hosts in the same network segment.<\/p>\n<p>If these ARP requests finally find a host alive, LockBit will start a legitimate SMB connection to be able to deploy the ransomware in other machines.<\/p>\n<p style=\"text-align: center;\">\n<p>If the SMB connection is successful, LockBit will execute the following PowerShell command to download the .NET launcher that will decompress and execute LockBit in a new system:<\/p>\n<h2>LockBit Ransomware Evolution:<\/h2>\n<p>LockBit is new on the scene, but we noticed the authors added several new features and improved the ransomware several times. That means there is an active group behind it which is probably getting feedback on its actions. This is an example of the development cycle; this graph was extracted, analyzing statically all the internal functions and comparing them across the samples:<\/p>\n<p>For this investigation, we found different LockBit versions with different features between them:<\/p>\n<h2>LockBit Version 1<\/h2>\n<p>This first version contains unique features compared to other versions we found in the wild.<\/p>\n<p>These features are:<\/p>\n<ul>\n<li>IPLO (IPLogger geolocalization service)<\/li>\n<li>Persistence through the COM interface and the HIVE Current Version Run<\/li>\n<li>A different extension used in the encrypted files<\/li>\n<li>Debug file created for debugging purposes<\/li>\n<li>HIGH CPU Usage in the encryption process<\/li>\n<li>The reusage of a MUTEX observed in other ransomware families<\/li>\n<\/ul>\n<h3>IPLO.RU geo-localization service:<\/h3>\n<p>One of the interesting items we found was that LockBit tries to identify the victim\u2019s geo-location, through the URL IPLO.RU, requesting a static TXT file in that service.<\/p>\n<p>The communication to this page is through HTTPS; we intercepted the traffic to get the reply from the remote server:<\/p>\n<p style=\"text-align: center;\">\n<p>Analyzing statically the code in LockBit, we found that this URL is not resolved dynamically in execution; it is hardcoded in the binary:<\/p>\n<h3>Creating persistence through Current version Run and COM task schedule:<\/h3>\n<p>There are many ways to gain persistence in a system. This first version of LockBit uses a task schedule through the COM interface to gain persistence.<\/p>\n<p>LockBit also uses a reboot persistence method by using the Windows registry hive:<\/p>\n<p><em>HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Run<\/em><\/p>\n<p>Using the CurrentVersion\\Run hive serves to survive the reboot if the system shuts down.<\/p>\n<p>LockBit is actually using two persistence methods, CLSID and CurrentVersion\\Run<\/p>\n<h3>.abcd extension used:<\/h3>\n<p>The first version of LockBit uses the .abcd extension every time it encrypts a file; this is a unique difference between this version and the other versions found.<\/p>\n<h3>Ransom note used:<\/h3>\n<p>LockBit in this first version used a different ransom note with a different message:<\/p>\n<h3>Debug file created in execution:<\/h3>\n<p>LockBit\u2019s first version has some files that are skipped in the encryption process and every time it skips one it will create resultlog6.reg with the log information:<\/p>\n<p style=\"text-align: center;\">\n<h3>High CPU usage:<\/h3>\n<p>We analyzed the performance of the encryption and we noted how LockBit uses the CPU heavily in the encryption process:<\/p>\n<h3>PhobosImposter static MUTEX used:<\/h3>\n<p>In October 2019, the community saw <a href=\"https:\/\/twitter.com\/VK_Intel\/status\/1187805345336434689\" target=\"_blank\" rel=\"noopener noreferrer\">how PhobosImposter was using the mutex<\/a> XO1XADpO01 in its executions and the same mutex is used by LockBit in this first version. We analyzed the base code of both samples and we did not find any code overlap but is a quite a random string to use casually.<\/p>\n<p>This is the function used to create the mutex:<\/p>\n<h2>LockBit Version 2<\/h2>\n<p>This LockBit version came out with the following changes:<\/p>\n<ul>\n<li>Appended extension changed<\/li>\n<li>The debug function removed<\/li>\n<li>Some of the samples came packed wither with UPX or a Delphi packer<\/li>\n<li>One sample digitally signed<\/li>\n<\/ul>\n<h3>Appended extension changed:<\/h3>\n<p>For this version, LockBit started to append the extension .lockbit in all the encrypted files as a file marker:<\/p>\n<h3>Debug log function removed:<\/h3>\n<p>LockBit, in this new version, removed the functionality whereby it stored all the skipped files in the encryption process.<\/p>\n<h3>Sample delivery with different protections:<\/h3>\n<p>In this version we found LockBit samples packed in UPX and other custom packers, adding certain protections to the samples:<\/p>\n<ul>\n<li>Extensive usage of PEB during the execution<\/li>\n<li>The use of IsDebuggerPresent, OutputDebugString and GetLastError<\/li>\n<\/ul>\n<p>All these protections are enabled by the use of packers in the delivery.<\/p>\n<h3>Mutex change:<\/h3>\n<p>The prior version of LockBit used a static mutex in all the encryptions but, in this release, it changed to be a dynamic value for every infection.<\/p>\n<h3>Samples digitally signed:<\/h3>\n<p>For all the versions we found for LockBit, only this version had a sample digitally signed:<\/p>\n<p style=\"text-align: center;\">\n<h2>LockBit Version 3<\/h2>\n<h3>Ransomware note changed:<\/h3>\n<p>For this version LockBit adapted the ransomware note and used a new one:<\/p>\n<h3>LockBit debug enabled:<\/h3>\n<p>After all the hunting progress we made, we found several samples of LockBit with some kind of status feature enabled, showing a progress window during the encryption:<\/p>\n<p>This mode was only available for certain sample compilations and the status screen was different depending on the LockBit sample analyzed:<\/p>\n<h2>Tales from the Underground<\/h2>\n<p>When we researched the underground community for LockBit we came across a posting on several popular underground forums. \u00a0A threat actor named <em>Lockbi<\/em> or <em>LockBit <\/em>is offering LockBit as a \u201cbespoke\u201d ransomware as a service for limited partners\/affiliates. We suspect LockBit ransomware to be more \u201cbespoke\u201d, not only from its own announcements, but subsequently we have not seen any affiliate identifiers present in the ransomware, which is normally a clear sign of an actor trying to upscale operations and service a larger number of affiliates.<\/p>\n<p>The advertisement provides a general description that matches the LockBit behavior we have seen in the wild and from our analysis. As many other cyber-criminal services, LockBit does not allow the use of the software in any of the CIS countries. This is commonly done to avoid prosecution if the threat actor resides in one of those nations.<\/p>\n<p>What we also noticed was a mention around multi-threading. Ransomware families are often programmed to run multi-threaded to ensure quick and overall encryption and prevent the encryption process getting stuck on a large file. However, LockBit was specifically advertised as single threaded and the threat actor Lockbi ensures that there are no speed issues when it comes to its encryption capability.<\/p>\n<p>In the advertisement it is listed that one of the features of the ransomware is a local subnet scanner and SMB propagation method, something we can confirm based on our analysis.<\/p>\n<p>Also noteworthy is the use of a Jabber-bot to perform the essential functions, such as chatting, decryption and banning, replacing the need for a labor intensive admin panel that is hosted somewhere on the internet.<\/p>\n<p>It seems that LockBit has joined the underground scene with a clear determination to do business; the authors have put a down a deposit in excess of 10,5 BTC, a bit shy of 75K USD. Putting a deposit in escrow is a way to demonstrate that the seller is invested financially and not out to scam potential partners. The seller would lose their deposit if they did not keep to their end of the deal. Our telemetry shows that LockBit activity is still limited today but we can definitely expect to see more bespoke LockBit attacks in the near future.<\/p>\n<h2>Recovery<\/h2>\n<p>Going back to the real-life case, there were no recent offline backups. So, with the backup servers (including the backups) encrypted as well and a complete rebuild not being an option, there was no way for a successful and swift recovery other than by paying the ransom.<\/p>\n<p><strong>Both McAfee\u2019s and Northwave\u2019s perspective is that ransoms should not be paid. Paying does not only support the criminal business model, but as we have shown in our <a href=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-atr-analyzes-sodinokibi-aka-revil-ransomware-as-a-service-follow-the-money\/?hilite=%27sodinokibi%27\" target=\"_blank\" rel=\"noopener noreferrer\">research<\/a>, it also finances other forms of crime, such as the online drug trade.<\/strong><\/p>\n<p>In this specific case the victim chose to pay the ransom. The first step for recovery was to get in contact with the hacker following the instructions from the ransom note (Restore-my-files.txt) as depicted below.<\/p>\n<p>Interestingly, as opposed to earlier known cases of LockBit (or .abcd virus) where contact with the attacker occurred via email addresses mentioned in the ransom note, in this case, the attacker developed an online &#8216;help desk&#8217; accessible via a .onion address. Helpful as the hacker is, they even provided clear instructions on how to access this .onion address with the Tor browser. Although the ransom note claims there was private data obtained, Northwave did not find any evidence for this on the compromised systems.<\/p>\n<p>The image above shows the helpdesk which the attacker uses for communication with their victims. It provides the functionality for a trial in which two files can be decrypted &#8216;for warranty&#8217;, showing that the attacker indeed has the correct key(s) for restoring the data. For this, it is always essential to test files from different (critical) servers since keys might differ per server. In negotiations with an attacker, always try to obtain this knowledge since it is also relevant for your recovery strategy. If it is only one key, you know you can use one tool for the entire network; however, if encrypted servers use distinct keys, recovery becomes increasingly more difficult.<\/p>\n<p>After successful decryption of two different files (from distinct servers), the chat with the attacker began. They started by asking for a network domain name (to identify the correct victim), then the attacker addressed the ransom amount. Usually, the attackers do proper research on their victims and tailor the ransom amount accordingly, which was the case here as well. Hence, negotiating on the amount of the ransom did not prove to be useful:<\/p>\n<p style=\"text-align: center;\"><em>&#8220;We know who you are, so don&#8217;t play negotiate games.&#8221;<\/em><\/p>\n<h2>Trouble in Hacker Paradise<\/h2>\n<p>Subsequently, making the bitcoin transaction to the provided address, the helpdesk page would automatically update after six confirmations and show the download link for the decryptor.<\/p>\n<p style=\"text-align: center;\"><em>\u201cAfter 6 transaction confirmations, in a few hours decryptor will be built automatically. Don&#8217;t worry you will get it instantly once it&#8217;s built.\u201d<\/em><\/p>\n<p>Since there was nothing else to do than wait and hope for the decryptor now, an attempt was made into obtaining some more information from the attacker by asking about their methods. See a snippet of this conversation below.<\/p>\n<p>The &#8216;weak passwords&#8217; is, of course, entirely in line with the brute force attack mentioned earlier. Additionally, this conversation indicates that there is a larger group behind this attack, where roles between different participants are separated. The helpdesk seems to be an actual helpdesk, merely following a script of actions.<\/p>\n<p>After waiting for several hours and six confirmations further, the decryption tool should have been ready for download. However, this is where things progressed differently. There seemed to be some technical issues causing the decryptor not to generate automatically for which the helpdesk kindly apologized. Unfortunately, this continued for two dubious days with multiple excuses before the attacker sent a link to the decryptor via the chat. It appeared that they were ineffective in solving the technical issues; hence they chose to send it via SendSpace.<\/p>\n<p>Once downloaded, the recovery phase could start. In this phase, all servers were decrypted, scanned and cleaned (or rebuilt) in a quarantined network. Subsequently, after implementing the appropriate technical and security measures, each host joined a new clean network.<\/p>\n<h2>Conclusion<\/h2>\n<p>As we highlighted in the first two articles, targeted ransomware attacks have increased massively over the past months. Many of them are all using a similar, quite manual, attack pattern as we highlighted. In this article, we provided an in-depth view of a relatively new ransomware family named LockBit. Based on a real-life case as encountered by Northwave, we described a typical ransomware attack including the modus operandi of attackers, the recovery process, an insight in the underground that advertises the ransomware and a full technical break-down of the ransomware itself. Additionally, during our analysis, we were able to obtain multiple samples of the LockBit ransomware with which we could provide an extensive list of IOCs.\u00a0McAfee will continue monitoring this threat.<\/p>\n<p>Learn from the articles, identify which technology can give you visibility inside your network. What digital evidence sources do you have, and can you detect fast enough to preserve and respond? If you were not able to prevent the \u2018initial access stage\u2019, make sure to have a strong Defense-in-Depth by having multiple defence technologies in place. In case a ransomware attack does strike your organization, have a proper backup procedure in place to successfully restore operations on your own? For additional ransomware prevention tips please visit <a href=\"http:\/\/www.nomoreransom.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">www.NoMoreRansom.org<\/a>.<\/p>\n<p>To learn more about how McAfee products can defend against these types of attacks, visit see our blog on how <a href=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/ens-10-7-rolls-back-the-curtain-on-ransomware\/\">ENS 10.7 Rolls Back the Curtain on Ransomware<\/a>.<\/p>\n<h2>MITRE TAXONOMY<\/h2>\n<table>\n<tbody>\n<tr>\n<td width=\"92\"><strong>Technique ID<\/strong><\/td>\n<td width=\"243\"><strong>Technique Description<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"92\"><strong>T1107<\/strong><\/td>\n<td width=\"243\">File Deletion<\/td>\n<\/tr>\n<tr>\n<td width=\"92\"><strong>T1055<\/strong><\/td>\n<td width=\"243\">Process Injection<\/td>\n<\/tr>\n<tr>\n<td width=\"92\"><strong>T1112<\/strong><\/td>\n<td width=\"243\">Modify Registry<\/td>\n<\/tr>\n<tr>\n<td width=\"92\"><strong>T1215<\/strong><\/td>\n<td width=\"243\">Kernel Modules and Extensions<\/td>\n<\/tr>\n<tr>\n<td width=\"92\"><strong>T1060<\/strong><\/td>\n<td width=\"243\">Registry Run Keys \/ Start Folder<\/td>\n<\/tr>\n<tr>\n<td width=\"92\"><strong>T1179<\/strong><\/td>\n<td width=\"243\">Hooking<\/td>\n<\/tr>\n<tr>\n<td width=\"92\"><strong>T1055<\/strong><\/td>\n<td width=\"243\">Process Injection<\/td>\n<\/tr>\n<tr>\n<td width=\"92\"><strong>T1179<\/strong><\/td>\n<td width=\"243\">Hooking<\/td>\n<\/tr>\n<tr>\n<td width=\"92\"><strong>T1124<\/strong><\/td>\n<td width=\"243\">System Time Discovery<\/td>\n<\/tr>\n<tr>\n<td width=\"92\"><strong>T1046<\/strong><\/td>\n<td width=\"243\">Network Service Scanning<\/td>\n<\/tr>\n<tr>\n<td width=\"92\"><strong>T1083<\/strong><\/td>\n<td width=\"243\">File and Directory Discovery<\/td>\n<\/tr>\n<tr>\n<td width=\"92\"><strong>T1016<\/strong><\/td>\n<td width=\"243\">System Network Configuration Discovery<\/td>\n<\/tr>\n<tr>\n<td width=\"92\"><strong>T1012<\/strong><\/td>\n<td width=\"243\">Query Registry<\/td>\n<\/tr>\n<tr>\n<td width=\"92\"><strong>T1082<\/strong><\/td>\n<td width=\"243\">System Information Discovery<\/td>\n<\/tr>\n<tr>\n<td width=\"92\"><strong>T1057<\/strong><\/td>\n<td width=\"243\">Process Discovery<\/td>\n<\/tr>\n<tr>\n<td width=\"92\"><strong>T1063<\/strong><\/td>\n<td width=\"243\">Security Software Discovery<\/td>\n<\/tr>\n<tr>\n<td width=\"92\"><strong>T1047<\/strong><\/td>\n<td width=\"243\">Windows Management Instrumentation<\/td>\n<\/tr>\n<tr>\n<td width=\"92\"><strong>T1035<\/strong><\/td>\n<td width=\"243\">Service Execution<\/td>\n<\/tr>\n<tr>\n<td width=\"92\"><strong>T1075<\/strong><\/td>\n<td width=\"243\">Pass the Hash<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2><\/h2>\n<h2>IOC\u2019s<\/h2>\n<table style=\"height: 717px;\" width=\"903\">\n<tbody>\n<tr>\n<td width=\"527\"><strong>SHA256<\/strong><\/td>\n<td width=\"153\"><strong>Compile TimeStamp<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"527\"><strong>ffbb6c4d8d704a530bdd557890f367ad904c09c03f53fda5615a7208a0ea3e4d<\/strong><\/td>\n<td width=\"153\">1992:06:20<\/td>\n<\/tr>\n<tr>\n<td width=\"527\"><strong>286bffaa9c81abfb938fe65be198770c38115cdec95865a241f913769e9bfd3f<\/strong><\/td>\n<td width=\"153\">2009:02:12<\/td>\n<\/tr>\n<tr>\n<td width=\"527\"><strong>76a77def28acf51b2b7cdcbfaa182fe5726dd3f9e891682a4efc3226640b9c78<\/strong><\/td>\n<td width=\"153\">2009:02:12<\/td>\n<\/tr>\n<tr>\n<td width=\"527\"><strong>faa3453ceb1bd4e5b0b10171eaa908e56e7275173178010fcc323fdea67a6869<\/strong><\/td>\n<td width=\"153\">2009:02:12<\/td>\n<\/tr>\n<tr>\n<td width=\"527\"><strong>70cb1a8cb4259b72b704e81349c2ad5ac60cd1254a810ef68757f8c9409e3ea6<\/strong><\/td>\n<td width=\"153\">2019:11:29<\/td>\n<\/tr>\n<tr>\n<td width=\"527\"><strong>ec88f821d22e5553afb94b4834f91ecdedeb27d9ebfd882a7d8f33b5f12ac38d<\/strong><\/td>\n<td width=\"153\">2019:12:01<\/td>\n<\/tr>\n<tr>\n<td width=\"527\"><strong>13849c0c923bfed5ab37224d59e2d12e3e72f97dc7f539136ae09484cbe8e5e0<\/strong><\/td>\n<td width=\"153\">2019:12:11<\/td>\n<\/tr>\n<tr>\n<td width=\"527\"><strong>6fedf83e76d76c59c8ad0da4c5af28f23a12119779f793fd253231b5e3b00a1a<\/strong><\/td>\n<td width=\"153\">2019:12:17<\/td>\n<\/tr>\n<tr>\n<td width=\"527\"><strong>c8205792fbc0a5efc6b8f0f2257514990bfaa987768c4839d413dd10721e8871<\/strong><\/td>\n<td width=\"153\">2019:12:18<\/td>\n<\/tr>\n<tr>\n<td width=\"527\"><strong>15a7d528587ffc860f038bb5be5e90b79060fbba5948766d9f8aa46381ccde8a<\/strong><\/td>\n<td width=\"153\">2020:01:23<\/td>\n<\/tr>\n<tr>\n<td width=\"527\"><strong>0f5d71496ab540c3395cfc024778a7ac5c6b5418f165cc753ea2b2befbd42d51<\/strong><\/td>\n<td width=\"153\">2020:01:23<\/td>\n<\/tr>\n<tr>\n<td width=\"527\"><strong>0e66029132a885143b87b1e49e32663a52737bbff4ab96186e9e5e829aa2915f<\/strong><\/td>\n<td width=\"153\">2020:01:23<\/td>\n<\/tr>\n<tr>\n<td width=\"527\"><strong>410c884d883ebe2172507b5eadd10bc8a2ae2564ba0d33b1e84e5f3c22bd3677<\/strong><\/td>\n<td width=\"153\">2020:02:12<\/td>\n<\/tr>\n<tr>\n<td width=\"527\"><strong>e3f236e4aeb73f8f8f0caebe46f53abbb2f71fa4b266a34ab50e01933709e877<\/strong><\/td>\n<td width=\"153\">2020:02:16<\/td>\n<\/tr>\n<tr>\n<td width=\"527\"><strong>0f178bc093b6b9d25924a85d9a7dde64592215599733e83e3bbc6df219564335<\/strong><\/td>\n<td width=\"153\">2020:02:16<\/td>\n<\/tr>\n<tr>\n<td width=\"527\"><strong>1b109db549dd0bf64cadafec575b5895690760c7180a4edbf0c5296766162f18<\/strong><\/td>\n<td width=\"153\">2020:02:17<\/td>\n<\/tr>\n<tr>\n<td width=\"527\"><strong>26b6a9fecfc9d4b4b2c2ff02885b257721687e6b820f72cf2e66c1cae2675739<\/strong><\/td>\n<td width=\"153\">2020:02:17<\/td>\n<\/tr>\n<tr>\n<td width=\"527\"><strong>69d9dd7fdd88f33e2343fb391ba063a65fe5ffbe649da1c5083ec4a67c525997<\/strong><\/td>\n<td width=\"153\">2020:02:17<\/td>\n<\/tr>\n<tr>\n<td width=\"527\"><strong>0a937d4fe8aa6cb947b95841c490d73e452a3cafcd92645afc353006786aba76<\/strong><\/td>\n<td width=\"153\">2020:02:17<\/td>\n<\/tr>\n<tr>\n<td width=\"527\"><strong>1e3bf358c76f4030ffc4437d5fcd80c54bd91b361abb43a4fa6340e62d986770<\/strong><\/td>\n<td width=\"153\">2020:02:17<\/td>\n<\/tr>\n<tr>\n<td width=\"527\"><strong>5072678821b490853eff0a97191f262c4e8404984dd8d5be1151fef437ca26db<\/strong><\/td>\n<td width=\"153\">2020:02:20<\/td>\n<\/tr>\n<tr>\n<td width=\"527\"><strong>ca57455fd148754bf443a2c8b06dc2a295f014b071e3990dd99916250d21bc75<\/strong><\/td>\n<td width=\"153\">2020-02-20<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Co-authored by Marc RiveroLopez. In collaboration with Northwave As we highlighted previously across two blogs, targeted ransomware attacks have increased&#8230;<\/p>\n","protected":false},"author":1170,"featured_media":94645,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[5526,5423,5116],"coauthors":[6327],"class_list":["post-100159","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mcafee-labs","tag-advanced-threat-research","tag-atr","tag-mcafee-labs"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Tales From the Trenches; a Lockbit Ransomware Story | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Co-authored by Marc RiveroLopez. In collaboration with Northwave As we highlighted previously across two blogs, targeted ransomware attacks have increased\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Tales From the Trenches; a Lockbit Ransomware Story | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Co-authored by Marc RiveroLopez. In collaboration with Northwave As we highlighted previously across two blogs, targeted ransomware attacks have increased\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/tales-from-the-trenches-a-lockbit-ransomware-story\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-01T04:01:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-09T09:44:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/shutterstock_598592378.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"667\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ATR Operational Intelligence Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ATR Operational Intelligence Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"24 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/tales-from-the-trenches-a-lockbit-ransomware-story\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/tales-from-the-trenches-a-lockbit-ransomware-story\/\"},\"author\":{\"name\":\"ATR Operational Intelligence Team\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/668134594f276e8743322ec163337c6f\"},\"headline\":\"Tales From the Trenches; a Lockbit Ransomware Story\",\"datePublished\":\"2020-05-01T04:01:50+00:00\",\"dateModified\":\"2024-07-09T09:44:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/tales-from-the-trenches-a-lockbit-ransomware-story\/\"},\"wordCount\":4753,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/tales-from-the-trenches-a-lockbit-ransomware-story\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/shutterstock_598592378.jpg\",\"keywords\":[\"Advanced Threat Research\",\"ATR\",\"McAfee Labs\"],\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/tales-from-the-trenches-a-lockbit-ransomware-story\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/tales-from-the-trenches-a-lockbit-ransomware-story\/\",\"name\":\"Tales From the Trenches; a Lockbit Ransomware Story | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/tales-from-the-trenches-a-lockbit-ransomware-story\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/tales-from-the-trenches-a-lockbit-ransomware-story\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/shutterstock_598592378.jpg\",\"datePublished\":\"2020-05-01T04:01:50+00:00\",\"dateModified\":\"2024-07-09T09:44:59+00:00\",\"description\":\"Co-authored by Marc RiveroLopez. In collaboration with Northwave As we highlighted previously across two blogs, targeted ransomware attacks have increased\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/tales-from-the-trenches-a-lockbit-ransomware-story\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/tales-from-the-trenches-a-lockbit-ransomware-story\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/tales-from-the-trenches-a-lockbit-ransomware-story\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/shutterstock_598592378.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/shutterstock_598592378.jpg\",\"width\":1000,\"height\":667},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/tales-from-the-trenches-a-lockbit-ransomware-story\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Tales From the Trenches; a Lockbit Ransomware Story\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/668134594f276e8743322ec163337c6f\",\"name\":\"ATR Operational Intelligence Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/a7a29f6cfb004e05c7ac7a98652288d8\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/01\/McAfee-Advanced-Threat-Research-CTF-docx-1-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/01\/McAfee-Advanced-Threat-Research-CTF-docx-1-96x96.png\",\"caption\":\"ATR Operational Intelligence Team\"},\"description\":\"McAfee\u2019s Advanced Threat Research Operational Intelligence team operates globally around the clock, keeping watch of the latest cyber campaigns and actively tracking the most impactful cyber threats.\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/atr-operational-intelligence-team\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Tales From the Trenches; a Lockbit Ransomware Story | McAfee Blog","description":"Co-authored by Marc RiveroLopez. In collaboration with Northwave As we highlighted previously across two blogs, targeted ransomware attacks have increased","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Tales From the Trenches; a Lockbit Ransomware Story | McAfee Blog","og_description":"Co-authored by Marc RiveroLopez. In collaboration with Northwave As we highlighted previously across two blogs, targeted ransomware attacks have increased","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/tales-from-the-trenches-a-lockbit-ransomware-story\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2020-05-01T04:01:50+00:00","article_modified_time":"2024-07-09T09:44:59+00:00","og_image":[{"width":1000,"height":667,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/shutterstock_598592378.jpg","type":"image\/jpeg"}],"author":"ATR Operational Intelligence Team","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"ATR Operational Intelligence Team","Est. reading time":"24 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/tales-from-the-trenches-a-lockbit-ransomware-story\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/tales-from-the-trenches-a-lockbit-ransomware-story\/"},"author":{"name":"ATR Operational Intelligence Team","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/668134594f276e8743322ec163337c6f"},"headline":"Tales From the Trenches; a Lockbit Ransomware Story","datePublished":"2020-05-01T04:01:50+00:00","dateModified":"2024-07-09T09:44:59+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/tales-from-the-trenches-a-lockbit-ransomware-story\/"},"wordCount":4753,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/tales-from-the-trenches-a-lockbit-ransomware-story\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/shutterstock_598592378.jpg","keywords":["Advanced Threat Research","ATR","McAfee Labs"],"articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/tales-from-the-trenches-a-lockbit-ransomware-story\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/tales-from-the-trenches-a-lockbit-ransomware-story\/","name":"Tales From the Trenches; a Lockbit Ransomware Story | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/tales-from-the-trenches-a-lockbit-ransomware-story\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/tales-from-the-trenches-a-lockbit-ransomware-story\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/shutterstock_598592378.jpg","datePublished":"2020-05-01T04:01:50+00:00","dateModified":"2024-07-09T09:44:59+00:00","description":"Co-authored by Marc RiveroLopez. In collaboration with Northwave As we highlighted previously across two blogs, targeted ransomware attacks have increased","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/tales-from-the-trenches-a-lockbit-ransomware-story\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/tales-from-the-trenches-a-lockbit-ransomware-story\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/tales-from-the-trenches-a-lockbit-ransomware-story\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/shutterstock_598592378.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/shutterstock_598592378.jpg","width":1000,"height":667},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/tales-from-the-trenches-a-lockbit-ransomware-story\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"Tales From the Trenches; a Lockbit Ransomware Story"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/668134594f276e8743322ec163337c6f","name":"ATR Operational Intelligence Team","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/a7a29f6cfb004e05c7ac7a98652288d8","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/01\/McAfee-Advanced-Threat-Research-CTF-docx-1-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/01\/McAfee-Advanced-Threat-Research-CTF-docx-1-96x96.png","caption":"ATR Operational Intelligence Team"},"description":"McAfee\u2019s Advanced Threat Research Operational Intelligence team operates globally around the clock, keeping watch of the latest cyber campaigns and actively tracking the most impactful cyber threats.","url":"https:\/\/www.mcafee.com\/blogs\/author\/atr-operational-intelligence-team\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/100159","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/1170"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=100159"}],"version-history":[{"count":4,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/100159\/revisions"}],"predecessor-version":[{"id":196276,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/100159\/revisions\/196276"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/94645"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=100159"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=100159"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=100159"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=100159"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}