LockBit
lockbit · primary source: Other · first observed 2019 · last observed 2024
RU · RussiaRansomwareHigh confidencelast cited May 6, 2024 · 2y ago
Russian-speaking ransomware-as-a-service operation that by mid-2023 was the most prolific ransomware brand on public leak-site tracking by victim count. Disrupted in February 2024 by Operation Cronos (UK NCA-led) which seized the leak site and decryption keys. In May 2024 the US DOJ unsealed an indictment of Dmitry Khoroshev ('LockBitSupp') as the operation's administrator. Affiliate program model; victims span manufacturing, healthcare, government, and education globally.
Aliases
LockBit 3.0OtherLockBit BlackOtherLockBit GreenOtherBitwise SpiderCrowdStrike
Motivations
financial gain
Target sectors
manufacturinghealthcaregovernmenteducationprofessional services
Target countries
USGBFRDEITCAAUBRMXJPIN
Diamond Model
Caltagirone / Pendergast / Betz 2013 — four-vertex attribution framework.
MITRE ATT&CK techniques
Tools & malware
1 entryTimeline
1 eventIndicators of compromise
4 indicators| Type | Value | First seen | Source |
|---|---|---|---|
| SHA-256 | family · LockBit SHA256 of Mag.dll, the persistence module identified running within the UpdateAdobeTask scheduled job on victims of the LockBit 3.0 Citrix Bleed campaign. Table 3 of AA23-325A. | Nov 20, 2023 | CISA |
| Name | family · LockBit LockBit 3.0 affiliates' primary initial-access vector during the October-November 2023 wave documented in joint CISA/FBI/MS-ISAC/ACSC advisory AA23-325A - NetScaler ADC and Gateway session-token theft used against Boeing, ICBC, Allen & Overy, and DP World. | Nov 20, 2023 | CISA |
| SHA-256 | family · LockBit SHA256 of adobelib.dll dropped to C:\Users\Public\ by the 123.ps1 PowerShell loader during the LockBit 3.0 Citrix Bleed campaign, executed via rundll32 with a 104-hex-character key. Table 3 of AA23-325A. | Nov 20, 2023 | CISA |
| Domain | family · LockBit Tool-download domain contacted by adobelib.dll POST requests in the LockBit 3.0 Citrix Bleed campaign; resolved to 172.67.129.176 and 104.21.1.180 as of November 16, 2023. Table 3 of AA23-325A. | Nov 15, 2023 | CISA |
Related actors
shared ATT&CK techniques- RU · Russia8Base3 shared techniques
- ?? · UnknownAkira3 shared techniques
- ?? · UnknownALPHV/BlackCat3 shared techniques
- RU · RussiaDarkSide3 shared techniques
- ?? · UnknownHive3 shared techniques
- RU · RussiaINC Ransom3 shared techniques
References
cite this page
Threat Intel Tracker. (2026-05-19). LockBit — actor profile. Retrieved from https://threatintel.local/actors/lockbit
latest cited activity · 2024-05-07 · 4 cataloged indicators