威胁数据库 勒索软件 LockBit 5.0勒索软件

LockBit 5.0勒索软件

勒索软件仍然是个人和组织面临的最严重的数字威胁之一。现代勒索软件变种不仅旨在加密文件,还能窃取敏感信息,迫使受害者支付巨额赎金。在当今不断演变的威胁形势下,保持警惕、维护强大的网络卫生并实施多层防御至关重要。最近,该领域最危险的勒索软件之一是 LockBit 5.0 勒索软件。

LockBit 5.0:一个完善且强大的变体

LockBit 5.0 是 LockBit 勒索软件家族的最新演进版本,它直接基于 LockBit 4.0 代码库构建,并引入了一些改进,使其更难检测和缓解。一旦执行,它会加密整个系统的文件,并为每个文件名附加一个唯一的、随机的 16 个字符的扩展名。例如,名为“1.png”的文件将变为“1.png.db9785905a3cad2c”。除了加密之外,它还会在受感染的目录中植入一封名为“ReadMeForDecrypt.txt”的勒索信。

勒索信告知受害者,他们的文件和数据已被盗用。勒索信要求受害者以加密货币支付赎金,通常通过 Tor 网络进行通信,并警告称,如果不付款,被盗信息将被泄露。勒索信敦促受害者不要联系警方,因为攻击者试图制造恐慌和紧迫感。

先进的能力和战术

LockBit 5.0 采用了技术增强功能,证明了勒索软件开发人员的成熟度:

针对附属机构的定制:勒索软件的 Windows 版本提供了更清洁、更灵活的界面,允许附属机构选择加密方法和目标。

反分析技术:它禁用某些 Windows 跟踪功能以阻碍恶意软件研究。

跨平台目标:除了 Windows 之外,LockBit 5.0 还包括能够加密整个虚拟化环境的危险 Linux 和 VMware ESXi 变体。

选择性规避:通过执行地理位置检查来避开位于俄罗斯或相关地区的系统。

尽管作为主要版本发布,LockBit 5.0 重用了 LockBit 4.0 代码的重要部分,例如散列算法和动态 API 解析,这使其更像是一种渐进但危险的升级。

分发向量:LockBit 5.0 如何传播

LockBit 运营商依靠多种感染方法来最大化覆盖范围。勒索软件通常通过以下方式传播:

  • 伪装成合法文件的恶意电子邮件附件或链接。
  • 欺诈性或受感染的网站,包括虚假的技术支持门户。
  • 利用未修补的软件漏洞。
  • 恶意广告活动、盗版软件和非法密钥生成器。
  • 点对点网络、第三方下载器和未经验证的应用商店。
  • 这种多管齐下的方法使攻击者可以同时针对个人和企业系统,从而增加了造成广泛破坏的可能性。

    加强对勒索软件的防御

    防御像 LockBit 5.0 这样复杂的勒索软件需要采取主动且分层的安全措施。用户和组织应采用多种技术保障措施和安全浏览习惯。一些最有效的策略包括:

    保持系统更新:及时应用操作系统和软件补丁来消除可利用的漏洞。

    使用强大的端点保护:部署能够识别高级威胁的知名防病毒和端点检测解决方案。

    安全使用电子邮件和网络:警惕来自未经验证来源的未经请求的附件、链接和下载。

    维护离线备份:将关键文件存储在安全的离线位置,以确保无需支付赎金即可恢复。

    应用最小权限访问:限制用户权限并分段网络以遏制潜在的勒索软件爆发。

    启用多因素身份验证 (MFA) :保护帐户不因凭证被盗而受到损害。

    定期教育用户:培训员工和个人识别网络钓鱼和社会工程企图至关重要。

    最后的想法

    LockBit 5.0 凸显了勒索软件团伙如何不断改进其工具以达到最大程度的破坏力。它能够加密整个环境、规避分析并对受害者施加心理压力,使其成为极具破坏性的威胁。最可靠的防御措施是预防,结合更新的技术、灵活的备份策略和用户意识。通过实施这些分层安全措施,用户和组织可以显著降低遭受毁灭性勒索软件攻击的风险。

    System Messages

    The following system messages may be associated with LockBit 5.0勒索软件:

    ~~~ You have been attacked by LockBit 5.0 - the fastest, most stable and immortal ransomware since 2019 ~~~~

    >>>>> You must pay us.

    Tor Browser link where the stolen infortmation will be published:
    -
    >>>>> What is the guarantee that we won't scam you?
    We are the oldest extortion gang on the planet and nothing is more important to us than our reputation. We are not a politically motivated group and want nothing but financial rewards for our work. If we defraud even one client, other clients will not pay us. In 5 years, not a single client has been left dissatisfied after making a deal with us. If you pay the ransom, we will fulfill all the terms we agreed upon during the negotiation process. Treat this situation simply as a paid training session for your system administrators, because it was the misconfiguration of your corporate network that allowed us to attack you. Our pentesting services should be paid for the same way you pay your system administrators' salaries. You can get more information about us on wikipedia hxxps://en.wikipedia.org/wiki/LockBit

    >>>>> Warning! Do not delete or modify encrypted files, it will lead to irreversible problems with decryption of files!

    >>>>> Don't go to the police or the FBI for help and don't tell anyone that we attacked you. They will forbid you from paying the ransom and will not help you in any way, you will be left with encrypted files and your business will die.

    >>>>> When buying bitcoin, do not tell anyone the true purpose of the purchase. Some brokers, especially in the US, do not allow you to buy bitcoin to pay ransom. Communicate any other reason for the purchase, such as: personal investment in cryptocurrency, bitcoin as a gift, paying to buy assets for your business using bitcoin, cryptocurrency payment for consulting services, cryptocurrency payment for any other services, cryptocurrency donations, cryptocurrency donations for Donald Trump to win the election, buying bitcoin to participate in ICO and buy other cryptocurrencies, buying cryptocurrencies to leave an inheritance for your children, or any other purpose for buying cryptocurrency. Also you can use adequate cryptocurrency brokers who do not ask questions for what you buy cryptocurrency.

    >>>>> After buying cryptocurrency from a broker, store the cryptocurrency on a cold wallet, such as https://electrum.org/ or any other cold cryptocurrency wallet, more details on https://bitcoin.org By paying the ransom from your personal cold cryptocurrency wallet, you will avoid any problems from regulators, police and brokers.

    >>>>> Don't be afraid of any legal consequences, you were very scared, that's why you followed all our instructions, it's not your fault if you are very scared. Not a single company that paid us has had issues. Any excuses are just for insurance company to not pay on their obligation.

    >>>>> You need to contact us via TOR sites with your personal ID

    Download and install Tor Browser https://www.torproject.org/
    Write to the chat room and wait for an answer, we'll guarantee a response from us. If you need a unique ID for correspondence with us that no one will know about, ask it in the chat, we will generate a secret chat for you and give you ID via private one-time memos service, no one can find out this ID but you. Sometimes you will have to wait some time for our reply, this is because we have a lot of work and we attack hundreds of companies around the world.

    Tor Browser link for chat with us:
    -
    >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
    >>>>> Your personal identifier to communicate with us ID: - <<<<<
    >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>

    >>>>> Advertising:
    Want a lamborghini, a ferrari and lots of titty girls? Sign up and start your pentester billionaire journey in 5 minutes with us.
    -
    After registration, you will receive the most flawless and reliable tools for encrypting almost all operating systems on the planet and a platform for negotiating with attacked companies.

    Version: ChuongDong v1.01 | x64

    Technical Analysis of LockBit 5.0

    The LockBit 5.0 Windows version was found to have a better user interface with clean formatting for affiliates compared to previous versions.

    It describes various options and settings for executing the ransomware, including basic options like specifying directories to encrypt or bypass, operation modes such as invisible mode and verbose mode, notes settings, encryption settings, filtering options and examples of usage.

    "The detailed commands and parameters illustrate the flexibility and customization available to the attacker," the researchers commented.

    Upon execution, the ransomware generates its signature ransom note and directs victims to a dedicated leak site. The infrastructure maintains LockBit's established victim interaction model, featuring a streamlined "Chat with Support" section for ransom negotiations.

    Notably, the variant adds randomized 16-character file extensions to files following encryption, further complicating recovery. LockBit 5.0 also omits traditional markers at file endings, making analysis harder.

    The malware deploys other anti-forensic techniques. This includes patching the EtwEventWrite API by overwriting it with a 0xC3 (return) instruction, disabling Windows Event Tracing capabilities.

    As with previous LockBit versions, the new iteration uses geolocation checks, terminating execution when detecting Russian language settings or Russian geolocation.

    The features observed in the Windows version were similar to those in the Linux and ESXi variants analyzed.

    The ESXi variant specifically targets VMware virtualization infrastructure, which the researchers said represents a "critical escalation" in LockBit's capabilities.

    This is because ESXi servers typically host multiple virtual machines, allowing attackers to encrypt entire virtualized environments with a single payload execution.

    趋势

    最受关注

    正在加载...