勒索軟體仍然是個人和組織面臨的最嚴重的數位威脅之一。現代勒索軟體變種不僅旨在加密文件,還能竊取敏感資訊,迫使受害者支付巨額贖金。在當今不斷演變的威脅情況下,保持警惕、維護強大的網路衛生並實施多層防禦至關重要。最近,該領域最危險的勒索軟體之一是 LockBit 5.0 勒索軟體。
LockBit 5.0:一個完善且強大的變體
LockBit 5.0 是 LockBit 勒索軟體家族的最新演進版本,它直接基於 LockBit 4.0 程式碼庫構建,並引入了一些改進,使其更難檢測和緩解。一旦執行,它會加密整個系統的文件,並為每個文件名附加一個唯一的、隨機的 16 個字元的副檔名。例如,名為「1.png」的檔案將變為「1.png.db9785905a3cad2c」。除了加密之外,它還會在受感染的目錄中植入一封名為「ReadMeForDecrypt.txt」的勒索信。
勒索信告知受害者,他們的文件和資料已被盜用。勒索信要求受害者以加密貨幣支付贖金,通常透過 Tor 網路進行通信,並警告稱,如果不付款,被盜資訊將被洩露。勒索信敦促受害者不要聯繫警方,因為攻擊者試圖製造恐慌和緊迫感。
先進的能力和戰術
LockBit 5.0 採用了技術增強功能,證明了勒索軟體開發人員的成熟度:
針對附屬機構的客製化:勒索軟體的 Windows 版本提供了更乾淨、更靈活的介面,讓附屬機構選擇加密方法和目標。
反分析技術:它會停用某些 Windows 追蹤功能以阻礙惡意軟體研究。
跨平台目標:除了 Windows 之外,LockBit 5.0 還包括能夠加密整個虛擬化環境的危險 Linux 和 VMware ESXi 變體。
選擇性規避:透過執行地理位置檢查來避開位於俄羅斯或相關地區的系統。
儘管作為主要版本發布,LockBit 5.0 重用了 LockBit 4.0 程式碼的重要部分,例如雜湊演算法和動態 API 解析,這使其更像是一種漸進但危險的升級。
分發向量:LockBit 5.0 如何傳播
LockBit 業者依靠多種感染方法來最大化覆蓋範圍。勒索軟體通常透過以下方式傳播:
偽裝成合法文件的惡意電子郵件附件或連結。欺詐性或受感染的網站,包括虛假的技術支援入口網站。利用未修補的軟體漏洞。惡意廣告活動、盜版軟體和非法密鑰產生器。點對點網路、第三方下載器和未經驗證的應用程式商店。這種多管齊下的方法使攻擊者可以同時針對個人和企業系統,從而增加了造成廣泛破壞的可能性。
加強對勒索軟體的防禦
防禦像 LockBit 5.0 這樣複雜的勒索軟體需要採取主動且分層的安全措施。使用者和組織應採用多種技術保障措施和安全瀏覽習慣。一些最有效的策略包括:
保持系統更新:及時應用作業系統和軟體修補程式來消除可利用的漏洞。
使用強大的端點保護:部署能夠識別進階威脅的知名防毒和端點偵測解決方案。
安全使用電子郵件和網路:警惕來自未經驗證來源的未經請求的附件、連結和下載。
維護離線備份:將關鍵檔案儲存在安全的離線位置,以確保無需支付贖金即可復原。
應用最小權限存取:限制使用者權限並分段網路以遏制潛在的勒索軟體爆發。
啟用多因素身份驗證 (MFA) :保護帳戶不會因憑證被盜而受到損害。
定期教育使用者:培訓員工和個人識別網路釣魚和社會工程企圖至關重要。
最後的想法
LockBit 5.0 凸顯了勒索軟體團夥如何不斷改進其工具以達到最大程度的破壞力。它能夠加密整個環境、規避分析並對受害者施加心理壓力,使其成為極具破壞性的威脅。最可靠的防禦措施是預防,結合更新的技術、靈活的備份策略和使用者意識。透過實施這些分層安全措施,使用者和組織可以顯著降低遭受毀滅性勒索軟體攻擊的風險。
System Messages
The following system messages may be associated with LockBit 5.0勒索軟體:
~~~ You have been attacked by LockBit 5.0 - the fastest, most stable and immortal ransomware since 2019 ~~~~
>>>>> You must pay us.
Tor Browser link where the stolen infortmation will be published: - >>>>> What is the guarantee that we won't scam you? We are the oldest extortion gang on the planet and nothing is more important to us than our reputation. We are not a politically motivated group and want nothing but financial rewards for our work. If we defraud even one client, other clients will not pay us. In 5 years, not a single client has been left dissatisfied after making a deal with us. If you pay the ransom, we will fulfill all the terms we agreed upon during the negotiation process. Treat this situation simply as a paid training session for your system administrators, because it was the misconfiguration of your corporate network that allowed us to attack you. Our pentesting services should be paid for the same way you pay your system administrators' salaries. You can get more information about us on wikipedia hxxps://en.wikipedia.org/wiki/LockBit
>>>>> Warning! Do not delete or modify encrypted files, it will lead to irreversible problems with decryption of files!
>>>>> Don't go to the police or the FBI for help and don't tell anyone that we attacked you. They will forbid you from paying the ransom and will not help you in any way, you will be left with encrypted files and your business will die.
>>>>> When buying bitcoin, do not tell anyone the true purpose of the purchase. Some brokers, especially in the US, do not allow you to buy bitcoin to pay ransom. Communicate any other reason for the purchase, such as: personal investment in cryptocurrency, bitcoin as a gift, paying to buy assets for your business using bitcoin, cryptocurrency payment for consulting services, cryptocurrency payment for any other services, cryptocurrency donations, cryptocurrency donations for Donald Trump to win the election, buying bitcoin to participate in ICO and buy other cryptocurrencies, buying cryptocurrencies to leave an inheritance for your children, or any other purpose for buying cryptocurrency. Also you can use adequate cryptocurrency brokers who do not ask questions for what you buy cryptocurrency.
>>>>> After buying cryptocurrency from a broker, store the cryptocurrency on a cold wallet, such as https://electrum.org/ or any other cold cryptocurrency wallet, more details on https://bitcoin.org By paying the ransom from your personal cold cryptocurrency wallet, you will avoid any problems from regulators, police and brokers.
>>>>> Don't be afraid of any legal consequences, you were very scared, that's why you followed all our instructions, it's not your fault if you are very scared. Not a single company that paid us has had issues. Any excuses are just for insurance company to not pay on their obligation.
>>>>> You need to contact us via TOR sites with your personal ID
Download and install Tor Browser https://www.torproject.org/ Write to the chat room and wait for an answer, we'll guarantee a response from us. If you need a unique ID for correspondence with us that no one will know about, ask it in the chat, we will generate a secret chat for you and give you ID via private one-time memos service, no one can find out this ID but you. Sometimes you will have to wait some time for our reply, this is because we have a lot of work and we attack hundreds of companies around the world.
Tor Browser link for chat with us: - >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> >>>>> Your personal identifier to communicate with us ID: - <<<<< >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
>>>>> Advertising: Want a lamborghini, a ferrari and lots of titty girls? Sign up and start your pentester billionaire journey in 5 minutes with us. - After registration, you will receive the most flawless and reliable tools for encrypting almost all operating systems on the planet and a platform for negotiating with attacked companies.
Version: ChuongDong v1.01 | x64
Technical Analysis of LockBit 5.0
The LockBit 5.0 Windows version was found to have a better user interface with clean formatting for affiliates compared to previous versions.
It describes various options and settings for executing the ransomware, including basic options like specifying directories to encrypt or bypass, operation modes such as invisible mode and verbose mode, notes settings, encryption settings, filtering options and examples of usage.
"The detailed commands and parameters illustrate the flexibility and customization available to the attacker," the researchers commented.
Upon execution, the ransomware generates its signature ransom note and directs victims to a dedicated leak site. The infrastructure maintains LockBit's established victim interaction model, featuring a streamlined "Chat with Support" section for ransom negotiations.
Notably, the variant adds randomized 16-character file extensions to files following encryption, further complicating recovery. LockBit 5.0 also omits traditional markers at file endings, making analysis harder.
The malware deploys other anti-forensic techniques. This includes patching the EtwEventWrite API by overwriting it with a 0xC3 (return) instruction, disabling Windows Event Tracing capabilities.
As with previous LockBit versions, the new iteration uses geolocation checks, terminating execution when detecting Russian language settings or Russian geolocation.
The features observed in the Windows version were similar to those in the Linux and ESXi variants analyzed.
The ESXi variant specifically targets VMware virtualization infrastructure, which the researchers said represents a "critical escalation" in LockBit's capabilities.
This is because ESXi servers typically host multiple virtual machines, allowing attackers to encrypt entire virtualized environments with a single payload execution.
|