The FBI published last week a flash alert consisting of LockBit 2.0 technical details and attack indicators, and a list of recommendations to help organizations fend off threats.
The FBI also asked cyberattack victims to report incidents to their local FBI Cyber Squad as quickly as possible to help them track malicious actors and prevent future intrusions.
The flash alert describes LockBit 2.0 techniques, tactics and procedures deployed by the perpetrators, technical details of the ransomware strain, indicators of compromise (IOCs), information requested to help the FBI identify attackers and hold them accountable, and recommended mitigations.
LockBit 2.0 ransomware breaches networks through techniques such as exploiting unpatched vulnerabilities, purchased access, zero-day exploits and insider involvement. Once in the network, threat actors escalate their privileges through publicly available tools, such as Mimikatz.
They then use a mixed set of public and custom tools to leak harvested data, which they finally encrypt with the LockBit malware and leave on the compromised device along with a ransom note.
The LockBit ransomware gang’s activity has surged since its launch as a ransomware-as-a-service (Raas) in September 2019, when it extensively promoted the operation, recruited members to breach networks, and provided support to its customers on Russian hacking forums.
A couple of years later, the malware gang announced LockBit 2.0 on their leak website after ransomware threat actors were banned from promoting their services on hacking forums. LockBit 2.0 saw a new website design as well as improved and advanced features within the product, including the ability to encrypt devices automatically across Windows domains by exploiting Active Directory group policies.
The FBI’s flash alert encompasses a series of recommendations to help network administrators fend off LockBit 2.0 ransomware attacks. Namely:
tags
Vlad's love for technology and writing created rich soil for his interest in cybersecurity to sprout into a full-on passion. Before becoming a Security Analyst, he covered tech and security topics.
View all postsNovember 14, 2024
September 06, 2024