IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

FBI warns of "sophisticated" LockBit 2.0 ransomware

Bureau warns of fast, automated organization-wide encryption capability

The FBI has issued a warning about LockBit 2.0, a popular ransomware strain that emerged last summer with more sophisticated capabilities than its predecessor.

LockBit's authors updated it to automatically encrypt devices across Windows domains by abusing Active Directory group policies, the FBI said in an advisory on Friday. This enables it to trigger encryption with a single command, according to an analysis from security company Cybereason.

The ransomware uses bitwise operations for its encryption, which are bit-level operations directly supported by the processor. 

The criminal gang behind LockBit 2.0 have also begun advertising for insiders to help them gain access to victims' networks by promising them a cut of the profits, according to the FBI advisory. Finally, the group developed a piece of Linux malware targeting VMware ESXi virtual machines.

LockBit 2.0 operates on an affiliate model, with separate groups paying a fee to the authors for its use. Consequently, each group's usage techniques vary. Alongside the new insider access approach, the FBI has seen perpetrators buy access to compromised systems from initial access brokers and target systems with unpatched capabilities, it said.

Once inside a network, the FBI has seen perpetrators escalate privileges using the Mimikatz password-stealing tool. They then often use StealBit, a custom data exfiltration tool included in LockBit 2.0, to steal data before the ransomware encrypts it. They typically select from a range of independent file sharing services.

In a sign that multi-factor authentication is becoming increasingly crucial, the FBI advised its use "to the extent possible" in its list of mitigations. It also recommended the use of strong passwords for those with password logins, software patching, and a host-based firewall. Administrators should enable protected files in Windows and remote unnecessary access to administrative shares, it added.

Time-based access is also a useful method to protect administrative accounts, the advisory said. This locks admin accounts until needed, unlocking them only in response to individual requests, and only for a limited time.

LockBit 2.0 was the busiest ransomware group in the third quarter of 2021, according to a report by security company Digital Shadows.

Featured Resources

Accelerating AI modernisation with data infrastructure

Generate business value from your AI initiatives

Free Download

Recommendations for managing AI risks

Integrate your external AI tool findings into your broader security programs

Free Download

Modernise your legacy databases in the cloud

An introduction to cloud databases

Free Download

Powering through to innovation

IT agility drive digital transformation

Free Download

Recommended

Best free malware removal tools 2022
Security

Best free malware removal tools 2022

22 Jun 2022
A guide to cyber security certification and training
Careers & training

A guide to cyber security certification and training

16 Jun 2022
What is shoulder surfing?
social engineering

What is shoulder surfing?

10 Jun 2022
CIAM buyer’s guide
Whitepaper

CIAM buyer’s guide

6 Jun 2022

Most Popular

LockBit 2.0 ransomware disguised as PDFs distributed in email attacks
Security

LockBit 2.0 ransomware disguised as PDFs distributed in email attacks

27 Jun 2022
Open source giant Red Hat joins HPE GreenLake ecosystem
automation

Open source giant Red Hat joins HPE GreenLake ecosystem

28 Jun 2022
Carnival hit with $5 million fine over cyber security violations
cyber security

Carnival hit with $5 million fine over cyber security violations

27 Jun 2022