LockBit macOS ransomware strain discovered, sparks concerns over shifting tactics
Researchers noted that while this disclosure should be a cause for concern, the program is currently very buggy
The first recorded instance of LockBit targeting Mac users has been revealed in what appears to be a shifting approach by the infamous ransomware gang.
Researchers at MalwareHunterTeam uncovered a ZIP archive on VirusTotal that was found to contain encryptors for devices running macOS.
MalwareHunterTeam revealed the discovery in a series of tweets at the weekend, highlighting encryptors named ‘locker_Apple_M1_64’ alongside lockers for Linux and ARM.
This particular encryptor was found to target new versions of Mac devices currently running Apple Silicon.
The VirusTotal archive examined by researchers was also found to contain encryptors for CPUs used on older Mac devices.
In a blog post dissecting the discovery, security researcher Patrick Wardle said that the novel malware marks the first instance of a ransomware group developing a payload for Apple products.
Following a period of initial scrutiny and skepticism, vx-underground, which compiles malware source code and samples, tweeted that the LockBit macOS ransomware “is real” and that the gang had confirmed development of the strain.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
The discovery highlights a potential shift in approach by LockBit, which has typically targeted Windows and Linux-based devices.
RELATED RESOURCE
LockBit has been among the most prolific ransomware gangs to ever exist, and was most recently responsible for the attack on Royal Mail which caused significant service disruption.
It has also been the most prolific groups in terms of number of successful attacks for years now, but was overtaken in March by Cl0p following the GoAnywhere MFT breaches.
Although researchers highlighted that the disclosure of this macOS encryptor should be a cause for concern, at present there is little to no risk of users being compromised.
“While yes it can indeed run on Apple Silicon, that is basically the extent of its impact,” Wardle wrote in his blog post. “Thus macOS users have nothing to worry about…for now.”
Wardle suggested that the strain is “far from ready for prime time”, noting that the strain is “rather buggy” and contains notable flaws that will cause it to prematurely exit when run on macOS.
“From its lack of a valid code-signing signature to its ignorance of TCC and other macOS file-system protections, as it stands it poses no threat to macOS users,” he wrote.
The macOS variant of LockBit’s ransomware payload was also dated 17 November 2022, meaning the discovery has taken some time to unearth.
LockBit confirmed to BleepingComputer that the strain is under active development.
Due to many organisations preferring Windows-based computers for their workforce rather than Macs or even Linux-based machines, ransomware groups have usually developed their payloads that could affect the widest pool of targets.
LockBit’s is not the first ransomware program to be written for macOS, but such strains are certainly less common than those that target Windows.
Regardless, Apple has been “fairly proactive” when it comes to securing its computers against ransomware, Wardle said.
Implementing measures such as system integrity protection (SIP) and read-only system volumes offer protections that mean even if a Mac was infected with a ransomware payload, it would be difficult for it to affect OS-level files as a result.
Apple has also introduced transparency, consent, and control (TCC) protections too, which means files in protected locations either require the user’s manual approval or a vulnerability exploit in order to affect, Wardle said.
The development of LockBit’s macOS ransomware strain may still be in its infancy and riddled with bugs, but the industry will be alarmed by the discovery given the group’s standing in the cyber criminal space, perhaps indicating a new trend in ransomware.

Ross Kelly is ITPro's News & Analysis Editor, responsible for leading the brand's news output and in-depth reporting on the latest stories from across the business technology landscape. Ross was previously a Staff Writer, during which time he developed a keen interest in cyber security, business leadership, and emerging technologies.
He graduated from Edinburgh Napier University in 2016 with a BA (Hons) in Journalism, and joined ITPro in 2022 after four years working in technology conference research.
For news pitches, you can contact Ross at ross.kelly@futurenet.com, or on Twitter and LinkedIn.
-
Google CEO Sundar Pichai says vibe coding has made software development ‘exciting again’News Google CEO Sundar Pichai claims software development has become “exciting again” since the rise of vibe coding, but some devs are still on the fence about using AI to code.
-
15-year-old revealed as key player in Scattered LAPSUS$ HuntersNews 'Rey' says he's trying to leave Scattered LAPSUS$ Hunters and is prepared to cooperate with law enforcement
-
Security experts claim the CVE Program isn’t up to scratch anymore — inaccurate scores and lengthy delays mean the system needs updatedNews CVE data is vital in combating emerging threats, yet inaccurate ratings and lengthy wait times are placing enterprises at risk
-
IBM AIX users urged to patch immediately as researchers sound alarm on critical flawsNews Network administrators should patch the four IBM AIX flaws as soon as possible
-
Critical Dell Storage Manager flaws could let hackers access sensitive data – patch nowNews A trio of flaws in Dell Storage Manager has prompted a customer alert
-
Flaw in Lenovo’s customer service AI chatbot could let hackers run malicious code, breach networksNews Hackers abusing the Lenovo flaw could inject malicious code with just a single prompt
-
Industry welcomes the NCSC’s new Vulnerability Research Initiative – but does it go far enough?News The cybersecurity agency will work with external researchers to uncover potential security holes in hardware and software
-
Hackers are targeting Ivanti VPN users again – here’s what you need to knowNews Ivanti has re-patched a security flaw in its Connect Secure VPN appliances that's been exploited by a China-linked espionage group since at least the middle of March.
-
Broadcom issues urgent alert over three VMware zero-daysNews The firm says it has information to suggest all three are being exploited in the wild
-
Nakivo backup flaw still present on some systems months after firms’ ‘silent patch’, researchers claimNews Over 200 vulnerable Nakivo backup instances have been identified months after the firm silently patched a security flaw.