Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware

February 7, 2026

Badges, Bytes and Blackmail

February 7, 2026

Ex-Google Engineer Convicted for Stealing AI Secrets for China Startup

February 7, 2026
Facebook X (Twitter) Instagram
Saturday, February 7
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»New LockBit Ransomware Variant Emerges as Most Dangerous Yet
News

New LockBit Ransomware Variant Emerges as Most Dangerous Yet

Team-CWDBy Team-CWDSeptember 27, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Trend Micro has identified a new LockBit ransomware variant that is “significantly more dangerous” than previous versions and is being deployed in the wild.

The notorious LockBit ransomware gang reportedly announced the release of “LockBit 5.0” in September 2025 to mark the group’s sixth anniversary.

Trend Micro researchers have since discovered a Windows binary. The cybersecurity firm has also confirmed the existence of Linux and ESXi variants of LockBit 5.0 in a blog published on September 25.

“The existence of Windows, Linux, and ESXi variants confirms LockBit’s continued cross-platform strategy. This enables simultaneous attacks across entire enterprise networks, from workstations to critical servers hosting databases and virtualization platform,” the researchers noted.

The variants provide more detailed deployment options and settings for affiliates.

Additionally, LockBit 5.0 versions contain significant technical improvements, including the removal of infection markers, faster encryption and enhanced evasion.

The Trend Micro researchers warned that despite the law enforcement takedown operation of LockBit infrastructure in early 2024, the group has demonstrated resilience and an ability to stay ahead of competitors through an “aggressive evolution” of its tactics, techniques and procedures (TTPs).

Read now: LockBit Ransomware Hacked, Insider Secrets Exposed

Technical Analysis of LockBit 5.0

The LockBit 5.0 Windows version was found to have a better user interface with clean formatting for affiliates compared to previous versions.

It describes various options and settings for executing the ransomware, including basic options like specifying directories to encrypt or bypass, operation modes such as invisible mode and verbose mode, notes settings, encryption settings, filtering options and examples of usage.

“The detailed commands and parameters illustrate the flexibility and customization available to the attacker,” the researchers commented.

Upon execution, the ransomware generates its signature ransom note and directs victims to a dedicated leak site. The infrastructure maintains LockBit’s established victim interaction model, featuring a streamlined “Chat with Support” section for ransom negotiations.

Notably, the variant adds randomized 16-character file extensions to files following encryption, further complicating recovery. LockBit 5.0 also omits traditional markers at file endings, making analysis harder.

The malware deploys other anti-forensic techniques. This includes patching the EtwEventWrite API by overwriting it with a 0xC3 (return) instruction, disabling Windows Event Tracing capabilities.

As with previous LockBit versions, the new iteration uses geolocation checks, terminating execution when detecting Russian language settings or Russian geolocation.

The features observed in the Windows version were similar to those in the Linux and ESXi variants analyzed.

The ESXi variant specifically targets VMware virtualization infrastructure, which the researchers said represents a “critical escalation” in LockBit’s capabilities.

This is because ESXi servers typically host multiple virtual machines, allowing attackers to encrypt entire virtualized environments with a single payload execution.

New Ransomware Version an “Evolutionary Development”

The report also highlighted significant code reuse between LockBit 4.0 and 5.0, demonstrating that the new version is an “evolutionary development” rather than a complete rewrite.

As a result, it is likely that 5.0 is a continuation of the LockBit ransomware family and not an imitation or rebrand by other threat actors.

“Both versions share identical hashing algorithms for string operations, a critical component for API resolution, and service identification. The code structure for dynamic API resolution remains remarkably similar between versions, suggesting the developers built upon the existing LockBit 4.0 codebase,” the researchers noted.

A Timeline of LockBit Ransomware Versions

  • LockBit 1.0 was released in January 2020 as “ABCD” ransomware
  • LockBit 2.0 (LockBit Red) was released in June 2021 together with StealBit, the group’s data exfiltration tool
  • LockBit Linux was released in October 2021 to infect Linux and VMWare ESXi systems
  • LockBit 3.0 (LockBit Black) was released in March 2022 and leaked six months later by the group’s disgruntled developer, leading to disruptions within the groups affiliate structure
  • LockBit Green was released in January 2023 and promoted by LockbitSupp as being a major new version – a fact that was later denied by many security professionals, who found it was a rebranded version of a Conti encryptor
  • LockBit 4.0 was teased in late 2024 and was officially released in February 2025. 4.0 introduced new features focused on evading security products. However, security researchers noted it took some steps back from LockBit 3.0, including switching to a simpler packer, not removing Microsoft Defender and encrypting more slowly



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleSonicWall Urges Password Resets After Cloud Backup Breach Affecting Under 5% of Customers
Next Article CISA Warns of Two Malware Strains Exploiting Ivanti EPMM CVE-2025-4427 and CVE-2025-4428
Team-CWD
  • Website

Related Posts

News

China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware

February 7, 2026
News

Badges, Bytes and Blackmail

February 7, 2026
News

Ex-Google Engineer Convicted for Stealing AI Secrets for China Startup

February 7, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

Beware of threats lurking in booby-trapped PDF files

October 7, 2025

Don’t let “back to school” become “back to bullying”

September 11, 2025

How chatbots can help spread scams

October 14, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.