LockBit 5.0: back with enhanced cross-platform capabilities

Despite the historic dismantling carried out by Operation Cronos in February 2024, the LockBit cybercrime group has resurfaced with version 5.0, featuring significant technical improvements while retaining a scalable code base. This new iteration, analyzed in depth by Trend Micro researchers, confirms the extraordinary resilience of the world’s most prolific ransomware group.

In September 2025, on the occasion of their sixth anniversary, the LockBit operators officially unveiled this fifth version, which simultaneously targets Windows, Linux and VMware ESXi environments. This cross-platform approach, initiated since LockBit 2.0 in 2021, has now reached an unprecedented level of sophistication that is of particular concern to cybersecurity experts. Trend Research researchers have analyzed the source binaries of the latest activity of the notorious LockBit ransomware with their version 5.0, which features advanced obfuscation, anti-analysis techniques and transparent cross-platform capabilities for Windows, Linux and ESXi systems.

A strong comeback after Operation Cronos

Operation Cronos, carried out in February 2024 by an international coalition including the FBI, the UK National Crime Agency, Europol and law enforcement agencies from eleven countries, dealt a severe blow to LockBit’s infrastructure. This landmark initiative resulted in the seizure of LockBit’s main servers, the disclosure of decryption keys and the closure of the group’s trading sites.

This operation revealed the scale of their activities: more than 7,000 attacks built using their services between June 2022 and February 2024, according to Europol.However, as analysts had anticipated, the dismantling of such an organized group could only be a temporary victory. The emergence of LockBit 5.0 confirms the fears expressed by the security community: cutting off one head of the cybercriminal hydra can provoke the regrowth of new, sometimes stronger networks. This resurgence is a perfect illustration of the adaptability and resilience of modern ransomware groups.

Chronological evolution of LockBit versions

To better understand the scope of LockBit 5.0, we need to examine the evolution of the group since its inception. The following table illustrates the main innovations and their strategic impact:

VersionPeriodCode nameKey innovationsStrategic impact
LockBit 1.02019-2020“ABCD.abcd extension on encrypted files
– C/C++ implementation
– Basic fast encryption
Initial emergence of the
LockBit 2.02021“RedStealBit: dedicated exfiltration tool
– Automated propagation (SMB, PsExec, WMI)
– Linux and VMware ESXi support
– Structured RaaS program
Transition to industrial model
LockBit 3.02022“Black– Optimized intermittent encryption
– First bug bounty program
– Point-and-click tool for affiliates
– Triple extortion (encryption + theft + publication)
Market domination (40% of incidents)
LockBit 4.0Late 2024 – Early 2025“Green– Complete rewriting in .NET Core
– Stealth-first architecture
– Advanced anti-EDR API release
– Decentralized Tor infrastructure
– Multi-threaded encryption
Response to law enforcement pressure
LockBit 5.0September 2025N/A– Complete modular architecture
– Potential cartel coordination
– Optimized speed/furtivity
– Flexible Tor + Tox communications
– Revamped affiliate program
Post-Cronos renaissance

This progression reveals a strategy of incremental rather than revolutionary evolution, with major breakthrough points in 2021 (industrialization), 2022 (market domination) and 2024-2025 (post-dismantling resilience).

Significant technical improvements

A redesigned user interface

LockBit 5.0 boasts a significantly improved user interface, with clear, professional formatting that was not present in previous versions. This evolution, which makes it easier for affiliates to use, bears witness to the increasing professionalization of the RaaS (Ransomware-as-a-Service) model.

The interface details numerous runtime options and parameters, including the specification of directories to be encrypted or bypassed, invisible and verbose operating modes, ransom note parameters, encryption settings and advanced filtering options. This operational flexibility offers attackers unprecedented customization of their campaigns.

LockBit 5.0 help interface showing available parameters and options
Improved help interface for LockBit 5.0 – Source: Trend Micro

Advanced obfuscation techniques

The Windows variant of LockBit 5.0 uses massive obfuscation and packaging, loading its payload via DLL reflection, which considerably complicates static analysis. The researchers at Trend Research state: “The sample analyzed by Trend Research uses extensive obfuscation via packaging. During debugging, we discovered that it functions as a binary loader, decrypting a PE binary in memory and loading it via DLL reflection methods. This sophisticated loading mechanism considerably complicates static analysis”.

Alongside code obfuscation, the malware implements several advanced anti-analysis techniques, including patching the EtwEventWrite API by replacing it with a 0xC3 (return) instruction, thus disabling Windows Event Tracking (ETW) capabilities. This specific evasion technique directly targets modern detection solutions based on Event Tracing for Windows.

Neutralization of system defenses and forensic erasure

Once execution has been established, LockBit 5.0 eliminates security-related services by comparing hashed service names with a hard-coded list of 63 values, then deletes all event logs using the EvtClearLog API once encryption is complete. This systematic approach aims to neutralize traditional defenses and erase forensic traces of the attack.

The ransomware uses a hash system identical to LockBit 4.0 for service identification, confirming that it is an evolution of the original code rather than an imitation by other malicious actors.

A refined multiplatform strategy

Extended Linux capabilities

The Linux variant of LockBit 5.0 features similar functionality to its Windows counterpart, demonstrating the group’s commitment to cross-platform capabilities. The command-line interface mirrors the formatting and functionality of the Windows version, offering attackers the same operational flexibility on both platforms.

During execution, the Linux variant provides detailed logging of its activities, displaying files targeted for encryption and folders designated for exclusion. This transparency in operation logs suggests that the variant can be used in test environments or by affiliates requiring detailed execution feedback.

Critical threat to virtualized environments

The ESXi variant represents a critical escalation in LockBit’s capabilities, as it specifically targets VMware virtualization infrastructure. As Trend Micro explains: ” this ESXi variant represents a critical escalation in LockBit’s capabilities, as ESXi servers typically host multiple virtual machines, enabling attackers to encrypt entire virtualized environments with the execution of a single payload “.

This capability turns a single attack into an organizational disaster, where dozens or hundreds of virtual machines can be compromised simultaneously. The impact on business continuity then becomes exponential compared with traditional attacks targeting individual workstations.

Features common to all three variants

Random file extensions

All LockBit 5.0 variants use 16-character random file extensions, significantly complicating recovery efforts. Unlike some ransomware variants that use common infection markers, LockBit 5.0 omits traditional markers at the end of files.

This approach makes the identification and analysis of encrypted files more complex for incident response teams. However, Trend Micro’s analysis revealed consistent patterns including the original file size embedded in the footer of the encrypted file.

LockBit 5.0 encrypted files with random 16-character extensions
Encrypted files with random 16-character extensions – Source: Trend Micro

Geolocation mechanisms

In line with previous versions, LockBit 5.0 includes geopolitical protections, terminating execution upon detection of Russian language settings or Russian geolocation. This common practice among Eastern European ransomware groups reflects strategic geopolitical considerations in the development of the malware.

These geographic protection mechanisms suggest a specific geographic origin of the group and constitute a significant technical attribution element for investigators.

Modular architecture and code evolution

Continuity with LockBit 4.0

Comparative analysis between LockBit 4.0 and 5.0 reveals significant code reuse and evolutionary development rather than complete rewriting. Both versions share identical hashing algorithms for string operations, a critical component for API resolution and service identification.

The code structure for dynamic API resolution remains remarkably similar between versions, suggesting that the developers have built on the existing LockBit 4.0 code base. This technical continuity confirms that LockBit 5.0 represents a continuation of the LockBit ransomware family and not an imitation by different threat actors. As Trend Research puts it: ” These similarities are a clear indication that LockBit 5.0 represents a continuation of the LockBit ransomware family and is not an imitation or rebranding by different threat actors “.

Advanced modular approach

LockBit 5.0 introduces a modular architecture allowing affiliates to switch components per campaign. This modularity optimizes speed and enhances anti-detection analysis, while offering flexible communications during negotiations through Tor portals and Tox channels as required.

The system includes revised incentives for affiliates to rebuild the network after the dismantling of Operation Cronos, with signals of cooperation with peer groups and potential cartel-like coordination. The aim is to reduce impact time while reducing the detection surface.

A strategic dimension: towards a ransomware cartel

Beyond its technical improvements, LockBit 5.0 is part of a broader strategy to consolidate the criminal market. On the RAMP forum, DragonForce publicly proposed that LockBit and Qilin form a cartel to create a level playing field, without conflict or public insults. This initiative reflects the growing professionalization of the cybercriminal ecosystem, and a desire to stabilize illicit revenues through cooperation rather than destructive competition.

chat on ramp forum dragonforce cartel propose to Locbit and Quilin
Messages on the RAMP forum suggest that DragonForce is proposing to form a cartel with LockBit and Qilin – Source SocRadar

This collaborative approach could enable participating groups to pool their technical resources, share intelligence on targets and coordinate their campaigns to avoid interference. The formation of such a cartel would represent a major evolution in the organization of cybercrime, transforming individual players into a structured consortium capable of exerting increased systemic pressure on companies and institutions.

Cartel-like consolidation would also facilitate the standardization of practices and optimization of criminal processes, enabling even greater industrialization of ransomware operations. This development is of particular concern to analysts, as it could lead to a significant increase in the volume and sophistication of attacks.

Impact on the threat ecosystem

Democratization of advanced techniques

The reduction in affiliate program barriers (automatic enrolment, broader recruitment) means that intrusion techniques are more varied from one campaign to the next. This evolution lowers the technical threshold required to carry out sophisticated attacks, potentially broadening the pool of malicious actors capable of exploiting the platform.

Payloads are often launched filelessly via PowerShell or hijacked legitimate binaries (Living off the Land Binaries – LOLBins), and constructs can include expiring validity periods, hampering post-incident analysis. This fileless approach significantly complicates detection by traditional security solutions.

Evasion tactics evolve

LockBit 5.0 introduces expanded process termination lists, advanced API stall and built-in obfuscation in the modular architecture. These technical enhancements are specifically targeted at modern security solutions, including Endpoint Detection and Response (EDR) tools and SIEM platforms.

Observed techniques include shutting down antivirus and backup agents, deleting shadow copies via the vssadmin delete shadows command, deleting logs and detection checks on sandbox and virtual machine environments. This holistic approach to evasion demonstrates a deep understanding of contemporary organizational defenses.

Defensive recommendations

Multi-layered detection approach

Experts recommend that organizations adopt an urgent multi-layered detection approach, recognizing that static signatures and traditional rules are no longer sufficient. Detection systems need to incorporate up-to-date threat intelligence data, learn from ongoing attacks and dynamically adapt to new evasion techniques.

Behavioral detection becomes crucial to identify anomalous login activity, repeated authentication failures and suspicious scripting activity, particularly PowerShell-generated child processes. SOC teams also need to monitor registry access outside normal baselines.

Enhanced protection for virtualized environments

The ESXi variant of LockBit 5.0 requires specific protection measures for virtualization infrastructures:

  • strict network segmentation of virtualization infrastructures to isolate hypervisors from production networks
  • enhanced monitoring of ESXi administrator access, with mandatory multi-factor authentication and real-time monitoring
  • isolated backups of VM configurations and datastores maintained offline, with regular restore tests
  • monitoring of critical commands and snapshots to detect suspicious manipulations
  • hardening of management interfaces with deactivation of non-essential services

Faster patch cycles

When uptime is measured in hours, patching can no longer be a process lasting several weeks. Automated patch validation and deployment pipelines become essential in the face of LockBit 5.0’s speed of operation.

Organizations also need to monitor dark web discussions and underground forums as a critical defensive input. These early signals provide vital preparation time before new attack techniques are deployed.

Future challenges and strategic implications

Industrialization of cybercrime

LockBit 5.0 represents the embodiment of the industrialization of cybercrime, where once artisanal processes become large-scale operations optimized for efficiency and profitability. This evolution is transforming the digital underground economy, creating new business models based on automation and scalability.

The ability to launch simultaneous attacks against thousands of targets with a single operator is revolutionizing the attack economy. This industrial scalability favors mass ransomware and enables cybercriminals to enrich themselves rapidly, while dramatically compressing the defensive reaction window.

Continuous evolution expected

The existence of Windows, Linux and ESXi versions confirms LockBit’s ongoing cross-platform strategy, enabling simultaneous attacks across entire corporate networks, from workstations to critical servers hosting databases and virtualization platforms. As Trend Micro points out: “the existence of Windows, Linux and ESXi variants confirms LockBit’s ongoing multiplatform strategy, enabling simultaneous attacks across entire corporate networks, including virtualized environments*”.

LockBit 5.0’s architectural modularity also facilitates the rapid integration of new features and adaptation to emerging defensive countermeasures, suggesting a capacity for continuous and accelerated evolution.

Conclusion

LockBit 5.0 marks a turning point in the evolution of ransomware, confirming that the temporary dismantling of a cybercriminal group is only a fleeting victory against such resilient and adaptive criminal organizations. The technical sophistication of this new version, combined with its multiplatform approach and advanced evasion capabilities, makes it significantly more dangerous than its predecessors.

Theheavy obfuscation and technical enhancements of all variants make LockBit 5.0 significantly more dangerous than its predecessors, considerably delaying the development of detection signatures. This evolution is forcing organizations to rethink their traditional defense strategies in favor of adaptive approaches driven by artificial intelligence.

For defenders, the urgency is threefold: address current vulnerabilities with unprecedented speed, prepare for a future where AI-driven orchestration will be the norm, and develop countermeasures capable of rivaling the growing sophistication of offensive tools. The sooner the security community adapts – by patching faster, detecting smarter and responding at machine speed – the greater our ability to keep pace in this new era of industrialized cyber conflict.

Main article sources:

Partager cet article

Leave a Reply

Your email address will not be published. Required fields are marked *