Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

LockBit strikes with new 5.0 version, targeting Windows, Linux and ESXI systems

0
Medium
Published: Thu Feb 12 2026 (02/12/2026, 15:08:39 UTC)
Source: AlienVault OTX General

Description

LockBit 5.0, the latest version of the notorious ransomware, has been released with support for Windows, Linux, and ESXi systems. This update brings improved defense evasion, faster encryption, and enhanced modularity. The Windows variant employs extensive anti-analysis techniques, while Linux and ESXi versions remain unpacked. All variants share a common encryption scheme using XChaCha20 and Curve25519. LockBit 5.0 demonstrates a focus on enterprise and infrastructure targets, including explicit support for Proxmox virtualization. The group's data leak site reveals a primary focus on the U.S. business sector, with victims spanning various industries. LockBit's infrastructure has shown connections to SmokeLoader, suggesting possible cooperation or infrastructure reuse among malware operators.

AI-Powered Analysis

AILast updated: 02/12/2026, 22:19:45 UTC

Technical Analysis

LockBit 5.0 represents a significant evolution of the LockBit ransomware family, expanding its reach beyond Windows to include Linux and ESXi virtualization platforms. This multi-platform support allows attackers to target a wider range of enterprise infrastructure, including virtualized environments such as Proxmox. The ransomware employs a common encryption scheme based on modern cryptographic primitives XChaCha20 and Curve25519, which provide strong confidentiality guarantees and complicate decryption efforts without the key. The Windows variant incorporates advanced anti-analysis techniques, such as obfuscation and anti-debugging, to hinder reverse engineering and detection. In contrast, the Linux and ESXi variants are delivered unpacked, possibly to facilitate rapid deployment in those environments. LockBit 5.0 also demonstrates modularity improvements, allowing attackers to customize payloads and potentially add new capabilities over time. The group continues to leverage double-extortion tactics by exfiltrating data and threatening public leaks, increasing pressure on victims to pay ransoms. The infrastructure shows connections to the SmokeLoader malware, suggesting either cooperation between threat actors or reuse of existing malware infrastructure, which may facilitate initial access or payload delivery. While the primary victim profile remains U.S.-based enterprises, the technical capabilities and targeting of virtualization platforms indicate a broader potential impact on global organizations. No public exploits have been reported, but the sophistication and multi-platform nature of LockBit 5.0 make it a significant threat to organizations with mixed OS environments and virtualized infrastructure.

Potential Impact

European organizations face considerable risks from LockBit 5.0 due to its ability to compromise critical infrastructure components such as ESXi and Proxmox virtualization platforms, which are widely used in enterprise data centers across Europe. Successful infections can lead to widespread encryption of data, operational disruption, and potential loss of sensitive information through double-extortion leaks. The ransomware's advanced defense evasion techniques increase the likelihood of prolonged undetected presence, enabling attackers to escalate privileges, move laterally, and maximize damage. Industries with heavy reliance on virtualized environments, such as finance, manufacturing, healthcare, and public sector entities, are particularly vulnerable. The potential downtime and data loss could result in significant financial losses, regulatory penalties under GDPR for data breaches, and reputational damage. Additionally, the link to SmokeLoader infrastructure suggests that initial access vectors may include phishing or malware campaigns, which are common attack vectors in Europe. The medium severity rating reflects the complexity of the attack and the broad scope of affected systems, emphasizing the need for proactive defense measures.

Mitigation Recommendations

European organizations should implement targeted mitigation strategies beyond standard ransomware defenses. First, ensure strict network segmentation between virtualized infrastructure and user networks to limit lateral movement. Harden ESXi and Proxmox management interfaces by enforcing multi-factor authentication, limiting access to trusted IPs, and applying the latest security patches even if no direct patches for LockBit exist. Deploy endpoint detection and response (EDR) solutions capable of detecting behavioral indicators linked to LockBit’s TTPs, such as privilege escalation (T1068), process injection (T1055), and defense evasion (T1562.002). Regularly audit and restrict administrative privileges, especially on virtualization hosts. Maintain offline, immutable backups of critical data and system states to enable recovery without paying ransom. Monitor network traffic for unusual outbound connections that could indicate data exfiltration attempts or command and control communications, particularly those associated with SmokeLoader infrastructure. Conduct phishing awareness training to reduce initial infection vectors. Finally, establish incident response plans tailored to multi-platform ransomware scenarios, including coordination with law enforcement and cybersecurity agencies.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.acronis.com/en/tru/posts/lockbit-strikes-with-new-50-version-targeting-windows-linux-and-esxi-systems"]
Adversary
LockBit
Pulse Id
698decf7c51aab4b1d04c8f1
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash5e1f61b9c1c27cad3b7a81c804ac7b86
hash95daa771a28eaed76eb01e1e8f403f7c
hash9bcff8da7165977f973ace12dd4c0ce0
hasha1539b21e5d6849a3e0cf87a4dc70335
hashca93d47bcc55e2e1bd4a679afc8e2e25
hashe818a9afd55693d556a47002a7b7ef31
hash41e1e094c19fffde494c24ef4cab0d7577d5a025
hash561db92000409fe7093964452143ec371f930681
hash801a97a2fe5c3749b713d71172de6eafb961a888
hashc1888ba296f57e87a84411ddfce3cabc4536b142
hashcdd5717fd3bfd375c1c34237c24073e92ad6dccc
hashec48107db718775109347d49f8cf3c569df55f0b
hash180e93a091f8ab584a827da92c560c78f468c45f2539f73ab2deb308fb837b38
hash1da6525ae1ef83b6f1dc02396ef0933732f9ffdfca0fda9b2478d32a54e3069b
hash4dc06ecee904b9165fa699b026045c1b6408cc7061df3d2a7bc2b7b4f0879f4d
hash7ea5afbc166c4e23498aa9747be81ceaf8dad90b8daa07a6e4644dc7c2277b82
hash90b06f07eb75045ea3d4ba6577afc9b58078eafeb2cdd417e2a88d7ccf0c0273
hash98d8c7870c8e99ca6c8c25bb9ef79f71c25912fbb65698a9a6f22709b8ad34b6

Domain

ValueDescriptionCopy
domainlockbit7z2jwcskxpbokpemdxmltipntwlkmidcll2qirbu7ykg46eyd.onion
domainlockbit7z2mmiz3ryxafn5kapbvbbiywsxwovasfkgf5dqqp5kxlajad.onion
domainlockbit7z2og4jlsmdy7dzty3g42eu3gh2sx2b6ywtvhrjtss7li4fyd.onion
domainlockbit7z355oalq4hiy5p7de64l6rsqutwlvydqje56uvevcc57r6qd.onion
domainlockbit7z36ynytxwjzuoao46ck7b3753gpedary3qvuizn3iczhe4id.onion
domainlockbit7z37ntefjdbjextn6tmdkry4j546ejnru5cejeguitiopvhad.onion
domainlockbit7z3azdoxdpqxzliszutufbc2fldagztdu47xyucp25p4xtqad.onion
domainlockbit7z3ddvg5vuez2vznt73ljqgwx5tnuqaa2ye7lns742yiv2zyd.onion
domainlockbit7z3hv7ev5knxbrhsvv2mmu2rddwqizdz4vwfvxt5izrq6zqqd.onion
domainlockbit7z3ujnkhxwahhjduh5me2updvzxewhhc5qvk2snxezoi5drad.onion
domainlockbit7z4bsm63m3dagp5xglyacr4z4bwytkvkkwtn6enmuo5fi5iyd.onion
domainlockbit7z4cgxvictidwfxpuiov4scdw34nxotmbdjyxpkvkg34mykyd.onion
domainlockbit7z4k5zer5fbqi2vdq5sx2vuggatwyqvoodrkhubxftyrvncid.onion
domainlockbit7z4ndl6thsct34yd47jrzdkpnfg3acfvpacuccb45pnars2ad.onion
domainlockbit7z55tuwaflw2c7torcryobdvhkcgvivhflyndyvcrexafssad.onion
domainlockbit7z57mkicfkuq44j6yrpu5finwvjllczkkp2uvdedsdonjztyd.onion
domainlockbit7z5ehshj6gzpetw5kso3onts6ty7wrnneya5u4aj3vzkeoaqd.onion
domainlockbit7z5hwf6ywfuzipoa42tjlmal3x5suuccngsamsgklww2xgyqd.onion
domainlockbit7z5ltrhzv46lsg447o3cx2637dloc3qt4ugd3gr2xdkkkeayd.onion
domainlockbit7z6choojah4ipvdpzzfzxxchjbecnmtn4povk6ifdvx2dpnid.onion
domainlockbit7z6dqziutocr43onmvpth32njp4abfocfauk2belljjpobxyd.onion
domainlockbit7z6f3gu6rjvrysn5gjbsqj3hk3bvsg64ns6pjldqr2xhvhsyd.onion
domainlockbit7z6qinyhhmibvycu5kwmcvgrbpvtztkvvmdce5zwtucaeyrqd.onion
domainlockbit7z6rzyojiye437jp744d4uwtff7aq7df7gh2jvwqtv525c4yd.onion
domainlockbitfbinpwhbyomxkiqtwhwiyetrbkb4hnqmshaonqxmsrqwg7yad.onion
domainlockbitsuppyx2jegaoyiw44ica5vdho63m5ijjlmfb7omq3tfr3qhyd.onion
domainrodericwalter.com

Threat ID: 698e4e5cc9e1ff5ad82069be

Added to database: 2/12/2026, 10:04:12 PM

Last enriched: 2/12/2026, 10:19:45 PM

Last updated: 2/20/2026, 9:21:33 PM

Views: 204

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats