LockBit strikes with new 5.0 version, targeting Windows, Linux and ESXI systems
LockBit 5.0, the latest version of the notorious ransomware, has been released with support for Windows, Linux, and ESXi systems. This update brings improved defense evasion, faster encryption, and enhanced modularity. The Windows variant employs extensive anti-analysis techniques, while Linux and ESXi versions remain unpacked. All variants share a common encryption scheme using XChaCha20 and Curve25519. LockBit 5.0 demonstrates a focus on enterprise and infrastructure targets, including explicit support for Proxmox virtualization. The group's data leak site reveals a primary focus on the U.S. business sector, with victims spanning various industries. LockBit's infrastructure has shown connections to SmokeLoader, suggesting possible cooperation or infrastructure reuse among malware operators.
AI Analysis
Technical Summary
LockBit 5.0 represents a significant evolution of the LockBit ransomware family, expanding its reach beyond Windows to include Linux and ESXi virtualization platforms. This multi-platform support allows attackers to target a wider range of enterprise infrastructure, including virtualized environments such as Proxmox. The ransomware employs a common encryption scheme based on modern cryptographic primitives XChaCha20 and Curve25519, which provide strong confidentiality guarantees and complicate decryption efforts without the key. The Windows variant incorporates advanced anti-analysis techniques, such as obfuscation and anti-debugging, to hinder reverse engineering and detection. In contrast, the Linux and ESXi variants are delivered unpacked, possibly to facilitate rapid deployment in those environments. LockBit 5.0 also demonstrates modularity improvements, allowing attackers to customize payloads and potentially add new capabilities over time. The group continues to leverage double-extortion tactics by exfiltrating data and threatening public leaks, increasing pressure on victims to pay ransoms. The infrastructure shows connections to the SmokeLoader malware, suggesting either cooperation between threat actors or reuse of existing malware infrastructure, which may facilitate initial access or payload delivery. While the primary victim profile remains U.S.-based enterprises, the technical capabilities and targeting of virtualization platforms indicate a broader potential impact on global organizations. No public exploits have been reported, but the sophistication and multi-platform nature of LockBit 5.0 make it a significant threat to organizations with mixed OS environments and virtualized infrastructure.
Potential Impact
European organizations face considerable risks from LockBit 5.0 due to its ability to compromise critical infrastructure components such as ESXi and Proxmox virtualization platforms, which are widely used in enterprise data centers across Europe. Successful infections can lead to widespread encryption of data, operational disruption, and potential loss of sensitive information through double-extortion leaks. The ransomware's advanced defense evasion techniques increase the likelihood of prolonged undetected presence, enabling attackers to escalate privileges, move laterally, and maximize damage. Industries with heavy reliance on virtualized environments, such as finance, manufacturing, healthcare, and public sector entities, are particularly vulnerable. The potential downtime and data loss could result in significant financial losses, regulatory penalties under GDPR for data breaches, and reputational damage. Additionally, the link to SmokeLoader infrastructure suggests that initial access vectors may include phishing or malware campaigns, which are common attack vectors in Europe. The medium severity rating reflects the complexity of the attack and the broad scope of affected systems, emphasizing the need for proactive defense measures.
Mitigation Recommendations
European organizations should implement targeted mitigation strategies beyond standard ransomware defenses. First, ensure strict network segmentation between virtualized infrastructure and user networks to limit lateral movement. Harden ESXi and Proxmox management interfaces by enforcing multi-factor authentication, limiting access to trusted IPs, and applying the latest security patches even if no direct patches for LockBit exist. Deploy endpoint detection and response (EDR) solutions capable of detecting behavioral indicators linked to LockBit’s TTPs, such as privilege escalation (T1068), process injection (T1055), and defense evasion (T1562.002). Regularly audit and restrict administrative privileges, especially on virtualization hosts. Maintain offline, immutable backups of critical data and system states to enable recovery without paying ransom. Monitor network traffic for unusual outbound connections that could indicate data exfiltration attempts or command and control communications, particularly those associated with SmokeLoader infrastructure. Conduct phishing awareness training to reduce initial infection vectors. Finally, establish incident response plans tailored to multi-platform ransomware scenarios, including coordination with law enforcement and cybersecurity agencies.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Belgium, Sweden, Switzerland
Indicators of Compromise
- hash: 5e1f61b9c1c27cad3b7a81c804ac7b86
- hash: 95daa771a28eaed76eb01e1e8f403f7c
- hash: 9bcff8da7165977f973ace12dd4c0ce0
- hash: a1539b21e5d6849a3e0cf87a4dc70335
- hash: ca93d47bcc55e2e1bd4a679afc8e2e25
- hash: e818a9afd55693d556a47002a7b7ef31
- hash: 41e1e094c19fffde494c24ef4cab0d7577d5a025
- hash: 561db92000409fe7093964452143ec371f930681
- hash: 801a97a2fe5c3749b713d71172de6eafb961a888
- hash: c1888ba296f57e87a84411ddfce3cabc4536b142
- hash: cdd5717fd3bfd375c1c34237c24073e92ad6dccc
- hash: ec48107db718775109347d49f8cf3c569df55f0b
- hash: 180e93a091f8ab584a827da92c560c78f468c45f2539f73ab2deb308fb837b38
- hash: 1da6525ae1ef83b6f1dc02396ef0933732f9ffdfca0fda9b2478d32a54e3069b
- hash: 4dc06ecee904b9165fa699b026045c1b6408cc7061df3d2a7bc2b7b4f0879f4d
- hash: 7ea5afbc166c4e23498aa9747be81ceaf8dad90b8daa07a6e4644dc7c2277b82
- hash: 90b06f07eb75045ea3d4ba6577afc9b58078eafeb2cdd417e2a88d7ccf0c0273
- hash: 98d8c7870c8e99ca6c8c25bb9ef79f71c25912fbb65698a9a6f22709b8ad34b6
- domain: lockbit7z2jwcskxpbokpemdxmltipntwlkmidcll2qirbu7ykg46eyd.onion
- domain: lockbit7z2mmiz3ryxafn5kapbvbbiywsxwovasfkgf5dqqp5kxlajad.onion
- domain: lockbit7z2og4jlsmdy7dzty3g42eu3gh2sx2b6ywtvhrjtss7li4fyd.onion
- domain: lockbit7z355oalq4hiy5p7de64l6rsqutwlvydqje56uvevcc57r6qd.onion
- domain: lockbit7z36ynytxwjzuoao46ck7b3753gpedary3qvuizn3iczhe4id.onion
- domain: lockbit7z37ntefjdbjextn6tmdkry4j546ejnru5cejeguitiopvhad.onion
- domain: lockbit7z3azdoxdpqxzliszutufbc2fldagztdu47xyucp25p4xtqad.onion
- domain: lockbit7z3ddvg5vuez2vznt73ljqgwx5tnuqaa2ye7lns742yiv2zyd.onion
- domain: lockbit7z3hv7ev5knxbrhsvv2mmu2rddwqizdz4vwfvxt5izrq6zqqd.onion
- domain: lockbit7z3ujnkhxwahhjduh5me2updvzxewhhc5qvk2snxezoi5drad.onion
- domain: lockbit7z4bsm63m3dagp5xglyacr4z4bwytkvkkwtn6enmuo5fi5iyd.onion
- domain: lockbit7z4cgxvictidwfxpuiov4scdw34nxotmbdjyxpkvkg34mykyd.onion
- domain: lockbit7z4k5zer5fbqi2vdq5sx2vuggatwyqvoodrkhubxftyrvncid.onion
- domain: lockbit7z4ndl6thsct34yd47jrzdkpnfg3acfvpacuccb45pnars2ad.onion
- domain: lockbit7z55tuwaflw2c7torcryobdvhkcgvivhflyndyvcrexafssad.onion
- domain: lockbit7z57mkicfkuq44j6yrpu5finwvjllczkkp2uvdedsdonjztyd.onion
- domain: lockbit7z5ehshj6gzpetw5kso3onts6ty7wrnneya5u4aj3vzkeoaqd.onion
- domain: lockbit7z5hwf6ywfuzipoa42tjlmal3x5suuccngsamsgklww2xgyqd.onion
- domain: lockbit7z5ltrhzv46lsg447o3cx2637dloc3qt4ugd3gr2xdkkkeayd.onion
- domain: lockbit7z6choojah4ipvdpzzfzxxchjbecnmtn4povk6ifdvx2dpnid.onion
- domain: lockbit7z6dqziutocr43onmvpth32njp4abfocfauk2belljjpobxyd.onion
- domain: lockbit7z6f3gu6rjvrysn5gjbsqj3hk3bvsg64ns6pjldqr2xhvhsyd.onion
- domain: lockbit7z6qinyhhmibvycu5kwmcvgrbpvtztkvvmdce5zwtucaeyrqd.onion
- domain: lockbit7z6rzyojiye437jp744d4uwtff7aq7df7gh2jvwqtv525c4yd.onion
- domain: lockbitfbinpwhbyomxkiqtwhwiyetrbkb4hnqmshaonqxmsrqwg7yad.onion
- domain: lockbitsuppyx2jegaoyiw44ica5vdho63m5ijjlmfb7omq3tfr3qhyd.onion
- domain: rodericwalter.com
LockBit strikes with new 5.0 version, targeting Windows, Linux and ESXI systems
Description
LockBit 5.0, the latest version of the notorious ransomware, has been released with support for Windows, Linux, and ESXi systems. This update brings improved defense evasion, faster encryption, and enhanced modularity. The Windows variant employs extensive anti-analysis techniques, while Linux and ESXi versions remain unpacked. All variants share a common encryption scheme using XChaCha20 and Curve25519. LockBit 5.0 demonstrates a focus on enterprise and infrastructure targets, including explicit support for Proxmox virtualization. The group's data leak site reveals a primary focus on the U.S. business sector, with victims spanning various industries. LockBit's infrastructure has shown connections to SmokeLoader, suggesting possible cooperation or infrastructure reuse among malware operators.
AI-Powered Analysis
Technical Analysis
LockBit 5.0 represents a significant evolution of the LockBit ransomware family, expanding its reach beyond Windows to include Linux and ESXi virtualization platforms. This multi-platform support allows attackers to target a wider range of enterprise infrastructure, including virtualized environments such as Proxmox. The ransomware employs a common encryption scheme based on modern cryptographic primitives XChaCha20 and Curve25519, which provide strong confidentiality guarantees and complicate decryption efforts without the key. The Windows variant incorporates advanced anti-analysis techniques, such as obfuscation and anti-debugging, to hinder reverse engineering and detection. In contrast, the Linux and ESXi variants are delivered unpacked, possibly to facilitate rapid deployment in those environments. LockBit 5.0 also demonstrates modularity improvements, allowing attackers to customize payloads and potentially add new capabilities over time. The group continues to leverage double-extortion tactics by exfiltrating data and threatening public leaks, increasing pressure on victims to pay ransoms. The infrastructure shows connections to the SmokeLoader malware, suggesting either cooperation between threat actors or reuse of existing malware infrastructure, which may facilitate initial access or payload delivery. While the primary victim profile remains U.S.-based enterprises, the technical capabilities and targeting of virtualization platforms indicate a broader potential impact on global organizations. No public exploits have been reported, but the sophistication and multi-platform nature of LockBit 5.0 make it a significant threat to organizations with mixed OS environments and virtualized infrastructure.
Potential Impact
European organizations face considerable risks from LockBit 5.0 due to its ability to compromise critical infrastructure components such as ESXi and Proxmox virtualization platforms, which are widely used in enterprise data centers across Europe. Successful infections can lead to widespread encryption of data, operational disruption, and potential loss of sensitive information through double-extortion leaks. The ransomware's advanced defense evasion techniques increase the likelihood of prolonged undetected presence, enabling attackers to escalate privileges, move laterally, and maximize damage. Industries with heavy reliance on virtualized environments, such as finance, manufacturing, healthcare, and public sector entities, are particularly vulnerable. The potential downtime and data loss could result in significant financial losses, regulatory penalties under GDPR for data breaches, and reputational damage. Additionally, the link to SmokeLoader infrastructure suggests that initial access vectors may include phishing or malware campaigns, which are common attack vectors in Europe. The medium severity rating reflects the complexity of the attack and the broad scope of affected systems, emphasizing the need for proactive defense measures.
Mitigation Recommendations
European organizations should implement targeted mitigation strategies beyond standard ransomware defenses. First, ensure strict network segmentation between virtualized infrastructure and user networks to limit lateral movement. Harden ESXi and Proxmox management interfaces by enforcing multi-factor authentication, limiting access to trusted IPs, and applying the latest security patches even if no direct patches for LockBit exist. Deploy endpoint detection and response (EDR) solutions capable of detecting behavioral indicators linked to LockBit’s TTPs, such as privilege escalation (T1068), process injection (T1055), and defense evasion (T1562.002). Regularly audit and restrict administrative privileges, especially on virtualization hosts. Maintain offline, immutable backups of critical data and system states to enable recovery without paying ransom. Monitor network traffic for unusual outbound connections that could indicate data exfiltration attempts or command and control communications, particularly those associated with SmokeLoader infrastructure. Conduct phishing awareness training to reduce initial infection vectors. Finally, establish incident response plans tailored to multi-platform ransomware scenarios, including coordination with law enforcement and cybersecurity agencies.
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.acronis.com/en/tru/posts/lockbit-strikes-with-new-50-version-targeting-windows-linux-and-esxi-systems"]
- Adversary
- LockBit
- Pulse Id
- 698decf7c51aab4b1d04c8f1
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hash5e1f61b9c1c27cad3b7a81c804ac7b86 | — | |
hash95daa771a28eaed76eb01e1e8f403f7c | — | |
hash9bcff8da7165977f973ace12dd4c0ce0 | — | |
hasha1539b21e5d6849a3e0cf87a4dc70335 | — | |
hashca93d47bcc55e2e1bd4a679afc8e2e25 | — | |
hashe818a9afd55693d556a47002a7b7ef31 | — | |
hash41e1e094c19fffde494c24ef4cab0d7577d5a025 | — | |
hash561db92000409fe7093964452143ec371f930681 | — | |
hash801a97a2fe5c3749b713d71172de6eafb961a888 | — | |
hashc1888ba296f57e87a84411ddfce3cabc4536b142 | — | |
hashcdd5717fd3bfd375c1c34237c24073e92ad6dccc | — | |
hashec48107db718775109347d49f8cf3c569df55f0b | — | |
hash180e93a091f8ab584a827da92c560c78f468c45f2539f73ab2deb308fb837b38 | — | |
hash1da6525ae1ef83b6f1dc02396ef0933732f9ffdfca0fda9b2478d32a54e3069b | — | |
hash4dc06ecee904b9165fa699b026045c1b6408cc7061df3d2a7bc2b7b4f0879f4d | — | |
hash7ea5afbc166c4e23498aa9747be81ceaf8dad90b8daa07a6e4644dc7c2277b82 | — | |
hash90b06f07eb75045ea3d4ba6577afc9b58078eafeb2cdd417e2a88d7ccf0c0273 | — | |
hash98d8c7870c8e99ca6c8c25bb9ef79f71c25912fbb65698a9a6f22709b8ad34b6 | — |
Domain
| Value | Description | Copy |
|---|---|---|
domainlockbit7z2jwcskxpbokpemdxmltipntwlkmidcll2qirbu7ykg46eyd.onion | — | |
domainlockbit7z2mmiz3ryxafn5kapbvbbiywsxwovasfkgf5dqqp5kxlajad.onion | — | |
domainlockbit7z2og4jlsmdy7dzty3g42eu3gh2sx2b6ywtvhrjtss7li4fyd.onion | — | |
domainlockbit7z355oalq4hiy5p7de64l6rsqutwlvydqje56uvevcc57r6qd.onion | — | |
domainlockbit7z36ynytxwjzuoao46ck7b3753gpedary3qvuizn3iczhe4id.onion | — | |
domainlockbit7z37ntefjdbjextn6tmdkry4j546ejnru5cejeguitiopvhad.onion | — | |
domainlockbit7z3azdoxdpqxzliszutufbc2fldagztdu47xyucp25p4xtqad.onion | — | |
domainlockbit7z3ddvg5vuez2vznt73ljqgwx5tnuqaa2ye7lns742yiv2zyd.onion | — | |
domainlockbit7z3hv7ev5knxbrhsvv2mmu2rddwqizdz4vwfvxt5izrq6zqqd.onion | — | |
domainlockbit7z3ujnkhxwahhjduh5me2updvzxewhhc5qvk2snxezoi5drad.onion | — | |
domainlockbit7z4bsm63m3dagp5xglyacr4z4bwytkvkkwtn6enmuo5fi5iyd.onion | — | |
domainlockbit7z4cgxvictidwfxpuiov4scdw34nxotmbdjyxpkvkg34mykyd.onion | — | |
domainlockbit7z4k5zer5fbqi2vdq5sx2vuggatwyqvoodrkhubxftyrvncid.onion | — | |
domainlockbit7z4ndl6thsct34yd47jrzdkpnfg3acfvpacuccb45pnars2ad.onion | — | |
domainlockbit7z55tuwaflw2c7torcryobdvhkcgvivhflyndyvcrexafssad.onion | — | |
domainlockbit7z57mkicfkuq44j6yrpu5finwvjllczkkp2uvdedsdonjztyd.onion | — | |
domainlockbit7z5ehshj6gzpetw5kso3onts6ty7wrnneya5u4aj3vzkeoaqd.onion | — | |
domainlockbit7z5hwf6ywfuzipoa42tjlmal3x5suuccngsamsgklww2xgyqd.onion | — | |
domainlockbit7z5ltrhzv46lsg447o3cx2637dloc3qt4ugd3gr2xdkkkeayd.onion | — | |
domainlockbit7z6choojah4ipvdpzzfzxxchjbecnmtn4povk6ifdvx2dpnid.onion | — | |
domainlockbit7z6dqziutocr43onmvpth32njp4abfocfauk2belljjpobxyd.onion | — | |
domainlockbit7z6f3gu6rjvrysn5gjbsqj3hk3bvsg64ns6pjldqr2xhvhsyd.onion | — | |
domainlockbit7z6qinyhhmibvycu5kwmcvgrbpvtztkvvmdce5zwtucaeyrqd.onion | — | |
domainlockbit7z6rzyojiye437jp744d4uwtff7aq7df7gh2jvwqtv525c4yd.onion | — | |
domainlockbitfbinpwhbyomxkiqtwhwiyetrbkb4hnqmshaonqxmsrqwg7yad.onion | — | |
domainlockbitsuppyx2jegaoyiw44ica5vdho63m5ijjlmfb7omq3tfr3qhyd.onion | — | |
domainrodericwalter.com | — |
Threat ID: 698e4e5cc9e1ff5ad82069be
Added to database: 2/12/2026, 10:04:12 PM
Last enriched: 2/12/2026, 10:19:45 PM
Last updated: 2/20/2026, 9:21:33 PM
Views: 204
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
DNS Used to Hide Fake Investment Platform Schemes
MediumClickFix in action: how fake captcha can encrypt an entire company
MediumFake Homebrew Pages Deliver Cuckoo Stealer via ClickFix | macOS Threat Hunting Analysis
MediumThe Curious Case of the Triton Malware Fork
MediumInvitation to Trouble: The Rise of Calendar Phishing Attacks
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.