Skip to main content

OINT - Hunting the LockBit Gang's Exfiltration Infrastructures

High
Published: Fri Sep 24 2021 (09/24/2021, 00:00:00 UTC)
Source: CIRCL
Vendor/Project: type
Product: osint

Description

OINT - Hunting the LockBit Gang's Exfiltration Infrastructures

AI-Powered Analysis

AILast updated: 06/19/2025, 14:16:44 UTC

Technical Analysis

The threat pertains to the LockBit ransomware gang's exfiltration infrastructures, as analyzed through Open-Source Intelligence (OSINT) by CIRCL. LockBit is a well-known ransomware group that employs sophisticated payload delivery mechanisms and network activity to infiltrate and compromise target systems. This particular analysis focuses on hunting and identifying the infrastructure used by LockBit for data exfiltration, which is a critical phase in their ransomware campaigns. The exfiltration infrastructure typically includes command and control servers, data staging points, and communication channels that facilitate the unauthorized transfer of sensitive data from victim networks to attacker-controlled environments. Although no specific affected software versions or patches are available, the threat is categorized under malware and ransomware, emphasizing its role in payload delivery and network-based activities. The OSINT nature of this report indicates that the findings are derived from publicly available data sources, with a certainty level of 50%, suggesting moderate confidence in the intelligence. The absence of known exploits in the wild implies that this is not a vulnerability-based attack but rather an operational insight into the LockBit gang's tactics, techniques, and procedures (TTPs). The threat level is marked as high, reflecting the significant risk posed by LockBit ransomware operations, which often result in data breaches, operational disruption, and financial extortion. The analysis timestamp dates back to late 2021, indicating ongoing relevance of the threat landscape surrounding LockBit's exfiltration activities.

Potential Impact

For European organizations, the LockBit ransomware threat poses substantial risks including data confidentiality breaches, operational downtime, and financial losses due to ransom payments and remediation costs. The exfiltration infrastructure enables attackers to steal sensitive corporate, personal, or governmental data before encrypting systems, increasing the risk of data leaks and regulatory penalties under GDPR. Critical sectors such as finance, healthcare, manufacturing, and government are particularly vulnerable due to the high value of their data and the potential disruption ransomware can cause. The operational impact includes potential loss of business continuity, reputational damage, and increased cybersecurity insurance premiums. Additionally, the sophistication of LockBit's infrastructure suggests that attacks may evade traditional detection mechanisms, complicating incident response efforts. The threat also underscores the risk of secondary impacts such as supply chain compromise and cascading effects on interconnected systems within European digital ecosystems.

Mitigation Recommendations

Given the nature of LockBit's exfiltration infrastructure, European organizations should implement targeted mitigations beyond generic ransomware advice. These include: 1) Deploy advanced network monitoring and anomaly detection tools focused on identifying unusual outbound data flows indicative of exfiltration attempts. 2) Conduct regular threat hunting exercises leveraging updated OSINT feeds related to LockBit infrastructure to proactively identify potential indicators of compromise. 3) Enforce strict network segmentation and least privilege access controls to limit lateral movement and data access within internal networks. 4) Implement multi-factor authentication (MFA) and robust credential management to reduce the risk of initial access. 5) Utilize data loss prevention (DLP) technologies to monitor and block unauthorized data transfers. 6) Maintain comprehensive and tested offline backups to ensure rapid recovery without paying ransom. 7) Collaborate with national Computer Security Incident Response Teams (CSIRTs) and share threat intelligence to stay informed about emerging LockBit tactics. 8) Regularly update and patch all systems, even though no specific patches exist for this threat, to reduce the attack surface for initial compromise. 9) Train employees on phishing and social engineering awareness, as these are common initial vectors for ransomware groups.

Need more detailed analysis?Get Pro

Technical Details

Threat Level
1
Analysis
2
Uuid
67a072d6-3d20-4024-a987-e8fdd226a075
Original Timestamp
1632483195

Indicators of Compromise

Hash

ValueDescriptionCopy
hash3407f26b3d69f1dfce76782fee1256274cf92f744c65aa1ff2d3eaaaf61b0b1d
hash2f18e61e3d9189f6ff5cc95252396bebaefe0d76596cc51cf0ade6a5156c6f66
hash4db7eeed852946803c16373a085c1bb5f79b60d2122d6fc9a2703714cdd9dac0
hash07a3dcb8d9b062fb480692fa33d12da05c21f544492cbaf9207956ac647ba9ae
hashbd14872dd9fdead89fc074fdc5832caea4ceac02983ec41f814278130b3f943e
hashced3de74196b2fac18e010d2e575335e2af320110d3fdaff09a33165edb43ca2
hash107d9fce05ff8296d0417a5a830d180cd46aa120ced8360df3ebfd15cb550636
hash15a6d62854e3e7221589b9b6e8e395af
hash635e321bcab27f22e0303da26198ac90381608a4
hashbd14872dd9fdead89fc074fdc5832caea4ceac02983ec41f814278130b3f943e
hash9b905a490a98cd8edf2e4b09ac8676ab
hash63632224f977aaaa1c7d88be65cf16878b4bef56
hash3407f26b3d69f1dfce76782fee1256274cf92f744c65aa1ff2d3eaaaf61b0b1d
hash96076497841f73da57d4d69dd9cc2f8a
hash87a14a0464e55581748d3396881aa36a57383132
hash2f18e61e3d9189f6ff5cc95252396bebaefe0d76596cc51cf0ade6a5156c6f66
hashb776a331c15131ff66ae7df73968e023
hash419a7631f06ed78a711f18323f5dee882daaa409
hash07a3dcb8d9b062fb480692fa33d12da05c21f544492cbaf9207956ac647ba9ae
hash4d7bc02fe04b87e4369f97b3918fff9b
hashdfc86741de088efc27b954f62db8a7e53842d179
hashced3de74196b2fac18e010d2e575335e2af320110d3fdaff09a33165edb43ca2
hash1e2e2f39ab6988a9f3852f1ec02ab05a
hashed61f731ae7f3d238a28e90ff0b4c7d52cea508e
hash107d9fce05ff8296d0417a5a830d180cd46aa120ced8360df3ebfd15cb550636
hashf05af511670dba679d845e3d477e789d
hash199d193f31fd7d117070a66e89c4839dddd513b2
hash4db7eeed852946803c16373a085c1bb5f79b60d2122d6fc9a2703714cdd9dac0

Ip

ValueDescriptionCopy
ip139.60.160.200
ip168.100.11.72
ip174.138.62.35

Datetime

ValueDescriptionCopy
datetime2021-09-07T15:08:37+00:00
datetime2021-09-17T07:49:48+00:00
datetime2021-08-25T14:22:39+00:00
datetime2021-08-25T10:15:50+00:00
datetime2021-08-21T07:19:02+00:00
datetime2021-09-09T05:05:25+00:00
datetime2021-08-19T03:53:10+00:00

Link

ValueDescriptionCopy
linkhttps://www.virustotal.com/gui/file/bd14872dd9fdead89fc074fdc5832caea4ceac02983ec41f814278130b3f943e/detection/f-bd14872dd9fdead89fc074fdc5832caea4ceac02983ec41f814278130b3f943e-1631027317
linkhttps://www.virustotal.com/gui/file/3407f26b3d69f1dfce76782fee1256274cf92f744c65aa1ff2d3eaaaf61b0b1d/detection/f-3407f26b3d69f1dfce76782fee1256274cf92f744c65aa1ff2d3eaaaf61b0b1d-1631864988
linkhttps://www.virustotal.com/gui/file/2f18e61e3d9189f6ff5cc95252396bebaefe0d76596cc51cf0ade6a5156c6f66/detection/f-2f18e61e3d9189f6ff5cc95252396bebaefe0d76596cc51cf0ade6a5156c6f66-1629901359
linkhttps://www.virustotal.com/gui/file/07a3dcb8d9b062fb480692fa33d12da05c21f544492cbaf9207956ac647ba9ae/detection/f-07a3dcb8d9b062fb480692fa33d12da05c21f544492cbaf9207956ac647ba9ae-1629886550
linkhttps://www.virustotal.com/gui/file/ced3de74196b2fac18e010d2e575335e2af320110d3fdaff09a33165edb43ca2/detection/f-ced3de74196b2fac18e010d2e575335e2af320110d3fdaff09a33165edb43ca2-1629530342
linkhttps://www.virustotal.com/gui/file/107d9fce05ff8296d0417a5a830d180cd46aa120ced8360df3ebfd15cb550636/detection/f-107d9fce05ff8296d0417a5a830d180cd46aa120ced8360df3ebfd15cb550636-1631163925
linkhttps://www.virustotal.com/gui/file/4db7eeed852946803c16373a085c1bb5f79b60d2122d6fc9a2703714cdd9dac0/detection/f-4db7eeed852946803c16373a085c1bb5f79b60d2122d6fc9a2703714cdd9dac0-1629345190
linkhttps://otx.alienvault.com/pulse/614da70c04133b145bebfdb0

Text

ValueDescriptionCopy
text50/68
text51/67
text46/68
text51/68
text39/67
text37/68
text42/69
textYoroi analyzes the StealBit tool. A malicious tool used by the LockBit gang to exfiltrate data on infected systems.

Threat ID: 682c7adbe3e6de8ceb777d88

Added to database: 5/20/2025, 12:51:39 PM

Last enriched: 6/19/2025, 2:16:44 PM

Last updated: 8/11/2025, 5:31:13 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats