How do real users feel about account opening process? How many clicks does it take to open an account? Is it possible to open an account from a cell...
LockBit3.0, the evolution of the most powerful Ransomware-as-a-Service
How is LockBit born? How does it work? What advantages does it bring to cybercriminals? Discover an effective solution to protect yourself in only 24 hours
Jun 6, 2023
Ransomware-as-a-Service (RaaS) as LockBit 3.0 has proven to be an extremely lucrative business for cybercriminals. In just a few years, numerous criminal groups have created and marketed their own ransomware kits, enabling others to monetize their malicious code without having to invest in software development or operational costs. This has led to an explosive growth of this market segment and a proliferation of new services. And now, the latest edition of LockBit Ransomware-as-a-Service platform features new customization options and advanced features that allow cybercriminals to unleash ransomware attacks with even greater sophistication than before.
LockBit basicsLockBit is a Ransomware-as-a-Service that enables criminals to create their own ransomware campaigns without having to write any code or conduct any malware attacks. The original version of the LockBit platform was created in 2016 and it's still available for purchase. The second iteration of the product was launched in 2018, and it's known as "LockBit 2.0." The latest version of LockBit, known as "LockBit 3.0," was released in May 2019. The service is designed to make it easy to create and distribute malicious software campaigns, collect the ransom money, and then easily launder the money. LockBit boasts an impressive user interface that guides users through the process of creating their own ransomware campaign. The menus and buttons are intuitively labeled so that even novice criminals can create a dangerous ransomware infection. The service includes a variety of animated buttons and status indicators that visually reinforce the process so there’s no confusion. LockBit is available as a SaaS (Software-as-a-Service) product, meaning that the customer only needs a web browser to access the malware creator and create their own ransomware campaign.
LockBit 2.0: a significant advancementYour phone or tablet is a tempting target for criminals, especially in Summer, but you can avoid being a target by ditching remote-access apps like GoToMyPC or LogMeIn. While these apps are great for accessing your desktop computer remotely, you should avoid using them to access sensitive data on your mobile device. While these apps have security measures built in, they are not as secure as they need to be to protect sensitive data. If you need to access sensitive data on your phone, plug it into a secure data-dedicated laptop with a strong firewall and a reliable anti-virus program.
LockBit 3.0: bigger and betterThe most recent version of LockBit, released in mid-2019, represents the evolution of this malware kit. The RaaS was built to support an even wider array of ransomware campaigns and it offers a range of new features and options to make the process even easier. The developers made LockBit even more user-friendly by improving the design of the user interface, adding buttons and simplifying the process for managing a ransomware campaign. The developers also ensured that it’s easy for cybercriminals to create their own malware campaigns by automatically importing the necessary code from past campaigns. With this new version, cybercriminals can create more sophisticated ransomware campaigns that demand higher ransom amounts and attempt to evade detection by security professionals even longer.
Additional features in LockBit 3.0The list of new features in LockBit 3.0 goes on and on. Other improvements to the platform include the ability to inject ransomware into the Windows kernel, a new option to encrypt files with a single click, and the ability to customize ransom notes using built-in clipboards. The creators of LockBit have also added a new option that allows cybercriminals to distribute a percentage of ransom payments to other crackers. This feature is designed to make it easier for criminals to collaborate and share profits. The new version of the platform also includes an option to create custom C&C servers and a built-in web server that allows crackers to control their malware campaigns remotely.
The advantages of LockBit 3.0 for cybercriminals
- Extensive customization options make it easy for crackers to create highly personalized campaigns that demand a higher ransom amount. Extortionists can take advantage of the victim’s fear, increase the ransom demand and extract more money from their victims.
- Advanced features like the crawler and web extraction functionality make it easier for crackers to select the files to be encrypted. This feature is beneficial for criminals because it allows them to ignore files that may be valuable to their victims.
- The messaging system and calendar make it easier for crackers to communicate with their victims and set a date for the ransom payment. This feature also allows criminals to set a date that’s convenient for them to receive the ransom payment.
- The web interface makes it easy for criminals to create their own ransomware campaigns and start extorting computer users. Using LockBit 3.0 doesn’t require any technical skills, so even inexperienced crackers can conduct profitable ransomware campaigns
The disadvantages of using LockBit 3.0 for cybercriminals
- While the new version of LockBit makes it easier to create a more sophisticated ransomware campaign, it also makes it easier for law enforcement agencies to track the source of the malware. It’s important for crackers to use a digital service like LockBit with caution because it can make it easier for investigators to track them down.
- It’s easier for authorities to identify the source of the malicious code because the crawler and web extraction functionality automatically downloads files from the victim’s computer and extracts the necessary information. This makes it easier for investigators to identify the files that have been encrypted and collect the necessary evidence.
- The new messaging system and ransom demand calendar make it easier for investigators to track the source of the ransomware campaign and identify the crackers responsible for the extortion attempt.