LockBit 5.0 Ransomware Expands Threat with Multi-Platform Attacks
LockBit ransomware has evolved with the release of version 5.0, now targeting Windows, Linux, and ESXi systems, broadening its impact across diverse IT infrastructures. The updated malware introduces enhanced defense-evasion techniques, faster encryption, and anti-analysis measures, making it a formidable threat to enterprises, government agencies, and critical sectors.
Key Features and Tactics
LockBit 5.0 employs a multi-layered evasion strategy to bypass detection. On Windows, it uses packing, process hollowing, DLL unhooking, and ETW function patching, while also clearing system logs to obscure its activity. The Linux and ESXi variants skip packing but rely on heavily encrypted strings to hinder analysis.
The ransomware leverages hybrid encryption (XChaCha20 + Curve25519), optimizing speed by utilizing multiple CPU cores. It appends random extensions to encrypted files and leaves a ransom note demanding payment. Notably, the malware avoids infecting systems in Russia by checking language and geographic settings.
Targeting Virtualized Environments
LockBit 5.0 includes specialized functions for virtual machines, particularly VMware ESXi. It scans the /vmfs/ directory for virtual machine files and can terminate VMs mid-encryption, disrupting critical infrastructure in enterprise environments.
Execution and Impact
The ransomware executes via command-line arguments, allowing customization per environment. Over 60 victims were listed on LockBit’s data leak site by late 2025, with attacks spanning private companies, healthcare, education, and government agencies, primarily in the U.S.
Despite law enforcement efforts, LockBit remains active, repurposing infrastructure from malware like SmokeLoader. Indicators of Compromise (IoCs) for Windows, Linux, and ESXi variants have been identified to aid detection.
Infrastructure Details
- Onion Sites:
lockbitfbinpwhbyomxkiqtwhwiyetrbkb4hnqmshaonqxmsrqwg7yad.onion(24 mirrors) - C2 Infrastructure:
205.185.116.233,205.185.116.233:3389,karma0.xyzSource: https://cyberpress.org/lockbit-5-0-targets-windows-linux/
VMware TPRM report: https://www.rankiteo.com/company/vmware-vdefend
"id": "vmw1771316866",
"linkid": "vmware-vdefend",
"type": "Ransomware",
"date": "12/2025",
"severity": "100",
"impact": "5",
"explanation": "Attack threatening the organization's existence"
{'affected_entities': [{'industry': ['Healthcare',
'Education',
'Government',
'Private Sector'],
'location': 'Primarily U.S.',
'type': 'Private companies, healthcare, education, '
'government agencies'}],
'attack_vector': 'Command-line execution, hybrid encryption (XChaCha20 + '
'Curve25519)',
'data_breach': {'data_encryption': 'Yes (XChaCha20 + Curve25519)',
'sensitivity_of_data': 'High (enterprise and critical '
'infrastructure data)',
'type_of_data_compromised': 'Encrypted files, virtual machine '
'files'},
'description': 'LockBit ransomware has evolved with the release of version '
'5.0, now targeting Windows, Linux, and ESXi systems, '
'broadening its impact across diverse IT infrastructures. The '
'updated malware introduces enhanced defense-evasion '
'techniques, faster encryption, and anti-analysis measures, '
'making it a formidable threat to enterprises, government '
'agencies, and critical sectors.',
'impact': {'data_compromised': 'Encrypted files, virtual machine data',
'operational_impact': 'Disruption of critical infrastructure, '
'termination of virtual machines '
'mid-encryption',
'systems_affected': 'Windows, Linux, ESXi systems'},
'motivation': 'Financial gain',
'post_incident_analysis': {'root_causes': 'Evolved ransomware tactics, '
'multi-platform targeting, '
'defense-evasion techniques'},
'ransomware': {'data_encryption': 'Yes (hybrid encryption)',
'ransom_demanded': True,
'ransomware_strain': 'LockBit 5.0'},
'references': [{'source': 'LockBit data leak site',
'url': 'http://lockbitfbinpwhbyomxkiqtwhwiyetrbkb4hnqmshaonqxmsrqwg7yad.onion'},
{'source': 'C2 Infrastructure'}],
'threat_actor': 'LockBit ransomware group',
'title': 'LockBit 5.0 Ransomware Expands Threat with Multi-Platform Attacks',
'type': 'Ransomware'}