Security researchers have published detailed analyses of LockBit 5.0, the latest version of one of the most prolific ransomware families. Released in late September 2025, version 5.0 introduces significant upgrades to encryption, evasion, and operational capabilities. Despite law enforcement’s Operation Cronos disrupting LockBit’s infrastructure in February 2024, the group rebuilt and returned stronger.

Version overview

AttributeDetails
VersionLockBit 5.0
First observedSeptember 2025
PredecessorLockBit 4.0 (inactive May-September 2025)
Affiliate fee$500 (significantly reduced from prior versions)
PlatformsWindows, Linux, ESXi
RaaS modelContinues as Ransomware-as-a-Service

Operation Cronos and resurgence

February 2024 disruption

ActionResult
Servers seized34 across multiple countries
Affiliate accounts disabled14,000+
Cryptocurrency wallets frozen200+
Arrests3 affiliates (Poland, Ukraine)
Led byUK NCA and FBI

Recovery timeline

DateEvent
February 19-20, 2024Operation Cronos strikes
February-May 2024Limited LockBit activity
May 2025Data Leak Site goes inactive
September 2025LockBit 5.0 launches
September 2025+Active victim listings resume

The lowered $500 affiliate entry fee was judged a bold attempt to recover diminished influence and restructure the attack ecosystem following Operation Cronos and internal panel data leaks.

Encryption architecture

LockBit 5.0 implements a hybrid cryptographic framework:

Cryptographic components

ComponentAlgorithmPurpose
Symmetric encryptionChaCha20-Poly1305File encryption
Key exchangeX25519 (ECDH)Per-victim key generation
HashingBLAKE2bKey derivation
VariantXChaCha20 + Curve25519Fast cross-platform encryption

Why ChaCha20?

FactorBenefit
Software performanceFaster than AES without hardware acceleration
Authenticated encryptionPoly1305 prevents tampering
Cross-platformConsistent performance on all targets

File handling by size

File sizeEncryption method
Up to ~83.9 MBDirect ChaCha20 encryption using derived key streams
Larger filesSegmented into 8 MB chunks with independent encryption
IntegrityCustom hash-based markers appended to each segment

Key derivation

StepProcess
1SHA-512 hash of master key
2First 32 bytes become ChaCha20 key
3SHA-512 hash of ChaCha20 key
4First 24 bytes become nonce

Two-stage deployment model

Flashpoint’s analysis confirms LockBit 5.0 uses a refined modular deployment designed to maximize evasion:

Stage 1: Loader

ActionDetails
Process creationCreates suspended instance of defrag.exe
InjectionProcess hollowing technique
ShellcodeCustom shellcode with execution trampolines
PurposeAchieve execution in legitimate process context

Stage 2: Ransomware core

ActionDetails
Execution contextWithin hollowed legitimate process
ActivitiesEncryption, system manipulation, ransom note
VisibilityAppears as legitimate Windows process

This near-fileless deployment evades traditional file-based detection.

Anti-analysis techniques

LockBit 5.0 employs multiple layers of analysis evasion:

TechniqueImplementation
Control flow obfuscationJump destinations calculated dynamically
Runtime API resolutionCustom hashing algorithm resolves function calls
EDR bypassReloads clean NTDLL and Kernel32 from disk
Sandbox detectionIdentifies analysis environments
String encryptionCritical strings encrypted at rest
ETW patchingDisables Event Tracing for Windows
Service terminationKills 60+ security and backup services

EDR bypass details

ActionPurpose
Read clean system DLLs from diskObtain unhooked versions
Overwrite in-memory DLLsReplace security tool hooks
ResultEDR monitoring circumvented

New capabilities in 5.0

The update from LockBit 4.0 to 5.0 adds several features:

FeatureDescription
Mutex handlingPrevents multiple instances
Execution delayConfigurable delay before encryption
Status barVisual progress indicator
Delete TEMPCleans temporary files after encryption
Wiper modeOption to destroy data rather than encrypt
Shadow copy deletionOverhauled VSS deletion method
Large file handlingUpdated encryption logic

Wiper mode

ScenarioUse case
Non-paying victimDestroy data as punishment
Attribution maskingMake incident look like wiper attack
Maximum pressureThreaten data destruction

Stealbit integration

LockBit 5.0 integrates Stealbit, a purpose-built data exfiltration tool for double extortion:

ComponentFunction
ConfigurationAffiliates configure target file types via LockBit panel
ExfiltrationCopies selected data to attacker servers over HTTP
TimingExecutes before encryption begins
DestinationsMEGA, compromised cloud accounts, attacker infrastructure

Double extortion flow

PhaseAction
1Stealbit exfiltrates sensitive data
2LockBit encrypts files
3Ransom note demands payment
4Non-payment leads to data publication

Alternative exfiltration: Some affiliates use Rclone or FreeFileSync instead of Stealbit.

Platform coverage

PlatformStatus
WindowsPrimary target
LinuxSupported
ESXiDedicated variant
macOSSupported

ESXi targeting

CapabilityImpact
VM encryptionEntire virtualized infrastructure at risk
Snapshot deletionPrevents VM recovery
Simultaneous attackAll VMs affected at once

Operational model

LockBit continues as a Ransomware-as-a-Service platform:

RoleResponsibility
OperatorsInfrastructure, malware development, panel
AffiliatesIntrusions, deployment, negotiation
Revenue split70-80% to affiliate, 20-30% to operators

Affiliate recruitment changes

LockBit 4.0LockBit 5.0
Vetting process$500 fee, minimal vetting
Higher barrierLower barrier to entry
Established affiliatesNew affiliates recruited

The lowered entry fee aims to rebuild affiliate base after Operation Cronos losses.

Historical context

YearLockBit share of ransomware attacks
2023~25% of all attacks
2024Reduced (Operation Cronos impact)
2025Rebuilding with LockBit 5.0

Detection and defense

Behavioral indicators

IndicatorDetection method
Process hollowing into defrag.exeProcess monitoring
NTDLL/Kernel32 reloadingMemory scanning
Rapid file encryptionFile system monitoring
VSS deletionVolume shadow copy monitoring
Service terminationService monitoring

Technical IOCs

SourceContent
ASEC (AhnLab)Detailed technical IOCs
FlashpointMITRE ATT&CK mappings
S2W TALONSample hashes and C2
CISA StopRansomwareUpdated advisories

MITRE ATT&CK techniques

TechniqueID
Process Injection: Process HollowingT1055.012
Obfuscated Files or InformationT1027
Impair Defenses: Disable or Modify ToolsT1562.001
Data Encrypted for ImpactT1486
Inhibit System RecoveryT1490
Exfiltration Over Web ServiceT1567

Recommendations

For defenders

PriorityAction
CriticalUpdate EDR with LockBit 5.0 signatures
CriticalMaintain offline, tested backups
HighMonitor for process hollowing
HighDetect NTDLL/Kernel32 reloading
HighAlert on rapid file encryption patterns
OngoingReview CISA StopRansomware advisories

For incident responders

PriorityAction
ImmediateIsolate affected systems
HighPreserve memory for analysis
HighCheck for Stealbit exfiltration
OngoingEngage law enforcement

Context

That LockBit came back with an upgraded version after Operation Cronos demonstrates the resilience of the RaaS model—even substantial law enforcement action doesn’t permanently eliminate well-organized ransomware operations. The $500 affiliate fee signals desperation to rebuild but also lowers the barrier for new attackers to join.

Organizations should expect LockBit 5.0 attacks to continue and potentially increase as the affiliate base rebuilds. The combination of sophisticated evasion, cross-platform capability, and established brand makes LockBit one of the most dangerous ransomware threats regardless of law enforcement pressure.