{"id":10718,"date":"2022-09-22T14:48:50","date_gmt":"2022-09-22T14:48:50","guid":{"rendered":"https:\/\/gridinsoft.com\/blogs\/?p=10718"},"modified":"2022-09-23T14:11:27","modified_gmt":"2022-09-23T14:11:27","slug":"lockbit-builder-leaked","status":"publish","type":"post","link":"https:\/\/gridinsoft.com\/blogs\/lockbit-builder-leaked\/","title":{"rendered":"LockBit 3.0 Builder leaked to the public"},"content":{"rendered":"<p style=\"text-align: justify\">On September 21, 2022, a new Twitter user Ali Qushji published what is supposed to be a LockBit Ransomware builder. According to what the user says, <strong>this application is for LockBit 3.0 ransomware<\/strong> &#8211; the latest version of malware used by these cybercriminals. The exact user pretends to be an anonymous hacker who breached LockBit infrastructure.<\/p>\n<h2>What is LockBit Ransomware?<\/h2>\n<p style=\"text-align: justify\">LockBit Ransomware is one of the most <a href=\"https:\/\/gridinsoft.com\/ransomware\">successful ransomware gangs<\/a> among the ones active in 2022. Appeared in 2020, it quickly became a big fish \u2013 thanks to its extremely fast and reliable encryption, and the same fast data extraction tools. In 2022, after the <a href=\"https:\/\/gridinsoft.com\/blogs\/conti-ransomware-shutdown-site-disabled\/\">Conti group shutdown<\/a>, it rapidly gained market share and became an absolute leader. Available statistics show that <strong>almost 60% of ransomware attacks on corporations in the summer of 2022<\/strong> were commenced by the LockBit group.<\/p>\n<figure id=\"attachment_10719\" aria-describedby=\"caption-attachment-10719\" style=\"width: 1895px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/09\/lockbit-black.png\" alt=\"LockBit Black\" width=\"1895\" height=\"913\" class=\"size-full wp-image-10719\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/09\/lockbit-black.png 1895w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/09\/lockbit-black-300x145.png 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/09\/lockbit-black-1024x493.png 1024w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/09\/lockbit-black-768x370.png 768w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/09\/lockbit-black-1536x740.png 1536w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/09\/lockbit-black-1568x755.png 1568w\" sizes=\"auto, (max-width: 1895px) 100vw, 1895px\" \/><figcaption id=\"caption-attachment-10719\" class=\"wp-caption-text\">The effect of LockBit Black ransomware activity. It renames the files randomly and changes the wallpaper.<\/figcaption><\/figure>\n<p style=\"text-align: justify\">They\u2019re also known as a very public group, as they are constantly active on various forums, and even give interviews to various blogs. The main narrative the group were pushing was <strong>\u201cLockbit always does what they promise\u201d<\/strong>. They have likely meant that after paying the ransom(s), the victim will receive the decryption key, and its files will be deleted. Obviously, <a href=\"https:\/\/gridinsoft.com\/blogs\/ddos-attacks-and-lockbit\/\">DDoS-attacks this group started using<\/a> to create the other stimulus to pay should be stopped as well. Such confidence is likely the result of a diligent hiring program \u2013 the administration is definitely sure that group members follow the rules.<\/p>\n<h2>LockBit 3.0 Builder leak<\/h2>\n<p style=\"text-align: justify\"><a href=\"https:\/\/gridinsoft.com\/ransomware\/lockbit\">Each ransomware sample<\/a> deployed by the LockBit group is unique. It is delivered to the target system after establishing the connection that follows the initial access. The special tool generates a new build of malware that makes it impossible to detect it with any kind of signature analysis. It is also used in creating the encryption and decryption keys, which makes this app potentially valuable for creating a unified decryptor.<\/p>\n<figure id=\"attachment_10720\" aria-describedby=\"caption-attachment-10720\" style=\"width: 1024px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/09\/lockbit-builder.png\" alt=\"LockBit 3.0 builder scheme\" width=\"1024\" height=\"636\" class=\"size-full wp-image-10720\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/09\/lockbit-builder.png 1024w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/09\/lockbit-builder-300x186.png 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/09\/lockbit-builder-768x477.png 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption id=\"caption-attachment-10720\" class=\"wp-caption-text\">The mechanism of LockBit builder<\/figcaption><\/figure>\n<p style=\"text-align: justify\"><strong>On Wednesday, 21st of September, 2022<\/strong>, a Twitter user nicknamed Ali Qushji posted several tweets where they shared the link to builder download and some details. In particular, there was a claim that this program has been leaked from the LockBit infrastructure after the successful hacking of the latter. There is no evidence that there was any real hacking into LockBit servers, but another tweet (now deleted) from Vx-Underground was <strong>confirming the earlier breach (as of September 10, 2022)<\/strong>.<\/p>\n<figure id=\"attachment_10721\" aria-describedby=\"caption-attachment-10721\" style=\"width: 1006px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/09\/ali-qushji-tweet.png\" alt=\"Ali Qushji Tweet\" width=\"1006\" height=\"287\" class=\"size-full wp-image-10721\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/09\/ali-qushji-tweet.png 1006w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/09\/ali-qushji-tweet-300x86.png 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/09\/ali-qushji-tweet-768x219.png 768w\" sizes=\"auto, (max-width: 1006px) 100vw, 1006px\" \/><figcaption id=\"caption-attachment-10721\" class=\"wp-caption-text\">The tweet &#8220;Ali Qushji&#8221; user posted on September, 21. Then they deleted the messages.<\/figcaption><\/figure>\n<p style=\"text-align: justify\">A person nicknamed Proton, who appears to be a programmer that works for the group, shared a builder with the admins of the aforementioned Twitter page. That version belonged to the latest version of LockBit 3.0 ransomware and featured several flaws fixes that were present earlier. What creates even more confusion is the fact that both versions \u2013 the one shared by Proton and the one from Ali Qushji \u2013 are different. Both of them are available <a href=\"https:\/\/github.com\/3xp0rt\/LockBit-Black-Builder\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">on 3xp0rt&#8217;s GitHub<\/a>.<\/p>\n<h2>What\u2019s next?<\/h2>\n<p style=\"text-align: justify\">The situation is as unclear as it could be. The chance that LockBit infrastructure was breached is pretty high, and if this turns out to be true &#8211; <strong>the group will likely have some serious problems<\/strong>. And not only because of security concerns: ones who got inside of the servers have likely leaked all the data needed to create a decryptor. Sure, the group can switch on the other technology \u2013 but it will take time, and such an operation will not be very pleasant shortly after switching to LockBit 3.0 ransomware. It is better to wait for the official reaction of a cybercrime gang &#8211; and only then make any conclusions.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>On September 21, 2022, a new Twitter user Ali Qushji published what is supposed to be a LockBit Ransomware builder. According to what the user says, this application is for LockBit 3.0 ransomware &#8211; the latest version of malware used by these cybercriminals. The exact user pretends to be an anonymous hacker who breached LockBit [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":9032,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_sitemap_exclude":false,"_sitemap_priority":"","_sitemap_frequency":"","footnotes":""},"categories":[15],"tags":[649,951,55],"class_list":{"0":"post-10718","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security-news","8":"tag-lockbit","9":"tag-lockbit-3-0","10":"tag-ransomware"},"featured_image_src":"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/06\/LockBit-3.0-and-bug-bounty.jpg","author_info":{"display_name":"Stephanie Adlam","author_link":"https:\/\/gridinsoft.com\/blogs\/author\/adlam\/"},"_links":{"self":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/10718","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/comments?post=10718"}],"version-history":[{"count":2,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/10718\/revisions"}],"predecessor-version":[{"id":10723,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/10718\/revisions\/10723"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media\/9032"}],"wp:attachment":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media?parent=10718"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/categories?post=10718"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/tags?post=10718"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}