A new and advanced ransomware family, dubbed NotLockBit, has emerged as a significant threat in the cybersecurity landscape, closely mimicking the behavior and tactics of the notorious LockBit ransomware.
NotLockBit notably distinguishes itself by being one of the first ransomware strains designed to effectively attack both macOS and Windows operating systems, showcasing powerful cross-platform capabilities.
Distributed as an x86_64 binary written in the Go programming language, NotLockBit exhibits a sophisticated design, equipped with advanced features such as:
“Our analysis reveals that this new strain demonstrates advanced capabilities, including targeted file encryption, data exfiltration, and self-deletion mechanisms.” CSN learned from detailed Qualys research.
2024 MITRE ATT&CK Evaluation Results for SMEs & MSPs -> Download Free Guide
Upon execution, NotLockBit begins with a reconnaissance phase, particularly on macOS systems.
It uses the go-sysinfo module to collect detailed system information, such as hardware specifications, operating system details, network configuration, and unique identifiers (UUIDs).
The ransomware employs a sophisticated three-step encryption process:
/proc/
, /sys/
, and /dev/
.Encrypted files are saved in their original location but renamed with a unique identifier and appended with an .abcd
extension. The ransomware deletes the original files to make decryption without the private key virtually impossible.
NotLockBit focuses on a variety of file types, including but not limited to:
.doc
, .pdf
, .txt
.csv
, .xls
, .ppt
.jpg
, .png
, .mpg
.vmdk
, .vmsd
, .vbox
The comprehensive targeting emphasizes the ransomware’s attempt to extract maximum value from user systems.
Going beyond encryption, NotLockBit exfiltrates sensitive files to attacker-controlled storage, typically an Amazon S3 bucket.
This step paves the way for a double-extortion strategy, where stolen data is threatened to be disclosed or sold unless the ransom is paid.
Once encryption is complete, NotLockBit alters the victim’s desktop wallpaper, replacing it with a ransom note.
On macOS devices, this is achieved using the osascript
command, which programmatically interacts with the operating system to change the background image.
The ransomware concludes its attack by executing a self-deletion mechanism, removing its binary and traces of execution from the victim’s system. This also includes deleting shadow copies, further complicating recovery efforts.
NotLockBit employs various levels of obfuscation to evade detection:
Interestingly, researchers observed variants omitting data exfiltration capabilities, focusing solely on encryption. This suggests tailored attack strategies or ongoing development of the ransomware.
The Qualys EDR & EPP security solutions can detect and quarantine NotLockBit as soon as it is downloaded.
Security professionals are encouraged to utilize advanced hunting queries to analyze and mitigate the ransomware’s impact. Notwithstanding this, organizations should implement robust cybersecurity measures, including:
The emergence of NotLockBit, particularly its dual compatibility with macOS and Windows systems, signals a worrying trend in ransomware development.
Its ability to mimic established ransomware families, such as LockBit, and its use of exfiltration tactics emphasize the increasing complexity of cyber threats.
This ransomware family demands close monitoring by security researchers and robust defenses by organizations to thwart its potentially devastating consequences.
Read Ransomware prevention checklist, As always, vigilance and preparedness remain critical in combating the evolving ransomware landscape.
Investigate Real-World Malicious Links, Malware & Phishing Attacks With ANY.RUN – Try for Free
A new malware variant called Nunu Stealer is making headlines after being advertised on underground hacker forums…
A critical vulnerability has been identified in Siemens' User Management Component (UMC), which could allow…
Foxit Software has issued critical security updates for its widely used PDF solutions, Foxit PDF…
Microsoft has swiftly addressed a critical security vulnerability affecting Windows 11 (version 23H2), which could…
A Romanian man has been sentenced to 20 years in prison for his involvement in…
The Cybersecurity and Infrastructure Security Agency (CISA) has sounded the alarm over a critical vulnerability…