Cyber Security News

NotLockBit – Previously Unknown Ransomware Attack Windows & macOS

A new and advanced ransomware family, dubbed NotLockBit, has emerged as a significant threat in the cybersecurity landscape, closely mimicking the behavior and tactics of the notorious LockBit ransomware.

NotLockBit notably distinguishes itself by being one of the first ransomware strains designed to effectively attack both macOS and Windows operating systems, showcasing powerful cross-platform capabilities.

Overview of NotLockBit’s Capabilities

Distributed as an x86_64 binary written in the Go programming language, NotLockBit exhibits a sophisticated design, equipped with advanced features such as:

  • Targeted File Encryption: Focuses on encrypting valuable or sensitive data using robust encryption protocols like AES and RSA.
  • Data Exfiltration: Transfers stolen files to attacker-controlled repositories, often leveraging Amazon S3 buckets or similar cloud storage, for potential double-extortion tactics.
  • Self-Deletion Mechanisms: Deletes traces of its presence, including shadow copies, to ensure that recovery is nearly impossible.

“Our analysis reveals that this new strain demonstrates advanced capabilities, including targeted file encryption, data exfiltration, and self-deletion mechanisms.” CSN learned from detailed Qualys research.

2024 MITRE ATT&CK Evaluation Results for SMEs & MSPs -> Download Free Guide

Technical Insights Into NotLockBit’s Functionality

Upon execution, NotLockBit begins with a reconnaissance phase, particularly on macOS systems.

NotLockbit Execution Chain

It uses the go-sysinfo module to collect detailed system information, such as hardware specifications, operating system details, network configuration, and unique identifiers (UUIDs).

The ransomware employs a sophisticated three-step encryption process:

  1. Decodes an embedded RSA public key from a PEM file.
  2. Generates a random master encryption key, which is securely encrypted using the RSA details.
  3. Encrypts user files while skipping critical system directories like /proc/, /sys/, and /dev/.

Encrypted files are saved in their original location but renamed with a unique identifier and appended with an .abcd extension. The ransomware deletes the original files to make decryption without the private key virtually impossible.

NotLockBit focuses on a variety of file types, including but not limited to:

  • Personal documents: .doc, .pdf, .txt
  • Professional files: .csv, .xls, .ppt
  • Multimedia: .jpg, .png, .mpg
  • Virtual machine data: .vmdk, .vmsd, .vbox

The comprehensive targeting emphasizes the ransomware’s attempt to extract maximum value from user systems.

Going beyond encryption, NotLockBit exfiltrates sensitive files to attacker-controlled storage, typically an Amazon S3 bucket.

This step paves the way for a double-extortion strategy, where stolen data is threatened to be disclosed or sold unless the ransom is paid.

Once encryption is complete, NotLockBit alters the victim’s desktop wallpaper, replacing it with a ransom note.

On macOS devices, this is achieved using the osascript command, which programmatically interacts with the operating system to change the background image.

The ransomware concludes its attack by executing a self-deletion mechanism, removing its binary and traces of execution from the victim’s system. This also includes deleting shadow copies, further complicating recovery efforts.

NotLockBit employs various levels of obfuscation to evade detection:

  • Some samples include visible function names.
  • Others use obfuscated or fully stripped binaries, making reverse engineering and threat analysis more challenging.

Interestingly, researchers observed variants omitting data exfiltration capabilities, focusing solely on encryption. This suggests tailored attack strategies or ongoing development of the ransomware.

Detection and Mitigation

The Qualys EDR & EPP security solutions can detect and quarantine NotLockBit as soon as it is downloaded.

Security professionals are encouraged to utilize advanced hunting queries to analyze and mitigate the ransomware’s impact. Notwithstanding this, organizations should implement robust cybersecurity measures, including:

  1. Regular Backups: Maintain offline backups of critical data.
  2. Endpoint Protection: Use advanced detection solutions capable of identifying ransomware behavior.
  3. Network Security: Employ firewalls, intrusion detection systems, and access controls.
  4. User Awareness: Educate employees about phishing, social engineering, and other cybercriminal tactics.

The emergence of NotLockBit, particularly its dual compatibility with macOS and Windows systems, signals a worrying trend in ransomware development.

Its ability to mimic established ransomware families, such as LockBit, and its use of exfiltration tactics emphasize the increasing complexity of cyber threats.

This ransomware family demands close monitoring by security researchers and robust defenses by organizations to thwart its potentially devastating consequences.

Read Ransomware prevention checklist, As always, vigilance and preparedness remain critical in combating the evolving ransomware landscape.

Investigate Real-World Malicious Links, Malware & Phishing Attacks With ANY.RUN – Try for Free

Balaji

BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Recent Posts

Check Point Software to Open First Asia-Pacific R&D Centre in Bengaluru, India

Check Point Software Technologies Ltd. has announced plans to establish its inaugural Asia-Pacific Research and…

2 hours ago

PoC Exploit Released for Ivanti EPM Vulnerabilities

A recent investigation into Ivanti Endpoint Manager (EPM) has uncovered four critical vulnerabilities that could…

2 hours ago

Ransomware Trends 2025 – What’s new

As of February 2025, ransomware remains a formidable cyber threat, evolving in complexity and scale.…

2 hours ago

Hackers Delivering Malware Bundled with Fake Job Interview Challenges

ESET researchers have uncovered a series of malicious activities orchestrated by a North Korea-aligned group…

2 hours ago

New Bookworm Malware Using SLL Sideloading Technique To Windows

Cybersecurity researchers from Palo Alto Networks' Unit 42 disclosed the resurgence of the Bookworm malware,…

3 hours ago

Fake Chrome Update Delivers DriverEasy Malware by Abusing Dropbox

A recent investigation has uncovered a malicious application, DriverEasy, masquerading as a legitimate Google Chrome…

3 hours ago