Cyber Security News

NotLockBit – Previously Unknown Ransomware Attack Windows & macOS

A new and advanced ransomware family, dubbed NotLockBit, has emerged as a significant threat in the cybersecurity landscape, closely mimicking the behavior and tactics of the notorious LockBit ransomware.

NotLockBit notably distinguishes itself by being one of the first ransomware strains designed to effectively attack both macOS and Windows operating systems, showcasing powerful cross-platform capabilities.

Overview of NotLockBit’s Capabilities

Distributed as an x86_64 binary written in the Go programming language, NotLockBit exhibits a sophisticated design, equipped with advanced features such as:

  • Targeted File Encryption: Focuses on encrypting valuable or sensitive data using robust encryption protocols like AES and RSA.
  • Data Exfiltration: Transfers stolen files to attacker-controlled repositories, often leveraging Amazon S3 buckets or similar cloud storage, for potential double-extortion tactics.
  • Self-Deletion Mechanisms: Deletes traces of its presence, including shadow copies, to ensure that recovery is nearly impossible.

“Our analysis reveals that this new strain demonstrates advanced capabilities, including targeted file encryption, data exfiltration, and self-deletion mechanisms.” CSN learned from detailed Qualys research.

2024 MITRE ATT&CK Evaluation Results for SMEs & MSPs -> Download Free Guide

Technical Insights Into NotLockBit’s Functionality

Upon execution, NotLockBit begins with a reconnaissance phase, particularly on macOS systems.

NotLockbit Execution Chain

It uses the go-sysinfo module to collect detailed system information, such as hardware specifications, operating system details, network configuration, and unique identifiers (UUIDs).

The ransomware employs a sophisticated three-step encryption process:

  1. Decodes an embedded RSA public key from a PEM file.
  2. Generates a random master encryption key, which is securely encrypted using the RSA details.
  3. Encrypts user files while skipping critical system directories like /proc/, /sys/, and /dev/.

Encrypted files are saved in their original location but renamed with a unique identifier and appended with an .abcd extension. The ransomware deletes the original files to make decryption without the private key virtually impossible.

NotLockBit focuses on a variety of file types, including but not limited to:

  • Personal documents: .doc, .pdf, .txt
  • Professional files: .csv, .xls, .ppt
  • Multimedia: .jpg, .png, .mpg
  • Virtual machine data: .vmdk, .vmsd, .vbox

The comprehensive targeting emphasizes the ransomware’s attempt to extract maximum value from user systems.

Going beyond encryption, NotLockBit exfiltrates sensitive files to attacker-controlled storage, typically an Amazon S3 bucket.

This step paves the way for a double-extortion strategy, where stolen data is threatened to be disclosed or sold unless the ransom is paid.

Once encryption is complete, NotLockBit alters the victim’s desktop wallpaper, replacing it with a ransom note.

On macOS devices, this is achieved using the osascript command, which programmatically interacts with the operating system to change the background image.

The ransomware concludes its attack by executing a self-deletion mechanism, removing its binary and traces of execution from the victim’s system. This also includes deleting shadow copies, further complicating recovery efforts.

NotLockBit employs various levels of obfuscation to evade detection:

  • Some samples include visible function names.
  • Others use obfuscated or fully stripped binaries, making reverse engineering and threat analysis more challenging.

Interestingly, researchers observed variants omitting data exfiltration capabilities, focusing solely on encryption. This suggests tailored attack strategies or ongoing development of the ransomware.

Detection and Mitigation

The Qualys EDR & EPP security solutions can detect and quarantine NotLockBit as soon as it is downloaded.

Security professionals are encouraged to utilize advanced hunting queries to analyze and mitigate the ransomware’s impact. Notwithstanding this, organizations should implement robust cybersecurity measures, including:

  1. Regular Backups: Maintain offline backups of critical data.
  2. Endpoint Protection: Use advanced detection solutions capable of identifying ransomware behavior.
  3. Network Security: Employ firewalls, intrusion detection systems, and access controls.
  4. User Awareness: Educate employees about phishing, social engineering, and other cybercriminal tactics.

The emergence of NotLockBit, particularly its dual compatibility with macOS and Windows systems, signals a worrying trend in ransomware development.

Its ability to mimic established ransomware families, such as LockBit, and its use of exfiltration tactics emphasize the increasing complexity of cyber threats.

This ransomware family demands close monitoring by security researchers and robust defenses by organizations to thwart its potentially devastating consequences.

Read Ransomware prevention checklist, As always, vigilance and preparedness remain critical in combating the evolving ransomware landscape.

Investigate Real-World Malicious Links, Malware & Phishing Attacks With ANY.RUN – Try for Free

Balaji

BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Recent Posts

Microsoft Patch Tuesday May 2025 Released With the Fixes for 72 Flaws With 5 Actively Exploited 0-Day

Microsoft has released its May 2025 Patch Tuesday updates, addressing 72 security vulnerabilities across its…

2 hours ago

Ivanti Released Security Updates to Fix for the Mutiple RCE Vulnerabilities – Patch Now

Ivanti, a leading enterprise software provider, has released critical security updates addressing vulnerabilities across several…

3 hours ago

Fortinet FortiVoice Zero-day Vulnerability Actively Exploited in The Wild

A critical stack-based buffer overflow vulnerability (CWE-121) has been discovered in multiple Fortinet products, including…

3 hours ago

Ransomware Attacks Surge by 123% Amid Evolving Tactics and Strategies

The 2025 Third-Party Breach Report from Black Kite highlights a staggering 123% surge in ransomware…

4 hours ago

Researchers Introduce Mythic Framework Agent to Enhance Pentesting Tool Performance

Penetration testing is still essential for upholding strong security procedures in a time when cybersecurity…

4 hours ago

Swan Vector APT Targets Organizations with Malicious LNK and DLL Implants

A newly identified advanced persistent threat (APT) campaign, dubbed "Swan Vector" by Seqrite Labs, has…

4 hours ago