LockBit 5.0 Ransomware Hits Windows, Linux, ESXi


LockBit 5.0 ransomware targets Windows, Linux, and VMware ESXi systems with cross-platform encryption and advanced evasion. Released September 2025 under RaaS model, it uses double extortion by encrypting files and stealing data. US businesses face 67% of attacks, per leak site data.

Acronis Threat Research Unit analyzed the variants. They share XChaCha20 symmetric encryption with Curve25519 asymmetric. Randomized 16-character file extensions hide infections. Multiple threads speed up based on CPU cores.

Since December 2025, LockBit leak site lists 60 victims across manufacturing, healthcare, education, finance, and government. Proxmox virtualization also vulnerable.

Cross-Platform Capabilities

Windows Variant: Packed with custom packer (modified UPX-like). Fake Blender.exe manifest and expired BorgWarner certificate. Clears ETW, event logs, terminates EDR/backup services.

Linux Variant: Unpacked with string encryption. Logs encryption to /var/log/encrypt.log. Shows encrypted files count/size.

ESXi Variant: Targets VMFS datastores and VM disk files. vim-cmd shuts down VMs before encryption. Single host compromise hits dozens of VMs.

All versions geoblock post-Soviet countries. Check system locale before encrypt.

Evasion Techniques Table

PlatformKey EvasionAnti-Forensic
WindowsDLL unhooking, process hollowing, Mixed Boolean obfuscationETW patching, log clearing, ETWEventWrite hook
LinuxString encryption, dynamic API hashingDetailed logging for operators
ESXiVM shutdown via vim-cmdDatastore encryption blocks snapshots

Windows specifics:

  • Injects into defrag.exe via process hollowing
  • Return-address hashing conceals logic
  • Terminates security tools via hashed allowlist

Infrastructure and Impact

Leak site hosted on ex-SmokeLoader IP. Indicates criminal ecosystem sharing. 60 victims since Dec 2025.

Sectors hit (67% private US companies):

  • Manufacturing
  • Healthcare
  • Education
  • Financial services
  • Government

Ransom note identical across platforms. No decryption without payment.

Defender Recommendations

Immediate protections:

  • Offline, immutable backups
  • Network segmentation for hypervisors
  • EDR with ETW monitoring
  • Patch Proxmox/ESXi promptly
  • Locale-based geoblocking alerts

Detection:

  • Randomized file extensions
  • defrag.exe anomalies
  • /var/log/encrypt.log on Linux
  • VM shutdown events on ESXi

Technical Encryption Details

  • Symmetric: XChaCha20
  • Asymmetric: Curve25519
  • Threads: CPU core count
  • Extensions: 16 random chars
  • Pre-encrypt: Service termination, log wipe

Victim Statistics

CategoryPercentageExamples
US Private Companies67%Manufacturing, finance
Healthcare10%Hospitals, clinics
Education8%Universities
Government7%Local agencies
Other8%Retail, transport

FAQ

What platforms does LockBit 5.0 target?

Windows, Linux, ESXi, Proxmox. Acronis:

When released?

September 2025, active since December.

Encryption method?

XChaCha20 + Curve25519, random 16-char extensions.

Key evasion on Windows?

Process hollowing in defrag.exe, ETW patching, log clearing.

ESXi impact?

Encrypts VM datastores; one host hits many VMs.Trend Micro

Victim count?

60+ listed since Dec 2025, 67% US private sector.

How to protect virtualization?

Immutable backups, segment hypervisors, monitor vim-cmd.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages