Understanding ransomware threat actors - LockBit

This section contains time sensitive announcements about specific cyber threats, vulnerabilities and scams. Each alert has information you need to be aware of, and what actions to take to mitigate any risk to you or your organisation.

Subscribe to our updates to be notified as soon as we publish an alert.

12:00am, 15 June 2023

TLP Rating: Clear

Understanding ransomware threat actors - LockBit

The National Cyber Security Centre (NCSC) has joined CERT NZ and international partners to publish a joint Cybersecurity Advisory entitled Understanding ransomware threat actors: LockBit.

Understanding ransomware threat actors: LockBit | CISA External Link

This joint advisory is a comprehensive overview of common tools, exploits, and tactics, techniques, and procedures (TTPs) used by LockBit affiliates, along with recommended mitigations to help organisations reduce the likelihood and impact of future ransomware incidents.  

International partners include the:

  • U.S. Cybersecurity and Infrastructure Security Agency (CISA),
  • Federal Bureau of Investigation (FBI),
  • Multi-State Information Sharing and Analysis Center (MS-ISAC), 
  • Australian Cyber Security Centre (ASD’s ACSC), 
  • Canadian Centre for Cyber Security (CCCS), 
  • United Kingdom’s National Cyber Security Centre (NCSC-UK), 
  • Federal Office for Information Security (BSI), and 
  • National Cybersecurity Agency of France.

What's happening

Systems affected

Threat actors using LockBit, the most globally used and prolific ransomware-as-a-service (RaaS) in 2022 and 2023, have attacked organisations of all sizes across a wide range of critical infrastructure sectors.  

To support organisations in understanding and defending against this global threat and its large number of unconnected LockBit affiliates, this advisory includes:

  • a list of approximately 30 freeware and open-source tools used by LockBit actors,
  • more than 40 TTPs mapped to the MITRE ATT&CK framework,
  • common vulnerabilities and exposures (CVEs) exploited by LockBit actors,
  • an overview of LockBit evolution, global trends, and statistics, and
  • mitigation advice and support resources from authoring agencies. 

What this means

Lisa Fong, Deputy Director-General, NCSC-NZ said, “The National Cyber Security Centre, part of New Zealand’s Government Communications Security Bureau, shares international partners' focus on addressing ransomware.  

“The NCSC welcomes this advisory, which reflects the experience of our partners and the NCSC’s learnings from helping organisations address LockBit’s impact in New Zealand. These combined learnings will help ensure organisations have the best information to increase their resilience to the threat from ransomware.  

“Helping build cyber security resilience through the sharing of cyber threat information is a key part of the NCSC’s focus, and we encourage all readers to apply the mitigations set in this advisory.”

What to look for

How to tell if you're at risk

Organisations should review the advisory’s tools, TTPs, and CVEs to assess potential exposure to LockBit ransomware activity.

What to do

Prevention

CERT NZ Director Rob Pope said, “Businesses in New Zealand need to be aware of this and take action. Ransomware is one of the most devastating things that can happen to an organisation and we need to ensure that our countries are resilient to these attacks.”

More information

Read or download the joint advisory at CISA's website. 

Understanding ransomware threat actors: LockBit | CISA External Link

For queries related to this joint advisory, please contact: info@ncsc.govt.nz