Skip to main content
Mallory

LockBit 5.0 Ransomware Expands Cross-Platform Attacks on Windows, Linux, and VMware ESXi

ransomware-group-operationransomware-tooling-evolutiondefense-evasion-methoddata-exfiltration-methodoperational-disruption
Updated March 21, 2026 at 02:32 PM2 sources
Share:
LockBit 5.0 Ransomware Expands Cross-Platform Attacks on Windows, Linux, and VMware ESXi

Get Ahead of Threats Like This

Know if you're exposed. Before adversaries strike.

Acronis Threat Research Unit reported active campaigns using LockBit 5.0, a major update to the LockBit ransomware-as-a-service (RaaS) operation that broadens targeting across Windows, Linux, and VMware ESXi in coordinated intrusions. The variant continues double extortion (data theft plus encryption) and is positioned for enterprise impact by enabling attackers to hit endpoints, servers, and hypervisors—where a single ESXi compromise can disrupt many virtual machines at once. Reporting also notes the group’s claimed ability to operate against Proxmox virtualization environments, further expanding the potential attack surface in organizations adopting alternative hypervisors.

Technical analysis highlights stronger and more enterprise-focused builds, with the Windows payload using advanced defense-evasion and anti-analysis techniques such as packing/obfuscation, DLL unhooking, process hollowing, and ETW (Event Tracing for Windows) patching, alongside log-clearing to reduce forensic visibility. The Linux/ESXi builds are described as less reliant on packing but use extensive string encryption to hinder detection, while maintaining strong encryption routines and using randomized file extensions; Acronis-linked reporting also cites faster encryption and continuity with LockBit 4’s design. Victimology cited in coverage indicates a heavy focus on the U.S. business sector and a broad spread across industries (including manufacturing, healthcare, education, financial services, and government), with dozens of recent leak-site postings used to pressure victims and demonstrate ongoing operational tempo despite law-enforcement disruption efforts.

Timeline

  1. Feb 16, 2026

    Acronis publishes technical analysis of LockBit 5.0

    Acronis Threat Research Unit reported identifying LockBit 5.0 in active campaigns and detailed its enhanced defense evasion, anti-analysis, and faster encryption capabilities. The analysis also described its use of XChaCha20 and Curve25519, randomized file extensions, multi-threaded encryption, and infrastructure links involving an IP previously associated with SmokeLoader activity.

  2. Feb 16, 2026

    LockBit 5.0 begins cross-platform attacks on Windows, Linux, and ESXi

    Active campaigns using LockBit 5.0 targeted Windows, Linux, and VMware ESXi systems, expanding the group's reach across endpoints, servers, and virtualized infrastructure. Reporting also said the malware was advertised as working on all versions of Proxmox.

  3. Dec 1, 2025

    LockBit leak site reaches 60 listed victims

    Since December 2025, the LockBit leak site reportedly accumulated 60 victim entries, indicating sustained activity by the operation. The reported victimology was centered on U.S. businesses, especially private companies, with additional impact across manufacturing, healthcare, education, financial services, and government.

  4. Sep 1, 2025

    LockBit 5.0 introduced as a new ransomware version

    LockBit 5.0 was introduced in September 2025 as a major new release of the LockBit ransomware family. The variant was positioned for enterprise-focused attacks and operated under the group's ransomware-as-a-service model.

See the full picture in Mallory

Mallory subscribers get deeper analysis on every story, including:

Impact Assessment

Who’s affected and how

Technical Details

Deep-dive technical analysis

Response Recommendations

Actionable next steps for your team

Indicators of Compromise

IPs, domains, hashes, and more

AI Threads

Ask questions and take action on every story

Advanced Filters

Filter by topic, classification, timeframe

Scheduled Alerts

Get matching stories delivered automatically

Related Entities

Threat Actors

Malware

Organizations

Affected Products

Related Stories

LockBit 5.0 Ransomware Introduces Advanced Encryption and Maintains Global Dominance

LockBit 5.0 Ransomware Introduces Advanced Encryption and Maintains Global Dominance

LockBit 5.0 has emerged as the latest evolution of the notorious ransomware-as-a-service operation, introducing sophisticated encryption algorithms and advanced anti-analysis techniques that significantly complicate detection and recovery efforts for targeted organizations. The malware now employs a combination of ChaCha20-Poly1305 for file encryption and X25519 with BLAKE2b for secure key exchange, while also terminating Volume Shadow Copy Service processes to prevent system recovery. LockBit 5.0’s runtime flexibility allows it to operate even without specific parameters, and its use of advanced packing and obfuscation further hinders static analysis by security professionals. Despite increased law enforcement pressure, LockBit has sustained its position as a dominant global ransomware threat, accounting for a substantial share of attacks worldwide. The group’s operations have impacted a wide range of sectors, including IT, electronics, law firms, and religious institutions, resulting in billions of dollars in ransom payments and recovery costs. LockBit continues to leverage its dark web platform to publicly list compromised organizations and stolen data, using these tactics to pressure victims into paying ransoms.

1 months ago
LockBit 5.0 Ransomware Variants and Updated Affiliate Panel Exposed

LockBit 5.0 Ransomware Variants and Updated Affiliate Panel Exposed

Security researchers reported that **LockBit** has continued operating after the law-enforcement disruption known as **Operation Cronos**, releasing multiple new **LockBit 5.0** payload variants and maintaining an active ransomware-as-a-service (RaaS) affiliate ecosystem. Reporting citing *Flare.io* analysis described four newly observed builds labeled `LB_Black_14_01_2026` (Windows), `LB_Linux_14_01_2026` (Linux), `LB_ESXi_14_01_2026` (VMware ESXi), and `LB_ChuongDong_14_01_2026` (specialized deployments), indicating an ongoing multi-platform targeting strategy. Analysis of the latest **LockBit 5.0 affiliate panel** indicated the operation’s core workflows remain largely intact, with only minor cosmetic/interface changes (including **holiday-themed** elements). The panel reportedly supports coordination of multiple concurrent campaigns and includes capabilities for attack management, affiliate onboarding, and victim payment/negotiation handling—signaling continued operational maturity despite reputational damage and prior takedown pressure. Researchers recommended organizations prioritize updated detection/signatures and closely monitor EDR alerts for activity consistent with these new LockBit 5.0 variants.

1 months ago
Kyber ransomware hit Windows and ESXi in coordinated cross-platform attacks

Kyber ransomware hit Windows and ESXi in coordinated cross-platform attacks

Rapid7 reported that a **Kyber ransomware** affiliate deployed two distinct payloads in the same March 2026 intrusion, targeting both **VMware ESXi** infrastructure and **Windows file servers** to maximize operational disruption. The ESXi variant encrypted VMware datastore files, could optionally terminate virtual machines, and defaced SSH and web management interfaces with ransom notes. The Windows variant targeted core file systems and added broader impact features, including killing backup-, database-, and IIS-related services, deleting shadow copies, disabling recovery options, clearing event logs, and testing an experimental **Hyper-V** shutdown capability. The two samples shared the same campaign ID and **Tor-based** negotiation and leak infrastructure, linking them to the same affiliate, but their internals differed sharply. Rapid7 found the ESXi payload falsely advertised post-quantum protection with `Kyber1024`; in practice, it used **ChaCha8** with **RSA-4096** key wrapping. By contrast, the Windows variant, written in **Rust**, appeared to implement the claimed hybrid scheme using **AES-256-CTR**, `Kyber1024`, and **X25519**. Public reporting indicates the group remains relatively new, with limited prior technical analysis and only one victim publicly listed on its extortion site: a large U.S. defense contractor and IT services provider.

1 weeks ago

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed. Before adversaries strike.

LockBit 5.0 Ransomware Expands Cross-Platform Attacks on Windows, Linux, and VMware ESXi | Mallory