Inactive ransomware operator
← All groupslockbit2
1,002 victims indexed · first seen 5 years ago · last activity 4 years ago
At a glance
- Status
- inactive
- First seen
- 5 years ago
- Last activity
- 4 years ago
- Onion sites
- 5 known endpoints
About
Timeline
10 monthsTop countries
MITRE ATT&CK
16 techniques · 10 tacticsTactics
Techniques
- T1566Phishing
- T1190Exploit Public-Facing Application
- T1078Valid Accounts
- T1059Command and Scripting Interpreter
- T1053Scheduled Task/Job
- T1543Create or Modify System Process
- T1055Process Injection
- T1562Impair Defenses
- T1027Obfuscated Files or Information
- T1003OS Credential Dumping
- T1021Remote Services
- T1083File and Directory Discovery
- T1560Archive Collected Data
- T1041Exfiltration Over C2 Channel
- T1486Data Encrypted for Impact
- T1490Inhibit System Recovery
Detection · YARA rules
2 rulesLockbit2_Jul21
YARA rule from ATR/Trellix: ransomware/RANSOM_Lockbit2.yar
source: ATR/Trellix
to
YARA rule from ATR/Trellix: ransomware/RANSOM_Lockbit2.yar
source: ATR/Trellix
Recent victims
Loading…
Onion infrastructure
5 known- http://lockbitaptq7ephv2oigdncfhtwhpqgwmqojnxqdyhprxxfpcllqdxad.onion
- http://lockbitaptstzf3er2lz6ku3xuifafq2yh5lmiqj5ncur6rtlmkteiqd.onion
- http://oyarbnujct53bizjguvolxou3rmuda2vr72osyexngbdkhqebwrzsnad.onion
- http://yq43odyrmzqvyezdindg2tokgogf3pn6bcdtvgczpz5a74tdxjbtk2yd.onion
- http://zqaflhty5hyziovsxgqvj2mrz5e5rs6oqxzb54zolccfnvtn5w2johad.onion
Source
Updated 4 years agoData on this page is sourced from the group's own leak posts, cross-checked with public ransomware trackers (RansomLook, ransomware.live, RansomWatch), MITRE ATT&CK, and our own Tor and Telegram crawlers. This is a public observatory page — share freely.
