{"id":71474,"date":"2022-11-07T09:09:58","date_gmt":"2022-11-07T01:09:58","guid":{"rendered":"https:\/\/x-phy.com\/?p=71474"},"modified":"2025-10-02T06:58:27","modified_gmt":"2025-10-02T06:58:27","slug":"lockbit-ransomware","status":"publish","type":"post","link":"https:\/\/x-phy.com\/lockbit-ransomware\/","title":{"rendered":"LockBit Ransomware \u2013 A Use Case Of Accenture"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"71474\" class=\"elementor elementor-71474\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4f0a063 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4f0a063\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-053d2d2\" data-id=\"053d2d2\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d562199 elementor-widget elementor-widget-text-editor\" data-id=\"d562199\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>LockBit ransomware gang recently hit Accenture, one of the top technological consulting organizations in the world.<\/p><p>The Dublin-based company cited that the attack was not classified as a\u00a0<a href=\"https:\/\/x-phy.com\/glossary\/ransomware-attacks\/\" target=\"_blank\" rel=\"noopener\">ransomware attack<\/a>\u00a0since they claimed that their operations were not affected.<\/p><p>According to one of their representatives, Stacey Jones, Accenture&#8217;s security controls and protocols spotted abnormal behavior in one of their settings. The issue was quickly resolved, and the impacted servers were separated. All of the afflicted systems were entirely recovered from backups. Neither Accenture&#8217;s operations nor their client&#8217;s systems were impacted.<\/p><p>Russian ransomware gang, which operates in\u00a0<a href=\"https:\/\/x-phy.com\/how-does-x-phy-ssd-help-protect-against-raas\/\" target=\"_blank\" rel=\"noopener\">ransomware-as-a-service<\/a>\u00a0model, claimed responsibility for the attack. The attackers demanded $50 million in ransom for six terabytes of data.<\/p><p>According to VX Underground, a company that says it has the largest collection of malware source codes globally, tweeted that LockBit shared more than 2000 files to the dark web for a brief time. The files contained case studies and presentations.<br \/>A screenshot from the ransomware operator&#8217;s dark web page where they had revealed the attack shows the attackers mentioning that Accenture&#8217;s security services were not at the level they could expect. This could highly affect the company&#8217;s reputation since it shows a bad picture to Accenture&#8217;s clients who share their valuable and confidential data with the company.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5f06d8f elementor-widget elementor-widget-image\" data-id=\"5f06d8f\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/x-phy.com\/wp-content\/uploads\/2021\/09\/accenture.png\" title=\"accenture\" alt=\"accenture\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-28fb22b elementor-widget elementor-widget-heading\" data-id=\"28fb22b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">How LockBit Ransomware works<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-75cac5e elementor-widget elementor-widget-text-editor\" data-id=\"75cac5e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>LockBit ransomware gang uses ransomware-as-a-service model whereby it is offered to others based on an affiliate model. If an attack goes through and a ransom is paid, the payments are shared between the gang and the entities behind the attack.<\/p><p>Once a single host in a network is affected, the ransomware can scan the network and infect other devices that are accessible in the network. The ransomware also uses windows native tools and protocols making it very difficult for endpoint security tools to identify it as malicious.<\/p><p>Here is a summary of how the ransomware works;<\/p><p><strong>1. Entry into Victim&#8217;s machines<\/strong><\/p><p>The attackers find a way to get into the victim&#8217;s system by\u00a0<a href=\"https:\/\/x-phy.com\/glossary\/brute-force-attacks\/\" target=\"_blank\" rel=\"noopener\">brute force<\/a>\u00a0or through phishing emails.<\/p><p><strong>2. Lateral movement and internal reconnaissance<\/strong><\/p><p>An internal Ip address over DCE-RPC starts performing WMI commands to multiple internal destinations. The command is followed by many other WMI commands over the DCE-RPC, which happen throughout the encryption process.<\/p><p>The infected device starts to write executable files over SMB to hidden shares on multiple destinations.<\/p><p>The ability to write this means that the ransomware escalates privileges to act as admin.<\/p><p>If not able to escalate privileges, the ransomware attempts to bypass Windows User Account Control.<br \/>The WMI commands continue, and the writing of executable files continues in different hidden destinations (Windows\/Temp).<\/p><p><strong>3. File Encryption<\/strong><\/p><p>The ransomware starts encrypting files while appending the .lockbit extension. At the same time, it continues utilizing the SMB to share to other devices via srvsvc and scanning critical TCP ports.<\/p><p>The ransomware continues to adopt new features making it more complicated and harder to detect. For example, recent ransomware variants have started to adopt the double extortion method whereby they perform\u00a0<a href=\"https:\/\/x-phy.com\/glossary\/data-loss-prevention\/\" target=\"_blank\" rel=\"noopener\">data breaches<\/a>\u00a0before encrypting victim&#8217;s systems.<\/p><p>Stolen data may be published or sold to competitors if requested ransoms are not paid. This adds more pressure for the victims to pay.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1168145 elementor-widget elementor-widget-heading\" data-id=\"1168145\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">X-PHY<sup>\u00ae<\/sup> Protection against LockBit Ransomware<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-53e33b7 elementor-widget elementor-widget-text-editor\" data-id=\"53e33b7\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><a href=\"https:\/\/x-phy.com\/products\/endpoint-security\/secure-ssd\/\">X-PHY<sup>\u00ae<\/sup> engineers<\/a> took LockBit ransomware and tested it with X-PHY<sup>\u00ae<\/sup> and a normal SSD to see the response. In less than 5 seconds, X-PHY<sup>\u00ae<\/sup> stopped the attack dead in its tracks, locked all data keeping it untouched, and immediately notified the user via email and OTP.<\/p><p>In the normal SSD, all data was compromised, and the PC could not boot up. It just showed the following pop-up screen;<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8ea7a23 elementor-widget elementor-widget-image\" data-id=\"8ea7a23\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1742\" height=\"625\" src=\"https:\/\/x-phy.com\/wp-content\/uploads\/2021\/09\/important-files-post-bitlock.png\" class=\"attachment-full size-full wp-image-71540\" alt=\"\" srcset=\"https:\/\/x-phy.com\/wp-content\/uploads\/2021\/09\/important-files-post-bitlock.png 1742w, https:\/\/x-phy.com\/wp-content\/uploads\/2021\/09\/important-files-post-bitlock-300x108.png 300w, https:\/\/x-phy.com\/wp-content\/uploads\/2021\/09\/important-files-post-bitlock-1024x367.png 1024w, https:\/\/x-phy.com\/wp-content\/uploads\/2021\/09\/important-files-post-bitlock-768x276.png 768w, https:\/\/x-phy.com\/wp-content\/uploads\/2021\/09\/important-files-post-bitlock-1536x551.png 1536w\" sizes=\"(max-width: 1742px) 100vw, 1742px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c64f3eb elementor-widget elementor-widget-text-editor\" data-id=\"c64f3eb\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tWhen tested with X-PHY<sup>\u00ae<\/sup>, the ransomware was detected within 5 seconds and the SSD was locked.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-668f4b3 elementor-widget elementor-widget-image\" data-id=\"668f4b3\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1227\" height=\"835\" src=\"https:\/\/x-phy.com\/wp-content\/uploads\/2021\/09\/x-phy-configurations.png\" class=\"attachment-full size-full wp-image-71539\" alt=\"\" srcset=\"https:\/\/x-phy.com\/wp-content\/uploads\/2021\/09\/x-phy-configurations.png 1227w, https:\/\/x-phy.com\/wp-content\/uploads\/2021\/09\/x-phy-configurations-300x204.png 300w, https:\/\/x-phy.com\/wp-content\/uploads\/2021\/09\/x-phy-configurations-1024x697.png 1024w, https:\/\/x-phy.com\/wp-content\/uploads\/2021\/09\/x-phy-configurations-768x523.png 768w\" sizes=\"(max-width: 1227px) 100vw, 1227px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b4bfc6b elementor-widget elementor-widget-text-editor\" data-id=\"b4bfc6b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>On locking the SSD,\u00a0<a href=\"https:\/\/x-phy.com\/\" target=\"_blank\" rel=\"noopener\">X-PHY\u00ae<\/a>\u00a0notifies the user via email that a ransomware attack has been detected and the device locked.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d2e306c elementor-widget elementor-widget-image\" data-id=\"d2e306c\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"350\" src=\"https:\/\/x-phy.com\/wp-content\/uploads\/2021\/09\/x-phy-email.png\" class=\"attachment-large size-large wp-image-71478\" alt=\"\" srcset=\"https:\/\/x-phy.com\/wp-content\/uploads\/2021\/09\/x-phy-email.png 977w, https:\/\/x-phy.com\/wp-content\/uploads\/2021\/09\/x-phy-email-300x131.png 300w, https:\/\/x-phy.com\/wp-content\/uploads\/2021\/09\/x-phy-email-768x336.png 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-99c15dc elementor-widget elementor-widget-text-editor\" data-id=\"99c15dc\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tTo unlock X-PHY<sup>\u00ae<\/sup>, the user will have to use connected duo authentication to unlock X-PHY<sup>\u00ae<\/sup>, otherwise, it remains locked. After unlocking, X-PHY<sup>\u00ae<\/sup> will have recorded all events in the event log, and the user can now access data in a normal way.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9cf6922 elementor-widget elementor-widget-image\" data-id=\"9cf6922\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"471\" src=\"https:\/\/x-phy.com\/wp-content\/uploads\/2021\/09\/x-phy-unlock.png\" class=\"attachment-large size-large wp-image-71477\" alt=\"\" srcset=\"https:\/\/x-phy.com\/wp-content\/uploads\/2021\/09\/x-phy-unlock.png 977w, https:\/\/x-phy.com\/wp-content\/uploads\/2021\/09\/x-phy-unlock-300x177.png 300w, https:\/\/x-phy.com\/wp-content\/uploads\/2021\/09\/x-phy-unlock-768x452.png 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9896384 change_color elementor-widget elementor-widget-text-editor\" data-id=\"9896384\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>As attackers utilise more sophisticated attack techniques, it is becoming harder and harder for companies to stay ahead of the attacker&#8217;s techniques and keep their data secure from cyberattacks. That&#8217;s why we brought X-PHY<sup>\u00ae<\/sup> to you, it automatically detects suspicious behavior since it is highly trained with huge databases of malware to understand all possible behavior for malware.<\/p><p>Related:<\/p><p><strong><a href=\"https:\/\/x-phy.com\/hellokitty-ransomware-protection\/\">HelloKitty Ransomware Prevention with X-PHY SSD<\/a><\/strong><\/p><p class=\"ast-single-post-order\"><strong><a href=\"https:\/\/x-phy.com\/wannacry-ransomware\/\">What is WannaCry ransomware and How to protect your data from the WannaCry ransomware?<\/a><\/strong><\/p><p>X-PHY<sup>\u00ae<\/sup> AI core is placed closest to your data and is highly trained to protect you from any threat that can touch your data.<\/p><p><strong>X-PHY<sup>\u00ae<\/sup> Response Flow<\/strong><\/p><ul><li>X-GUARD THREAT LOCK features SECURITY SCOUT and GUARDIAN PRO-X work together to stop any attempt by the ransomware to breach or clone your sensitive data.<\/li><li>X-FILE FORENSIC AGENT features ACTIVE DETECTIVE and DEEP INVESTIGATION introduce extra file protection features by preventing any illegal data modifications. They also record all activities and the application behind them, making it easy for X-PHY<sup>\u00ae<\/sup> to identify suspicious actors.<\/li><li>The other features trigger X-FACTOR ENCRYPTION LOCK after noticing suspicious activity to breach and\/or to encrypt user data. KEYCODE 2-FACTOR feature within X-FACTOR ENCRYPTION LOCK locks down all the data in X-PHY<sup>\u00ae<\/sup> making it inaccessible to the ransomware.<\/li><li>X-PHY<sup>\u00ae<\/sup> sends notifications to the user in their computer showing that ransomware has been detected. An email notification is also sent to the user simultaneously through the user&#8217;s registered email. The user will require OTP to unlock the SSD.<\/li><li>X-PHY<sup>\u00ae<\/sup> records the attack activity in the event log, and will automatically stop any action with the same behavior in the future.<\/li><\/ul><p>See Also:<\/p><div class=\"ast-single-post-order\"><h6><a href=\"https:\/\/x-phy.com\/how-does-x-phy-ssd-help-protect-against-raas\/\">How does X-PHY<sup>\u00ae<\/sup>\u00a0SSD help protect against RaaS<\/a><\/h6><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bd1072a elementor-widget elementor-widget-image\" data-id=\"bd1072a\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"418\" src=\"https:\/\/x-phy.com\/wp-content\/uploads\/2021\/09\/active-detective.png\" class=\"attachment-large size-large wp-image-71476\" alt=\"\" srcset=\"https:\/\/x-phy.com\/wp-content\/uploads\/2021\/09\/active-detective.png 977w, https:\/\/x-phy.com\/wp-content\/uploads\/2021\/09\/active-detective-300x157.png 300w, https:\/\/x-phy.com\/wp-content\/uploads\/2021\/09\/active-detective-768x401.png 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>LockBit ransomware gang recently hit Accenture, one of the top technological consulting organizations in the world. The Dublin-based company cited that the attack was not classified as a ransomware attack [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":75752,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","inline_featured_image":false,"footnotes":""},"categories":[12],"tags":[21],"class_list":["post-71474","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-use-cases","tag-lockbit-ransomware-analysis"],"_links":{"self":[{"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/posts\/71474","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/comments?post=71474"}],"version-history":[{"count":1,"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/posts\/71474\/revisions"}],"predecessor-version":[{"id":110293,"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/posts\/71474\/revisions\/110293"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/media\/75752"}],"wp:attachment":[{"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/media?parent=71474"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/categories?post=71474"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/tags?post=71474"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}