Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
LockBit 5.0 Targets Multiple Systems with Enhanced Ransomware

LockBit 5.0 Targets Multiple Systems with Enhanced Ransomware

Posted on February 16, 2026 By CWS

LockBit 5.0 has emerged as a significant threat in the cyber landscape, representing an evolution of the notorious LockBit ransomware family. Launched in September 2025, this version expands its reach by targeting a broader range of operating systems, including Windows, Linux, and ESXi, posing a serious risk to businesses globally.

Versatile Ransomware Targeting Multiple Platforms

The latest version of LockBit has enhanced its capabilities to function across various platforms, making it a formidable threat to diverse IT infrastructures. By using a ransomware-as-a-service model, it employs a double-extortion strategy that not only encrypts critical files but also extracts sensitive data, pressuring affected organizations to comply with ransom demands.

The primary target of this malicious software is the U.S. business sector, with around 67% of its victims being private companies. Other sectors such as manufacturing, healthcare, education, financial services, and government agencies have also been impacted. Since December 2025, the campaign has resulted in 60 documented victim cases on the LockBit data leak site, highlighting its extensive reach.

Enhanced Capabilities and Evasion Techniques

LockBit 5.0 introduces features that make it especially concerning for security professionals. Its compatibility with all versions of Proxmox, a popular open-source virtualization platform, is particularly alarming given its growing adoption by enterprises. This version builds on its predecessor by incorporating advanced evasion methods and speeding up the encryption process.

In particular, the Windows variant utilizes sophisticated anti-analysis techniques, such as packing mechanisms, DLL unhooking, process hollowing, and Event Tracing for Windows patching. The ransomware also erases all system logs to prevent forensic analysis. Although the Linux and ESXi variants are not packed, they encrypt most strings to avoid detection.

Persistent Threat with Complex Encryption

All versions of LockBit 5.0 apply the same encryption algorithms, utilizing XChaCha20 for symmetric encryption and Curve25519 for asymmetric encryption. This approach ensures rapid file encryption, with each file receiving a random 16-character extension to complicate identification.

The ransomware’s Windows version further complicates detection by using Mixed Boolean-Arithmetic obfuscation wrapped around return-address dependent hashing. It avoids infecting systems in post-Soviet states by performing geolocation checks and verifying system language settings against Russian identifiers.

Furthermore, LockBit employs process hollowing by injecting itself into the legitimate Windows defrag.exe utility, thereby executing under the guise of a trusted process. After encryption, it disables Event Tracing for Windows monitoring and clears event logs to cover its tracks.

Organizations are advised to adopt comprehensive security measures, including regular offline backups, network segmentation, endpoint detection, and timely patch management. Employee awareness training is essential to defend against phishing attacks, and system administrators should be vigilant for suspicious processes and encryption activities.

Cyber Security News Tags:cyber threats, Cybersecurity, data encryption, ESXi, Linux security, LockBit, Malware, Ransomware, threat analysis, Windows security

Post navigation

Previous Post: Cloud Password Managers Face Security Challenges
Next Post: Palo Alto Networks Finalizes $25B CyberArk Acquisition

Related Posts

10 Best Cloud Penetration Testing Companies in 2025 10 Best Cloud Penetration Testing Companies in 2025 Cyber Security News
Phishing Breaks More Defenses Than Ever. Here’s the Fix  Phishing Breaks More Defenses Than Ever. Here’s the Fix  Cyber Security News
Pentest Copilot – AI-based Ethical Hacking Tool to Streamline Penetration Testing Pentest Copilot – AI-based Ethical Hacking Tool to Streamline Penetration Testing Cyber Security News
Citrix NetScaler ADC and Gateway 0-Day RCE Vulnerability Actively Exploited in Attacks Citrix NetScaler ADC and Gateway 0-Day RCE Vulnerability Actively Exploited in Attacks Cyber Security News
Hackers Actively Exploiting 7-Zip RCE Vulnerability in the Wild Hackers Actively Exploiting 7-Zip RCE Vulnerability in the Wild Cyber Security News
New Android Malware ClayRat Mimic as WhatsApp, Google Photos to Attack Users New Android Malware ClayRat Mimic as WhatsApp, Google Photos to Attack Users Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Airleader Vulnerability Poses Remote Code Execution Risk
  • Palo Alto Networks Finalizes $25B CyberArk Acquisition
  • LockBit 5.0 Targets Multiple Systems with Enhanced Ransomware
  • Cloud Password Managers Face Security Challenges
  • Noodlophile Malware Uses Fake Jobs to Evade Security

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Airleader Vulnerability Poses Remote Code Execution Risk
  • Palo Alto Networks Finalizes $25B CyberArk Acquisition
  • LockBit 5.0 Targets Multiple Systems with Enhanced Ransomware
  • Cloud Password Managers Face Security Challenges
  • Noodlophile Malware Uses Fake Jobs to Evade Security

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News