Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

LockBit 5.0 Infrastructure Exposed in New Server, IP and Domain Leak

Posted on December 7, 2025December 7, 2025 By CWS

LockBit 5.0 key infrastructure uncovered, revealing the IP handle 205.185.116.233, and the area karma0.xyz is internet hosting the ransomware group’s newest leak website.

Based on researcher Rakesh Krishnan, hosted underneath AS53667 (PONYNET, operated by FranTech Options), a community steadily abused for illicit actions, the server shows a DDoS safety web page branded with “LOCKBITS.5.0,” confirming its position within the group’s operations.

This operational safety lapse arrives amid LockBit’s resurgence with enhanced malware capabilities.​

Krishnan first publicized the findings on December 5, 2025, through X (previously Twitter), noting the area’s latest registration and direct ties to LockBit 5.0 actions.

WHOIS information present karma0.xyz registered on April 12, 2025, with an expiration in April 2026, utilizing Cloudflare nameservers (iris.ns.cloudflare.com and tom.ns.cloudflare.com) and Namecheap privateness safety itemizing Reykjavik, Iceland, because the contact location.

The area standing signifies consumer switch prohibited, suggesting efforts to lock down management amid scrutiny.

Scans reveal a number of open ports on 205.185.116.233, together with susceptible distant entry, exposing the server to potential disruption.

PortProtocolComponent21TCPFTP Server80TCPApache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.0.30 G7gGBXkXcAAcgxa.jpg​3389TCPRDP (WINDOWS-401V6QI)5000TCPHTTP5985TCPWinRM47001TCPHTTP49666TCPFile Server

RDP on port 3389 stands out as a high-risk vector, doubtlessly permitting unauthorized entry to the Home windows host.

LockBit 5.0, which emerged round September 2025, helps Home windows, Linux, and ESXi, options randomized file extensions, geolocation-based evasion (skipping Russian methods), and accelerated encryption through XChaCha20.

This publicity highlights ongoing opsec failures for the group, disrupted a number of instances, but persistent. Defenders ought to block the IP and area instantly; researchers can monitor for additional leaks.​

Comply with us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Domain, Exposed, Infrastructure, Leak, LockBit, Server

Post navigation

Previous Post: Hackers Launch Widespread Attacks on Palo Alto GlobalProtect Portals from 7,000+ IPs

Related Posts

New Android Malware Mimics as SBI Card, Axis Bank Apps to Steal Users Financial Data Cyber Security News
Windows 11 Gets New Black Screen of Death With Auto Recovery Tool Cyber Security News
AWS Declares Major Outage Resolved After Nearly 24 Hours of Disruption Cyber Security News
Mystery OAST With Exploit for 200 CVEs Leveraging Google Cloud to Launch Attacks Cyber Security News
CISA Warns of Apple iOS, iPadOS, and macOS 0-day Vulnerability Exploited in Attacks Cyber Security News
Critical Convoy Vulnerability Let Attackers Execute Remote Code on Affected Servers Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • LockBit 5.0 Infrastructure Exposed in New Server, IP and Domain Leak
  • Hackers Launch Widespread Attacks on Palo Alto GlobalProtect Portals from 7,000+ IPs
  • New FvncBot Android Banking Attacking Users to Log Keystrokes and Inject Malicious Payloads
  • Researchers Uncover 30+ Flaws in AI Coding Tools Enabling Data Theft and RCE Attacks
  • Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • LockBit 5.0 Infrastructure Exposed in New Server, IP and Domain Leak
  • Hackers Launch Widespread Attacks on Palo Alto GlobalProtect Portals from 7,000+ IPs
  • New FvncBot Android Banking Attacking Users to Log Keystrokes and Inject Malicious Payloads
  • Researchers Uncover 30+ Flaws in AI Coding Tools Enabling Data Theft and RCE Attacks
  • Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark