Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
LockBit 5.0 Infrastructure Exposed in New Server, IP and Domain Leak

LockBit 5.0 Infrastructure Exposed in New Server, IP and Domain Leak

Posted on December 7, 2025December 7, 2025 By CWS

LockBit 5.0 key infrastructure uncovered, revealing the IP handle 205.185.116.233, and the area karma0.xyz is internet hosting the ransomware group’s newest leak website.

Based on researcher Rakesh Krishnan, hosted underneath AS53667 (PONYNET, operated by FranTech Options), a community steadily abused for illicit actions, the server shows a DDoS safety web page branded with “LOCKBITS.5.0,” confirming its position within the group’s operations.

This operational safety lapse arrives amid LockBit’s resurgence with enhanced malware capabilities.​

Krishnan first publicized the findings on December 5, 2025, through X (previously Twitter), noting the area’s latest registration and direct ties to LockBit 5.0 actions.

WHOIS information present karma0.xyz registered on April 12, 2025, with an expiration in April 2026, utilizing Cloudflare nameservers (iris.ns.cloudflare.com and tom.ns.cloudflare.com) and Namecheap privateness safety itemizing Reykjavik, Iceland, because the contact location.

The area standing signifies consumer switch prohibited, suggesting efforts to lock down management amid scrutiny.

Scans reveal a number of open ports on 205.185.116.233, together with susceptible distant entry, exposing the server to potential disruption.

PortProtocolComponent21TCPFTP Server80TCPApache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.0.30 G7gGBXkXcAAcgxa.jpg​3389TCPRDP (WINDOWS-401V6QI)5000TCPHTTP5985TCPWinRM47001TCPHTTP49666TCPFile Server

RDP on port 3389 stands out as a high-risk vector, doubtlessly permitting unauthorized entry to the Home windows host.

LockBit 5.0, which emerged round September 2025, helps Home windows, Linux, and ESXi, options randomized file extensions, geolocation-based evasion (skipping Russian methods), and accelerated encryption through XChaCha20.

This publicity highlights ongoing opsec failures for the group, disrupted a number of instances, but persistent. Defenders ought to block the IP and area instantly; researchers can monitor for additional leaks.​

Comply with us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Domain, Exposed, Infrastructure, Leak, LockBit, Server

Post navigation

Previous Post: Hackers Launch Widespread Attacks on Palo Alto GlobalProtect Portals from 7,000+ IPs
Next Post: Cybersecurity News Weekly Newsletter – 29.7 Tbps DDoS Attack, Chrome 143, React2Shell Vulnerabilities and Cloudflare Outage

Related Posts

Securing Remote Endpoints in Distributed Enterprise Systems Securing Remote Endpoints in Distributed Enterprise Systems Cyber Security News
New Tech Support Scam with Microsoft’s Logo Tricks Users to Steal Login Credentials New Tech Support Scam with Microsoft’s Logo Tricks Users to Steal Login Credentials Cyber Security News
What Are The Takeaways from The Scattered Lapsus $Hunters Statement? What Are The Takeaways from The Scattered Lapsus $Hunters Statement? Cyber Security News
LLM-Based LAMEHUG Malware Dynamically Generate Commands for Reconnaissance and Data Theft LLM-Based LAMEHUG Malware Dynamically Generate Commands for Reconnaissance and Data Theft Cyber Security News
Chinese Hackers Organization Influence U.S. Government Policy on International Issues Chinese Hackers Organization Influence U.S. Government Policy on International Issues Cyber Security News
K7 Antivirus Vulnerability Allows Attackers Gain SYSTEM-level Privileges K7 Antivirus Vulnerability Allows Attackers Gain SYSTEM-level Privileges Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News