Threat Group Profile

LockBit 5.0

Enterprise & Critical Infrastructure

Overview

LockBit 5 represents the latest iteration of the LockBit ransomware family — one of the most prolific ransomware operations in history. Following law enforcement action against previous versions, the group has rebuilt infrastructure across dozens of onion addresses. The RaaS model allows numerous affiliates to deploy the ransomware globally.

Tactics, Techniques & Procedures

RaaS affiliate model, high-volume automated exploitation, data leak site

Primary Targets

All sectors — broad indiscriminate targeting

Indicators of Compromise

  • LockBit 5 encryptor
  • StealBit exfiltration tool
  • Cobalt Strike
  • Mimikatz

MITRE ATT&CK Techniques

  • T1486
  • T1041
  • T1078
  • T1133
  • T1210 Exploitation of Remote Services

Quick Reference

StatusACTIVE
TypeRansomware-as-a-Service
First Seen2025
Victims TrackedMonitored

Dark Web Presence

  • http://lockbitsuppyx2jegaoyiw44ica5vdho63m5ijjlmfb7omq3tfr3qhyd.onion
  • http://lockbitapt67g6rwzjbcxnww5efpg4qok6vpfeth7wx3okj52ks4wtad.onion
  • http://lockbitynxdcxtuvma5deq5pxtnqoacftuigkk37xjq3whefozdpcuad.onion

Under Attack?

If you believe lockbit5 has targeted your organisation, contact Binary Response immediately.

Emergency Response Dark Web Monitoring →

Related Threat Actors

LockBit Rhysida Akira DragonForce View All →