Site icon Check Point Blog

LockBit Returns — and It Already Has Victims

Key Takeaways

Just months after being disrupted during Operation Cronos, the notorious LockBit ransomware group has reemerged — and it hasn’t wasted time. Check Point Research has confirmed that LockBit is back in operation and already extorting new victims.

Throughout September 2025, Check Point Research identified a dozen organizations targeted by the revived operation, with half of them infected by the newly released LockBit 5.0 variant and the rest by LockBit Black. The attacks span Western Europe, the Americas, and Asia, affecting both Windows and Linux systems, a clear sign that LockBit’s infrastructure and affiliate network are once again active.

A Rapid and Confident Comeback

At the beginning of September, LockBit officially announced its return on underground forums, unveiling LockBit 5.0 and calling for new affiliates to join. This latest version, internally codenamed “ChuongDong,” marks a significant evolution of the group’s encryptor family.

The newly observed LockBit 5.0 attacks span a broad range of targets — about 80% on Windows systems, and around 20% on ESXi and Linux environments. The quick reappearance of multiple active victims demonstrates that LockBit’s Ransomware-as-a-Service (RaaS) model has successfully reactivated its affiliate base.

From Disruption to Reorganization

Until its takedown in early 2024, LockBit was the most dominant RaaS operation globally, responsible for 20–30% of all data-leak site victim postings. Following Operation Cronos, several arrests and data seizures disrupted the group’s infrastructure. Competing ransomware programs, such as RansomHub and Qilin, briefly tried to absorb its affiliates.

However, LockBit’s administrator, LockBitSupp, evaded capture and continued to hint at a comeback on dark web forums. In May 2025, he posted defiantly on the RAMP forum: “We always rise up after being hacked.” By August, LockBitSupp reappeared again, claiming the group was “getting back to work,” a statement that quickly proved true.

Figure 1 – LockBit administrator announcing the group’s return on RAMP chat.

A Divided Underground

While LockBit regained traction on RAMP, other major forums like XSS continued to ban RaaS advertising. In early September, LockBitSupp attempted to be reinstated on XSS, even prompting a community vote, which ultimately failed.

Figure 2 – Voting results on LockBitSupp’s proposed return to XSS.

Figure 2 – Voting results on LockBitSupp’s proposed return to XSS.

This episode highlights a key tension in today’s underground scene: as many smaller ransomware operations emerge, platforms are increasingly wary of the visibility and law enforcement attention that large groups like LockBit attract. Yet, LockBit’s re-entry could signal a recentralization of the RaaS ecosystem under a single, experienced actor.

LockBit 5.0: Technical and Operational Enhancements

LockBit 5.0 introduces several updates designed to enhance efficiency, security, and stealth:

Affiliate control panel

 Provides improved management interface with individualized credentials.

To join, affiliates must deposit roughly $500 in Bitcoin for access to the control panel and encryptors, a model aimed at maintaining exclusivity and vetting participants.

Updated ransom notes now identify themselves as LockBit 5.0 and include personalized negotiation links granting victims a 30-day deadline before stolen data is published.

Figure 3 – LockBit 5.0 affiliate registration screen.

Implications: A Familiar Threat Returns

LockBit’s reemergence underscores the group’s resilience and sophistication. Despite high-profile law enforcement actions and public setbacks, the group has once again managed to restore its operations, recruit affiliates, and resume extortion.

With its mature RaaS model, cross-platform reach, and proven reputation among cyber criminals, LockBit’s return represents a renewed threat to organizations across all sectors. September’s wave of infections likely marks only the beginning of a larger campaign — and October’s postings may confirm the group’s full operational recovery.

Check Point Protections

Check Point customers are protected against LockBit and related ransomware threats through advanced threat prevention technologies.

Together, these solutions provide end-to-end defense against LockBit’s latest techniques, ensuring organizations remain protected even as ransomware operations evolve.

Check Point Research continues to monitor LockBit’s activity and will provide updates on the group’s evolving tools, victims, and ecosystem as new evidence emerges.

Exit mobile version