OpenClaw: What Security Teams Need to Know About “The Lobster”
OpenClaw: What Security Teams Need to Know About “The Lobster” January 2026 marked the...

Ransomware remains one of the most persistent cyber threats facing organizations globally. Among the plethora of ransomware families, LockBit has stood out for its scale, sophistication and adaptability. In late 2025, a new major iteration known as LockBit 5.0 began surfacing in attacks against businesses and critical infrastructure, representing both a continuation of a known menace and a significant evolution in capabilities.
In this blog we explore the origins of LockBit, what makes LockBit 5.0 different and how it operates.
LockBit first emerged in late 2019, initially observed under the code name “.abcd” due to the extension it added to encrypted files. It quickly evolved into a ransomware‑as‑a‑service (RaaS) platform, enabling affiliates to deploy the malware in exchange for a cut of ransom profits. Over subsequent years, LockBit became one of the most prolific ransomware families in the cybercrime ecosystem.
LockBit’s activity underscores its scale and impact on global and U.S. organizations:
Source: Joint advisory from U.S. and international cybersecurity agencies
LockBit’s growth was marked by iterative refinements. Earlier versions introduced features such as rapid data theft tools, advanced extortion tactics, affiliate recruitment incentives and modular design. Each version served to make the ransomware more capable and flexible, while the RaaS model allowed criminal groups to scale campaigns widely.
Despite significant disruption by law enforcement in early 2024, including operations that seized infrastructure and temporarily slowed activities, LockBit rebounded. In late 2025 the group announced LockBit 5.0, its latest variant, as part of its return to prominence. Source states that international action did not end LockBit operations but was followed by renewed attacks using a new version.
LockBit 5.0 represents a major evolution in ransomware strategy, reflecting both the complexity of modern enterprise IT environments and the ambitions of attackers.
Cross-Platform Targeting
Unlike earlier LockBit variants that primarily targeted Windows systems, LockBit 5.0 now includes dedicated builds for Windows, Linux, and VMware ESXi hypervisors. This allows attackers to compromise endpoints, servers, and virtualized infrastructure in a single campaign, dramatically increasing the potential impact of a breach. News outlets such as PCWorld report that this cross-platform capability enables attackers to disrupt entire enterprise environments, rather than just individual workstations.
Modular, Faster, and Harder to Detect
LockBit 5.0 is built with a modular design, with separate components for each operating system that can be configured at runtime. Its encryption routines have been optimized for speed, allowing attackers to lock down more systems in less time. The Windows build also incorporates advanced defense-evasion techniques, including code obfuscation, anti-debugging routines, and methods to disable system logs and security tools.
Double Extortion and Ransom Demands
LockBit 5.0 continues the double extortion approach, encrypting data while exfiltrating sensitive information and threatening to publish it if ransom demands are not met. By late 2025, LockBit’s leak site had listed more than 60 victims, spanning sectors such as manufacturing, healthcare, education, financial services, and government, according to public reporting.
Overall, LockBit 5.0’s enhanced technical capabilities, combined with its aggressive targeting approach, make it one of the most dangerous ransomware families in operation today.
LockBit 5.0 executes attacks in clear, deliberate stages to gain control, disrupt operations, and pressure victims.
Attackers enter networks using phishing emails, stolen credentials, exposed vulnerabilities, or brute-force attacks on RDP services. They move quietly to avoid detection while establishing a foothold.
Once inside, attackers escalate privileges, collect additional credentials, and move across network shares and domain controllers. They focus on servers, backups, and VMware ESXi hosts to maximize operational impact.
Before encrypting data, LockBit 5.0 disables security tools, clears Windows event logs, deletes shadow copies, and uses techniques such as DLL injection and process hollowing to bypass detection.
Dedicated builds attack VMware ESXi environments by shutting down virtual machines and encrypting datastore files. This allows attackers to compromise dozens of virtual machines within minutes.
LockBit 5.0 uses optimized routines for fast encryption across endpoints, servers, and virtual machines. The malware uses XChaCha20 for file encryption and Curve25519 for secure key exchange.
Sensitive data is stolen before or during encryption. Victims are threatened with publication on LockBit’s leak site if ransom demands are not met.
Ransom notes appear on all affected systems. Payments are demanded in cryptocurrency. Decryption tools are offered in exchange for payment, while the threat of public data release reinforces urgency.
Feature | LockBit 3.0 | LockBit 5.0 |
Target Platforms | Primarily Windows endpoints and servers | Windows, Linux, and VMware ESXi hypervisors in the same campaign |
Initial Access | Phishing, RDP brute-force, stolen credentials | Same as 3.0, but with more sophisticated credential harvesting and exploitation of exposed services |
Lateral Movement | Basic network traversal, mostly Windows shares | Broad lateral movement across domain controllers, file servers, backups, and hypervisors |
Defense Evasion | Simple disabling of security tools, deletion of shadow copies | Advanced obfuscation, anti-debugging, DLL injection, process hollowing, and environment checks |
Encryption | Standard file encryption, slower, Windows-only | Optimized multi-threaded encryption with XChaCha20 and Curve25519, faster across endpoints, servers, and virtual infrastructure |
Virtual Infrastructure Impact | Rarely targeted | Dedicated ESXi builds shut down virtual machines and encrypt datastores, affecting dozens of VMs simultaneously |
Extortion Model | File encryption only | Double extortion: encrypt files and exfiltrate sensitive data, threatening publication on leak sites |
Operational Scale | Limited to smaller Windows networks | Industrialized, affiliate-driven campaigns targeting complex, heterogeneous enterprise environments |
Infamous ransomware-as-a-service operation LockBit launched four new variants of its LockBit 5.0 payload last week. GBHackers News reports, “The latest LockBit 5.0 panel shows four new variants targeting Windows, Linux, VMware ESXi, and specialized deployments, demonstrating the group’s continued operational capabilities.”
The LB_Black_14_01_2026 variant attacks Windows systems, while LB_Linux_14_01_2026, LB_ESXi_14_01_2026, and LB_ChuongDong_14_01_2026 are aimed at Linux servers, ESXi hypervisors, and specialized environments.
Analysis of the new affiliate panel revealed that LockBit retained its core procedures despite the partial shutdown during Operation Cronos. Researchers noted that the panel, featuring holiday-themed elements, allows affiliates to manage multiple campaigns simultaneously, coordinate attacks, handle payment negotiations, and onboard new participants.
GBHackers News emphasizes, “The emergence of four new LockBit 5.0 iterations should prompt organizations to adopt threat detection signatures and prioritize endpoint detection and response warnings.”
LockBit 5.0 uses sophisticated techniques that evade traditional endpoint protections. It hides in memory, alters file extensions, and leverages API unhooking, making signature-based antivirus tools largely ineffective. Security experts agree that relying solely on known signatures cannot reliably stop obfuscated or evolving ransomware variants.
Disconnected or loosely integrated security tools leave critical gaps. Attackers exploit stolen credentials and use living-off-the-land techniques to move across networks without triggering alerts. By the time a traditional system reacts, ransomware may have already encrypted servers and exfiltrated sensitive data.
Modern defense requires continuous monitoring of behavior, context, and intent. AI-driven analytics, real-time telemetry correlation, and anomaly detection allow organizations to spot threats even when the exact malware is unknown. These approaches detect unusual processes, rapid file changes, lateral movement, and suspicious network activity before damage spreads.
Argus was built for this level of sophistication. It uses AI-powered behavioral models to detect ransomware in real time across endpoints, servers, virtual machines, and cloud systems. Argus identifies high-risk actions such as privilege escalation, unauthorized lateral movement, and mass file operations regardless of origin.
Argus’s advanced umbrella rule sets go beyond single-point alerts or signature matches. Carefully curated to monitor broad tactics and patterns, these rules detect malicious behavior across all layers of an environment, including endpoints, servers, virtual infrastructure, and cloud services.
By applying umbrella rules, Argus can:
These rules act as a high-level safety net, preventing ransomware from bypassing defenses through code changes or obfuscation. Combined with AI analytics, Argus adapts to new attack techniques, providing automated response and containment that keeps business operations running.
When Argus detects a threat, it stops encryption and exfiltration instantly, isolates impacted devices, and prevents lateral spread. Its machine-learning models continuously learn from new tactics, giving security teams early warnings and automated defenses that traditional tools simply cannot provide.
LockBit 5.0 is just the beginning. What we call the Complacency Blindspot is the danger of assuming that traditional defenses and familiar security tools are enough. Attackers exploit this blind spot with advanced techniques that bypass standard protections. Organizations need a strategic, Iron Dome-like approach that learns, adapts, and scales as threats evolve. Argus delivers this level of protection, detecting, halting, and containing ransomware across all environments to ensure operations continue uninterrupted and sensitive data stays secure.
OpenClaw: What Security Teams Need to Know About “The Lobster” January 2026 marked the...
VoidLink Malware Under Watch: Argus’ Approach to Cloud-Native Malware In late 2025, technology news...
Verticalized Threats: How Modern Malware Targets Specific Industries Cyber threats today are not defined...
Stay informed with bi-monthly insights and news.
Copyright © 2025 Argus. All rights reserved.
Fill out the form below!