Analysis of the LockBit 3.0 and its infiltration into Advanced's infrastructure crippling NHS services

08/10/2023
by   Oladipupo Akinyemi, et al.
0

The LockBit 3.0 ransomware variant is arguably the most threatening of malware in recent times. With no regard for a victim's industry, the ransomware has undergone several evolutions to arrive at an adaptable and evasive variant which has been a menace to governments and organisations, recently infiltrating Advanced Computer Software group. Previous LockBit studies mostly concentrated on measuring the impact of the ransomware attack, prevention, encryption detection, decryption, or data recovery, thereby providing little or no benefit to the less tech savvy populace as a detailed breakdown of the mode of attack is rarely examined. This article analyses the LockBit 3.0 attack techniques with a contextual illustration of the attack on Advanced Computer Software group. With the NHS being a major client of the organisation, and its services alongside 15 other clients being crippled for hours during the attack, attention is drawn to how dreadful such disruption may be in critical organisations. We observed that the upgrade of Lockbit based on releasing newer versions is in a bid to continuously ensure the malware's efficiency - a virtue that keeps it at the zenith - by staying ahead of improved defenses. Our study highlights social engineering as a vibrant portal to Lockbit's maliciousness and indicates an investment in detection systems may profit more than in prevention systems. Therefore, further research should consider improving detection systems against Lockbit 3.0.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
07/24/2023

Malware Resistant Data Protection in Hyper-connected Networks: A survey

Data protection is the process of securing sensitive information from be...
research
11/25/2019

JSLess: A Tale of a Fileless Javascript Memory-Resident Malware

New computing paradigms, modern feature-rich programming languages and o...
research
09/21/2020

AI assisted Malware Analysis: A Course for Next Generation Cybersecurity Workforce

The use of Artificial Intelligence (AI) and Machine Learning (ML) to sol...
research
10/25/2018

Sorry: Ambient Tactical Deception Via Malware-Based Social Engineering

In this paper we argue, drawing from the perspectives of cybersecurity a...
research
09/23/2021

ADVERSARIALuscator: An Adversarial-DRL Based Obfuscator and Metamorphic Malware SwarmGenerator

Advanced metamorphic malware and ransomware, by using obfuscation, could...
research
05/13/2019

Analyzing "Not-a-Virus" Bundled Adware: The Wajam Case

Case studies on malicious code mostly focus on botnets and worms (recent...
research
07/17/2023

Are we there yet? An Industrial Viewpoint on Provenance-based Endpoint Detection and Response Tools

Provenance-Based Endpoint Detection and Response (P-EDR) systems are dee...

Please sign up or login with your details

Forgot password? Click here to reset