A sophisticated new ransomware family, dubbed NotLockBit, is creating waves in the cybersecurity world with its advanced capabilities and cross-platform functionality. Mimicking the techniques of the infamous LockBit ransomware, NotLockBit has proven to be a formidable new threat, targeting both macOS and Windows operating systems with tailored attack strategies.
Distributed as an x86_64 binary written in the Go programming language, NotLockBit is packed with advanced features that enhance its efficiency and destructiveness. Key functionalities include:
Cybersecurity researchers at Qualys identified NotLockBit as an advanced and highly adaptive ransomware strain. “This new variant demonstrates significant sophistication, combining encryption, data theft, and self-removal to maximize its impact,” the researchers noted.
Upon execution, NotLockBit initiates a detailed reconnaissance phase, particularly optimized for macOS environments. Using the go-sysinfo module, the ransomware gathers extensive system information, including:
The ransomware employs a multi-step encryption strategy:
/proc/
, /sys/
, and /dev/
.Encrypted files retain their original location but are renamed with a unique identifier followed by an .abcd extension. The original files are deleted, making file recovery without the private decryption key nearly impossible.
NotLockBit prioritizes a wide range of file types to maximize damage, including:
.doc
, .pdf
, .txt
.csv
, .xls
, .ppt
.jpg
, .png
, .mpg
.vmdk
, .vmsd
, .vbox
This deliberate selection highlights the ransomware’s focus on high-value data.
In addition to encryption, NotLockBit exfiltrates sensitive files to attacker-controlled cloud storage, primarily leveraging Amazon S3 buckets. This allows attackers to threaten victims with public release or sale of stolen data, increasing pressure to pay the ransom.
For macOS users, NotLockBit employs the osascript command to programmatically change the desktop background, replacing it with a ransom note. This serves as a visual marker of the attack’s conclusion.
The ransomware wraps up its attack by executing a self-deletion mechanism:
NotLockBit employs varying levels of obfuscation to hinder detection and analysis. While some samples exhibit visible function names, others are fully obfuscated or stripped, complicating reverse-engineering efforts. Certain variants omit data exfiltration entirely, suggesting ongoing development or customization for specific attack scenarios.
Investigate Real-World Malicious Links, Malware & Phishing Attacks With ANY.RUN – Try for Free
Given the sophistication of NotLockBit, robust detection and mitigation measures are essential. Qualys has confirmed the ability of its EDR & EPP solutions to detect and quarantine the ransomware upon download.
To combat ransomware threats like NotLockBit, organizations are advised to implement the following best practices:
The emergence of a cross-platform ransomware family like NotLockBit marks a concerning evolution in the ransomware landscape. Its ability to target both macOS and Windows systems, combined with advanced obfuscation, data theft, and a self-deleting mechanism, underscores the growing sophistication of modern cyberattacks.
Security professionals need to maintain vigilance, as NotLockBit and other emerging threats continue to expand the capabilities of ransomware. Comprehensive defenses, proactive monitoring, and continuous education will be critical in mitigating the impact of these advanced threats.
2024 MITRE ATT&CK Evaluation Results for SMEs & MSPs -> Download Free Guide
Cybersecurity in mergers and acquisitions is crucial, as M&A activities represent key inflection points for…
In 2025, cybersecurity trends for CISOs will reflect a landscape that is more dynamic and…
Zero-trust architecture has become essential for securing operations in today’s hyper-connected world, where corporate network…
The Chrome team has officially promoted Chrome 136 to the stable channel for Windows, Mac,…
By fusing agentic AI and contextual threat intelligence, SecAI transforms investigation from a bottleneck into…
According to IBM Security annual research, "Cost of a Data Breach Report 2024", an average…