“LockBit 3.0”, the first ransomware bug bounty program, was introduced by the LockBit ransomware operation along with leaking new extortion tactics and Zcash cryptocurrency payment options. The ransomware operation has become the most prolific ransomware operation since launching in 2019 and has accounted for 40% of all ransomware attacks in May 2022. After two months of beta testing and with the new version already being deployed in attacks, the cybercrime group released LockBit 3.0, an updated ransomware-a-as-service (RaaS) operation. The ransom notes changed from “Restore-My-Files.txt” to [id].README.txt, however, it’s unknown what technical changes were made to the encryptor.
With releasing LockBit 3.0, the operation launched the first bug bounty program in which the ransomware group is offering security researchers money to submit bug reports. The LockBit 3.0 bug bounty page explains that the group is inviting all global security researchers, including ethical and unethical threat operators, to take part in its bug bounty program with compensation ranging from $1,000 to $1 million. Helping criminal operations is illegal in many countries; however, the bug bounty program is different from those used by legitimate companies. LockBit pays bounties for “great ideas” on how to improve the ransomware operation and for doxing the affiliate program manager along with offering bounties for vulnerabilities. The LockBit 3.0 operation includes numerous bug bounty categories:
- Web Site Bugs: XXS vulnerabilities, MySQL injections, and access to the site’s shell will be compensated according to the severity of the bug. The main goal is to obtain a decryptor through a bug’s website and gain access to the contact history with encrypted organizations.
- Locker Bugs: Any errors during encryption by lockers can result in corrupted files or decrypting files without a decryptor.
- Good Ideas: LockBit pays for the best ideas on how to improve its website and software. What’s intriguing about the competitors that they don’t have?
- Doxing: LockBit pays $1 million for doxing the affiliate program manager. People can send a TOX message, giving the group the manager’s name, whether they’re an FBI agent or a very skilled threat operator who knows how to find anyone and receive $1 million in bitcoin or Monero.
- TOX messenger: TOX messenger vulnerabilities make it possible to intercept correspondence, run malware, find out the interlocutor’s IP address, and other intriguing vulnerabilities.
- Tor Network: Any vulnerabilities that can obtain the server’s IP address hosting the site on the onion domain, obtain root access to LockBit’s servers, and database dump and onion domains.
The $1 million reward was offered on the XSS hacking forum in April for identifying the affiliate manager, LockBitSupp.
Visitors are greeted by an animated logo with numerous cryptocurrency icons moving around it when they open Tor sites for negotiation and data leak sites. The cryptocurrency icons displayed in the animation include Zcash, a privacy coin, along with Monero and Bitcoin, which the operation has previously accepted as a ransom payment. It’s not surprising that ransomware operation has added Zcash as a payment option. Even though Monero is also a privacy coin, most US crypto exchanges don’t host it. Bitcoin can be tracked because of the cryptocurrency tracking companies and law enforcement seizures. Currently, Coinbase, the most popular US crypto exchange, is offering the coin for sale which makes it easier for victims to pay ransoms. However, the United States government will probably put pressure to have it removed from US exchanges if ransomware operations start accepting payments in this coin.
With ransomware operators continuously adopting new tactics, technology, and payment methods, it’s critical for network professionals and companies to remain up to date with operations’ evolution and regularly update their data networks’ security infrastructure. At SpearTip, our advisory services allow our certified engineers to engage with companies’ people, processes, and technology to measure the maturity of the technical environment. Our extensive experience of responding to thousands of security incidents improves companies’ operational, procedural, and technical control gaps based on security standards. Furthermore, our ShadowSpear Platform evaluates the effectiveness of current technical control which allows our Security Operations Center to hunt and identify advanced ransomware.
If your company is experiencing a breach, call our Security Operations Centers at 833.997.7327 to speak directly with an engineer.