The Resurgence of LockBit Ransomware Group: New Developments and Victims
The LockBit ransomware group, once a dominant player in the cybercrime arena, is beginning to reestablish itself. Recently, the group launched a new data leak site and has reported seven new victims. Despite previous setbacks, LockBit remains a significant threat in the ransomware landscape, with a history of more than 2,700 claimed victims over the span of six years.
A Rocky Road to Recovery
LockBit’s reputation as one of the most feared ransomware groups came under fire after a series of international law enforcement operations. These actions, which started in early 2024, disrupted their operations drastically. While they initially struggled to regain momentum, the group’s resilience has become apparent in recent months.
The release of LockBit 4.0 in early 2025 failed to capture the attention they hoped for, lacking a full rollout. Meanwhile, rival groups like Qilin have attracted affiliates with enticing terms such as profit-sharing and advanced features. However, the announcement of LockBit 5.0 in September on the underground forum RAMP has given them a fresh start. This new variant appears to be aiding their recovery, as they have once again claimed new victims and relaunched their data leak platform, according to a report from Cyble.
LockBit Fully Reactivated
After an extended period of disruption, LockBit seems to have fully reactivated its ransomware operations. Although it has struggled to bounce back, it still boasts the highest activity level among ransomware groups in its six-year history. To date, the group has claimed 2,757 victims, more than double that of other notable groups, such as Qilin, Akira, and CL0P.
Despite the group’s storied history, LockBit has faced obstacles such as arrests, leaked source codes, and internal challenges that have hindered previous comeback attempts. Nonetheless, Cyble has recently confirmed LockBit’s reactivation, noting a launch of their new data leak site on November 5, which now displays 23 victims. Among these, seven cases are new, while the remainder had been previously reported.
The LockBit 5.0 variant, nicknamed “ChuongDong,” includes a total redesign of its user interface and ransomware functionalities. This new rendition introduces features aimed at faster encryption and improved evasion of security measures. It emphasizes obfuscation, targeting a diverse array of systems, including Linux, Windows, and VMware ESXi environments.
Targeted Sectors and Victims
Notable new victims include an Asian airline that offers regional passenger transport services and a major Caribbean real estate company. In a broader sense, LockBit’s strategies for 2025 reveal some interesting trends regarding the sectors they are targeting. In particular, they have successfully infiltrated the Banking, Financial Services, and Insurance (BFSI) sectors more than any other industry this year. Interestingly, this sector usually has robust cybersecurity measures in place, making LockBit’s success more remarkable.
LockBit’s focus on financial services sets it apart from many of its rivals, who typically target sectors like healthcare and manufacturing. Moreover, LockBit has demonstrated unusual success in South America, moving beyond the regions that many other ransomware groups have historically concentrated on, such as the United States and Europe.
The Road Ahead for LockBit
While LockBit’s recent activity signals a resurgence, the key question is whether this comeback is sustainable. Ransomware affiliates are generally driven by opportunity, often choosing to align with groups that promise profitability and success. To regain its stature, LockBit must effectively demonstrate to affiliates that it is worthy of their allegiance once more.
In an evolving cybersecurity landscape, LockBit’s capacity for adaptation and resilience will be critical in determining whether it can reclaim its position among the top-tier ransomware entities. As of now, the group is on a promising path, demonstrating capabilities that could redefine their role in ransomware operations.


