Ransomware Research

LockBit Ransomware

LockBit is a malicious ransomware strain that encrypts victim files and demands ransom payment for decryption. First observed in the wild on December 1, 2019, this ransomware has been actively targeting systems worldwide. Security researchers also track this malware under the aliases: ABCD, LockBit 2.0, Lock2Bits, LuckyDay, LockBit 3.0.

Quick facts

Ransomware Family
LockBit
First Seen
December 1, 2019
Known Aliases
ABCDLockBit 2.0Lock2BitsLuckyDayLockBit 3.0

Supplemental analysis

LockBit is a high-profile ransomware family frequently associated with fast-moving extortion campaigns and pressure tactics against enterprise victims. This supplemental content is maintained by Elastio engineers to add marketing and buyer-facing context on top of the source intelligence imported from the ransomware research repository.

Why LockBit matters to recovery teams

LockBit-style incidents are not only encryption events. They create a recovery confidence problem: teams must know which recovery points are clean, which systems can be trusted, and how quickly business services can be restored without reintroducing compromised data.

For organizations that rely on backups, replicated data, or cloud snapshots, ransomware readiness depends on validating recovery data before it is needed. Supplemental guidance on this page highlights the operational questions teams should be able to answer before an incident.

How Elastio helps reduce LockBit recovery risk

Elastio scans recovery points and storage for ransomware indicators, suspicious file behavior, and malware evidence so teams can identify usable recovery data faster.

That visibility helps security and infrastructure teams move from hoping a backup is clean to proving which recovery points are safe candidates for restoration.

How LockBit ransomware works

File encryption patterns

LockBit modifies encrypted files using specific patterns to mark them as encrypted:

Extensions added after encryption
.abcd.lockbit.lock2bits.luckyday./\.\w{9}$/

Ransom note and payment demands

After encrypting files, LockBit displays ransom notes demanding payment for file recovery:

fileRestore-My-Files.txt
notes/Restore-My-Files.txt
Location: EveryFolder
filehVGakg14U.README.txt
notes/hVGakg14U.README.txt
Location: EveryFolder
fileBBNvvvgMC.README.txt
notes/BBNvvvgMC.README.txt
Location: EveryFolder
fileLockBit_Ransomware.hta
notes/LockBit_Ransomware.hta
Location: Desktop
screenshot
notes/BBNvvvgMC.png
Location: Desktop
screenshot
notes/7C12.tmp.png
Location: Desktop
fileFile Recovery.txt
notes/File Recovery.txt

Technical indicators

Associated executable files

The following executable files are associated with LockBit ransomware:

Frequently asked questions

Can Elastio help find LockBit indicators in backup data?

Yes. Elastio's Hunt Engine inspects recovery data and backup contents for ransomware and malware evidence, helping teams identify affected recovery points before restore decisions are made.

Does this augmentation replace the imported ransomware intelligence?

No. The imported GitHub repository remains the source of truth for the ransomware entry. This file only adds supplemental marketing and recovery-readiness context when a matching imported entry exists.

About this analysis

This LockBit ransomware analysis is part of Elastio's comprehensive ransomware detection database. Elastio provides advanced ransomware protection and recovery, helping organizations defend against and recover from ransomware attacks like LockBit.

Last updated: December 30, 2025

Detection coverage

Elastio detects LockBit inside your data and backups.

The Hunt Engine uses Deep File Inspection to identify LockBit across live data, replicated data, and backups. If this family is in your environment, Elastio finds it before encryption completes. Run a scan against your recovery points to confirm.

See How the Hunt Engine WorksRequest a Demo

Recent ransomware

Explore other threats in our database

Wxlongda2025VeilCrypt2025TitanLabooboo2025SolidBit2022SnapHackLocker2024PySystemUpdate2025PySimCrypt2025Monkey2025Lol2025HWID2025
View all ransomware →