Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Generic User Avatar

LockBit (ACBD, LockBit 2.0 - .lockbit, .lock2bits, .luckyday) Support Topic


  • Please log in to reply
132 replies to this topic

#1 kevin198520

kevin198520

  •  Avatar image
  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:03:27 PM

Posted 19 October 2019 - 10:24 AM

Sep 2019: ACBD, .phobos (PhobosImposter) predecessor to LockBit
Jan 2020: LockBit-named ransomware first seen on Russian-language based cybercrime forums.
Jun 2021: LockBit 2.0 (LockBit Red)
Oct 2021: LockBit Linux-ESXi Locker V1.0 expanding capabilities to target Linux and VMware ESXi

 

Any files that are encrypted with LockBit (ACBD, LockBit 2.0) ransomware will have an .abcd, .lockbit, .lock2bits or .luckyday extension appended to the end of the encrypted data filename and typically will leave files (ransom notes) named Restore-My-Files.txt, Recovery.txt as explained here by Amigo-A (Andrew Ivanov).
 
Note: PhobosImposter Ransomware is a variant of LockBit (ACBD) which appends .phobos extension and leaves files (ransom notes) named Restore-My-Files.txt.
 
Note: In May 2024, law enforcement was able to obtain numerous LockBit decryption keys, stolen victim data and cryptocurrency addresses as part of Operation Cronos which allowed seizure of LockBit infrastructure.
 
Victims of LockBit 3.0 (Black) should use the below support topic link.

 
 
 
hi. help return the files. Is there a free decryption for this ransomware?



BC AdBot (Login to Remove)

 


#2 kevin198520

kevin198520
  • Topic Starter

  •  Avatar image
  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:03:27 PM

Posted 19 October 2019 - 10:26 AM

file https://www.sendspace.com/file/yfzg0q



#3 Amigo-A

Amigo-A

    Security specialist and Ransomware expert. Volunteer Helper


  •  Avatar image
  • Members
  • 3,203 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Bering Strait
  • Local time:09:27 AM

Posted 19 October 2019 - 01:34 PM

Hello

 

You will need attach to message HERE 2-3 encrypted files (different formats - doc, png, jpg) and the original note file.
You can use external file hosting services and give ME a link to download encrypted files and other files.
 

Edited by Amigo-A, 19 October 2019 - 01:35 PM.

My site: The Digest "Crypto-Ransomware"  + Google Translate 

 


#4 quietman7

quietman7

    Bleepin' Gumshoe


  •  Avatar image
  • Global Moderator
  • 65,330 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:11:27 PM

Posted 19 October 2019 - 05:28 PM

Is .acbd the complete extension appended to the end of your encrypted data file names? 

 

Did you find any ransom notes and if so, what is the actual name of the ransom note?
Can you provide (copy & paste) the ransom note contents?
Did the cyber-criminals provide an email address to send payment to? If so, what is the email address?
 

Did you submit (upload) samples of encrypted files, ransom notes and any contact email addresses or hyperlinks provided by the cyber-criminals to ID Ransomware (IDR) or Emsisoft Website for assistance with identification and confirmation of the infection? ID Ransomware can identify ransomwares which adds a prefix instead of an extension and more accurately identifies ransomwares by filemarkers if applicable so try that first. Uploading both encrypted files and ransom notes together along with any contact email addresses or hyperlinks provided by the criminals gives a more positive match with identification and helps to avoid false detections.

Please provide a link to the ID Ransomware results.


.
.
Microsoft MVP Alumni 2023Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023

Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITEUnified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif


#5 kevin198520

kevin198520
  • Topic Starter

  •  Avatar image
  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:03:27 PM

Posted 20 October 2019 - 04:45 AM

here are all the files that were requested along with the note

https://www.sendspace.com/file/xfo1gj



#6 Amigo-A

Amigo-A

    Security specialist and Ransomware expert. Volunteer Helper


  •  Avatar image
  • Members
  • 3,203 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Bering Strait
  • Local time:09:27 AM

Posted 20 October 2019 - 11:37 AM

It looks new Ransomware and but it is very similar to Jamper Ransomware.
We need more information.
 
I wrote you what needs to be done immediately.
Do not run cleaning programs or antivirus tools. This can be done later when the files for analysis are collected.

Edited by Amigo-A, 20 October 2019 - 11:44 AM.

My site: The Digest "Crypto-Ransomware"  + Google Translate 

 


#7 quietman7

quietman7

    Bleepin' Gumshoe


  •  Avatar image
  • Global Moderator
  • 65,330 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:11:27 PM

Posted 20 October 2019 - 11:44 AM

kevin198520...Please do as Amigo-A (Andrew Ivanov) has instructed....he is a trusted security professional and ransomware expert who volunteers his time here to assist victims of ransomware infection


.
.
Microsoft MVP Alumni 2023Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023

Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITEUnified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif


#8 filman

filman

  •  Avatar image
  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:06:27 AM

Posted 21 October 2019 - 12:32 PM

My company was struck by these ransomware. They encrypted the entire network - 17 computers. We didn’t find a free decryptor and we had to pay money to ransomware



#9 quietman7

quietman7

    Bleepin' Gumshoe


  •  Avatar image
  • Global Moderator
  • 65,330 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:11:27 PM

Posted 21 October 2019 - 05:51 PM

Did the decrypter the criminals sent you decrypt your files?


.
.
Microsoft MVP Alumni 2023Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023

Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITEUnified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif


#10 filman

filman

  •  Avatar image
  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:06:27 AM

Posted 22 October 2019 - 01:58 AM

Yes, we got 17 programs. 1 program for 1 computer



#11 quietman7

quietman7

    Bleepin' Gumshoe


  •  Avatar image
  • Global Moderator
  • 65,330 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:11:27 PM

Posted 22 October 2019 - 05:09 AM

Since you have a working decrypter, you can zip and submit it here with a link to this topic along with a few encrypted files, the private key and anything else the malware writers provided. Our crypto malware experts may be able to get some information to exploit by analyzing it further. While the decryption tool is not as good as analyzing the ransomware itself, it may still provide our experts some information about the encryption format used by the malware developers.


.
.
Microsoft MVP Alumni 2023Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023

Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITEUnified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif


#12 kevin198520

kevin198520
  • Topic Starter

  •  Avatar image
  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:03:27 PM

Posted 22 October 2019 - 06:19 AM

Yes, we got 17 programs. 1 program for 1 computer

all the files have been decrypted ? after what time did you get program a decryption ?



#13 filman

filman

  •  Avatar image
  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:06:27 AM

Posted 22 October 2019 - 07:57 AM

Since you have a working decrypter, you can zip and submit it here with a link to this topic along with a few encrypted files, the private key and anything else the malware writers provided. Our crypto malware experts may be able to get some information to exploit by analyzing it further. While the decryption tool is not as good as analyzing the ransomware itself, it may still provide our experts some information about the encryption format used by the malware developers.

I submit decrypter



#14 filman

filman

  •  Avatar image
  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:06:27 AM

Posted 22 October 2019 - 07:59 AM

 

Yes, we got 17 programs. 1 program for 1 computer

all the files have been decrypted ? after what time did you get program a decryption ?

 

Yes. 2 hours after payment



#15 kevin198520

kevin198520
  • Topic Starter

  •  Avatar image
  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:03:27 PM

Posted 23 October 2019 - 12:41 PM

Bought a decrypt from this ransomware. The files are all recovered.
if necessary i can upload the program they sent me for the study






1 user(s) are reading this topic

0 members, 1 guests, 0 anonymous users