LockBit has remained one of the most dominant ransomware-as-a-service (RaaS) groups in the world since its emergence as ABCD ransomware in 2019 and official launch as LockBit in 2020. Despite high-profile setbacks—including international law enforcement takedowns in early 2024 and a damaging affiliate panel leak in May 2025—the group continues to update its codebase, expand affiliate operations, and launch large-scale attacks targeting organizations across industries.
Flashpoint has tracked LockBit through numerous evolutions, from the early .abcd encryptors to the faster and stealthier LockBit 3.0 and the Conti-inspired LockBit Green. Now, with version 5.0, the group has introduced a refined two-stage ransomware deployment model that aims to maximize evasion, modularity, and destructive impact.
This post outlines how LockBit 5.0 works, what’s changed, and why defenders should treat this latest evolution as a clear signal that even after takedowns and leaks, ransomware groups are investing innovating faster, not backing off.
Trend Micro first flagged the emergence of LockBit 5.0 in late September 2025. Flashpoint’s analysis confirms that the group is building on the existing v4.0 codebase rather than starting from scratch. Many core functions remain, including familiar file encryption methods, geographic execution limits, and even a recycled ransom note that still misspells “information”.

However, LockBit 5.0 introduces several new or upgraded capabilities:
These updates demonstrate that LockBit’s developers are focused on staying operational under pressure, iterating on technical defenses while retaining the group’s familiar tooling and affiliate model.
At the heart of LockBit 5.0 is its new two-stage execution model:
Key features of the loader at stage one include:
The loader then creates a suspended instance of defrag.exe and injects the decrypted payload using process hollowing. Flashpoint analysts confirmed that the stage two payload is written into memory using ZwWriteProcessMemory, the instruction pointer is updated, and the process resumes execution—all without triggering default security alerts.
Stage two is the main ransomware payload. Flashpoint observed this binary labeled “ChuongDoung Locker v1.01,” a likely nod to researcher Chuong Dong. It contains both familiar LockBit features and new destructive options.
The payload supports various command-line switches and can run with or without visible impact. In “destruction-only” mode, it encrypts files silently without changing extensions or displaying a ransom note, a tactic that may be used for retaliatory or purely disruptive campaigns.
Additional behaviors include:
Before executing, the payload checks the victim machine to ensure it is not in Russia or Russia-allied locations, and, curiously, avoids execution on systems located in the Philippines—a behavior Flashpoint continues to investigate.
LockBit 5.0 reflects a broader shift in ransomware development: professionalization under pressure. Despite sanctions, leaks, and arrests, the group continues to operate at scale.
The release of LockBit 5.0 also follows with other developments, including:
For defenders, this reinforces the importance of tracking ransomware groups not only by IOCs but also by their tooling, TTPs, and underground relationships.
As ransomware groups like LockBit evolve, defenders must adapt. Flashpoint’s Ransomware Survival Guide outlines how security teams can protect themselves across the entire attack lifecycle, from early reconnaissance to post-incident recovery.
Key recommendations:
LockBit 5.0 is the latest proof that ransomware isn’t going away, it’s adapting. The best way to stay ahead is by fusing primary source intelligence, behavioral analysis, and coordinated readiness.
For more, download our Ransomware Survival Guide or speak with a Flashpoint expert.
A: LockBit 5.0’s primary technical innovation is a modular two-stage deployment model. Stage One is a stealthy loader that performs evasion tactics like library unhooking and process hollowing, while Stage Two is the core, destructive ransomware payload.
A: One of LockBit 5.0’s most aggressive EDR evasion techniques involves library unhooking, where the loader reloads clean copies of core Windows libraries (NTDLL and Kernel32) from disk, overwriting any detection hooks placed in memory by security tools. This is often followed by injecting the payload using process hollowing.
A: Flashpoint tracked over 150 known victims attributed to LockBit in the three months following the major law enforcement takedown in February 2024. This data confirms the group’s ability to quickly recover its infrastructure and maintain an active, high-volume affiliate network.
A: The “destruction-only” mode allows the payload to encrypt files silently without displaying a ransom note or changing file extensions. Flashpoint analysts suggest this tactic may be used for retaliatory or purely disruptive campaigns where the goal is operational damage rather than financial extortion.