Agencies recommend action to protect against LockBit ransomware variant

The FBI, Cybersecurity and Infrastructure Security Agency, and Multi-State Information Sharing & Analysis Center today provided actionable intelligence and encouraged organizations to implement recommendations to protect their networks from LockBit 3.0 ransomware, which is more evasive than previous versions.
鈥淭he Lockbit 鈥榬ansomware as a service鈥 gang, which has targeted health care globally in crippling attacks, has continued to evolve their tactics to evade initial detection upon penetration of networks, even by advanced cybersecurity controls,鈥 said John Riggi, AHA鈥檚 national advisor for cybersecurity and risk. 鈥淭he initial attack vector remains the same though, including exploitation of remote desktop protocol and phishing emails. As further indication of state sponsorship or at least tolerance of these gangs, this ransomware will not 鈥榙etonate鈥 if it detects Russian language settings, among others, on the infected computer. Regardless of what cybersecurity framework your organization uses, we strongly concur with the recommendation to test your organization鈥檚 security program against the identified threat behaviors mapped to the MITRE ATT&CK framework in the advisory. This will help ensure that limited cybersecurity resources are efficiently applied in a threat-driven versus compliance-driven manner.鈥
For more information on this or other cyber and risk issues, contact Riggi at鈥jriggi@aha.org. For the latest cyber and risk resources and threat intelligence, visit鈥aha.org/cybersecurity.