Skip to main content
Skip to main content
Microsoft Security Intelligence
Published Oct 06, 2020 | Updated Dec 09, 2022

Ransom:Win32/LockBit

Detected by Microsoft Defender Antivirus

Aliases: No associated aliases

Summary

The LockBit ransomware was first seen in September 2019. This ransomware encrypts the data on your disk and can stop you from using your device or accessing your data. It encrypts files, renders them inaccessible, and demands payment for the decryption key.

LockBit is typically deployed during human-operated ransomware campaigns. Attackers distribute this ransomware as an email attachment or try to exploit vulnerabilities in web browsers and other services exposed to the internet. Once in the network, attackers steal credentials, move laterally to other devices, and obtain privileged credentials before installing this ransomware on multiple target devices.

For information about LockBit and other human-operated ransomware campaigns, read these blog posts:

Human-operated ransomware attacks: A preventable disaster

Microsoft works with healthcare organizations to protect from popular ransomware during COVID-19 crisis: Here’s what to do

Ransomware groups continue to target healthcare, critical services; here’s how to reduce risk

There is no one-size-fits-all response if you have been targeted by ransomware. To recover files, you can restore backups. There is no guarantee that paying the ransom will give you access to your files.

Microsoft Defender Antivirus automatically removes threats as they are detected. However, many infections can leave remnant files and system changes. Updating your antimalware definitions and running a full scan might help address these remnant artifacts.

You can also visit our advanced troubleshooting page or search the Microsoft virus and malware community for more help.

Follow us