Authors:
Oladipupo Akinyemi, Rejwan Sulaiman, Nasr Abosata
Addresses:
Faculty of Engineering and Environment, Northumbria University, Middlesex Street, London, United Kingdom.
The most dangerous ransomware variation in recent years is LockBit 3.0, which demands $8 million without regard for the ransom from a victim. According to Trend, ransomware has evolved through micro simulations of healthcare, education, and technology to become adaptable and evasive, infiltrating the Advanced Computer Software group and threatening governments and organisations across oil and gas, manufacturing, transportation, and other sectors. Threat actors have historically targeted lock industries and have proven they are in for the long haul. Kaspersky also claims that ransomware attacks, prevention, encryption detection, decryption, and the rise in remote working could hinder data recovery, making it pointless to rule out this type of attack in less tech-savvy industries, where the attack mode is rarely examined. This paper examines LockBit and its objectives. 3.0 assault methods with context illustrations. Lock-on Advanced Computer Software group, including the NHS, has changed over time. An evolutionary variant that developed from a key client of the business, and the disabling of its services for hours alongside 15 other clients during the attack, illustrate the terrible disruption such events can wreak on critical organisations. Researchers noticed that LockBit upgrades by releasing fresh versions are a bid to keep the malware highly efficient by staying ahead of improving safeguards.
Keywords: Computer Software; Encryption Detection; LockBit Threat; Cyber Insurance; Attack Techniques; Detection Systems; Evolutionary Variant; Remote Work Vulnerabilities.
Received on: 06/11/2024, Revised on: 14/01/2025, Accepted on: 14/02/2025, Published on: 05/09/2025
DOI: 10.69888/FTSIN.2025.000535
FMDB Transactions on Sustainable Intelligent Networks, 2025 Vol. 2 No. 3, Pages: 129-136