LockBit Encrypts Windows Domains Using Group Policies

July 29, 2021

In samples of the LockBit 2.0 ransomware, which was discovered by MalwareHunterTeam, a new version of LockBit 2.0 was found, which automates the encryption of a Windows domain using Active Directory group policies.

After they have broken through a network and gained control of the domain controller, threat actors use third-party software to deploy scripts that disable antivirus and execute the ransomware on the computer in the network.

In samples of the LockBit 2.0 ransomware discovered, threat actors automate the process to ensure that the ransomware distributes itself in a domain when run on a domain controller.

This creates new group policies for the domain controller, which are then transferred to every device in the network.

These policies can then disable Microsoft Defender’s real-time protection, trigger alerts, submit samples to Microsoft, and take default actions to detect malicious files.

For more information, read the original story in BleepingComputer.

Top Stories

Related Articles

June 24, 2025 A new report from Okta shows that despite growing fears about identity theft, most more...

June 23, 2025 Canada’s cybersecurity agency and the U.S. Federal Bureau of Investigation have confirmed that a more...

June 12, 2025 A new vulnerability discovered in Microsoft Copilot has raised urgent concerns about the security more...

May 6, 2025 A coordinated supply chain attack has compromised between 500 and 1,000 e-commerce websites by more...

Jim Love

Jim is and author and podcast host with over 40 years in technology.

Share:
Facebook
Twitter
LinkedIn