Fencher Technologies

LockBit 5.0: Researchers Reveal Latest Affiliate Panel and New Encryption Variants

Despite major law enforcement disruptions including Operation Cronos in 2024, the LockBit ransomware-as-a-service (RaaS) operation continues to show impressive resilience. Recently leaked screenshots and footage from the LockBit 5.0 affiliate panel demonstrate that the group has preserved most of its core infrastructure while introducing subtle updates and expanding its attack capabilities.

Threat intelligence firm Flare has thoroughly analyzed these leaks, providing rare insight into how LockBit recruits affiliates, manages operations, and handles ransom negotiations. The findings show a group that remains active, adaptive, and focused on growth.

The leaked affiliate dashboard retains its familiar layout, now featuring festive holiday decorations as a cosmetic touch. Core functionality remains largely unchanged, allowing affiliates to track payments, access victim negotiation tools, review partner rules, and onboard new members. Despite reputational damage from previous leaks and takedowns, LockBit’s affiliate program is still actively recruiting new partners. As Flare researchers observed: LockBit’s affiliate program continues recruiting new partners despite the group’s damaged reputation.

On January 14, 2026, researchers identified four new ransomware variants: LB_Black for Windows systems, LB_Linux for Linux environments, LB_ESXi targeting VMware ESXi hypervisors, and LB_ChuongDong as an additional internal variant. These additions enable LockBit to strike across a broader range of enterprise systems, including virtualized and cloud-based infrastructures, making it a greater threat to organizations with hybrid environments.

The group’s core ransomware engine and operational model show little change from earlier versions, and LockBit has adapted quickly, continuing operations almost as if law enforcement actions never occurred.

The leaked materials offer valuable indicators of compromise (IOCs) and behavioral patterns that security teams can use to improve detection and response. Organizations should prioritize enhanced monitoring for cross-platform ransomware indicators, hardening of ESXi hosts and virtualized environments, updating endpoint detection rules for the new variants, and maintaining air-gapped backups with tested incident response playbooks.

LockBit’s rapid rebound serves as a stark reminder that ransomware groups remain highly adaptable and that proactive defense is more critical than ever.

For the full technical breakdown and original screenshots, see Flare’s in-depth report: Inside LockBit 5.0: Analyzing the Ransomware Group’s Latest Affiliate Panel and Encryption Variants.

Stay ahead of the threat. Ransomware evolves fast; early visibility and strong defenses remain your best protection.