NotLockBit, a new ransomware family, has recently surfaced in the cybersecurity realm, posing a significant threat to users of both macOS and Windows operating systems. This ransomware strain has garnered attention for closely mirroring the behavior and tactics of the notorious LockBit ransomware.
NotLockBit stands out for its innovative cross-platform capabilities, offering advanced features that make it a formidable adversary in the realm of cyber threats. Distributed as an x86_64 binary written in the Go programming language, NotLockBit exhibits a sophisticated design with a range of capabilities that set it apart from other ransomware strains.
One key aspect of NotLockBit’s capabilities is its targeted file encryption functionality, which focuses on encrypting valuable or sensitive data using robust encryption protocols like AES and RSA. Additionally, the ransomware is equipped with data exfiltration capabilities, allowing it to transfer stolen files to attacker-controlled repositories, often leveraging cloud storage services like Amazon S3 for potential double-extortion tactics. Furthermore, NotLockBit includes self-deletion mechanisms that remove traces of its presence, including shadow copies, to make recovery nearly impossible.
Detailed research from Qualys has shed light on the advanced capabilities of NotLockBit, highlighting its sophisticated design and functionality. Technical insights into the ransomware’s operations reveal a multi-step encryption process that involves decoding an RSA public key, generating a master encryption key, and encrypting user files while avoiding critical system directories. NotLockBit targets a wide range of file types, emphasizing its intent to extract maximum value from compromised systems.
Moreover, NotLockBit employs obfuscation techniques to evade detection, with some variants omitting data exfiltration capabilities to tailor attack strategies. Security professionals are advised to utilize advanced detection solutions like Qualys EDR & EPP to detect and quarantine NotLockBit. Organizations should also implement proactive cybersecurity measures, including regular backups, endpoint protection, network security, and user awareness training to mitigate the impact of ransomware attacks.
The emergence of NotLockBit, with its dual compatibility with macOS and Windows systems and its resemblance to established ransomware families, underscores the evolving threat landscape in cybersecurity. Security researchers and organizations must closely monitor this ransomware variant and bolster their defenses to counter its potential repercussions.
As the ransomware landscape continues to evolve, staying vigilant and prepared remains crucial for combating emerging cyber threats. By implementing robust cybersecurity measures and staying informed about the latest ransomware trends, organizations can enhance their resilience against advanced threats like NotLockBit.

