0 0
Read Time:2 Minute, 42 Second

Conditions for partners and contacts

Return back

[Ransomware] LockBit 2.0 is an affiliate program. Affiliate program LockBit 2.0 temporarily relaunch the intake of partners. The program has been underway since September 2019, it is designed in origin C and ASM languages without any dependencies. Encryption is implemented in parts via the completion port (I/O), encryption algorithm AES + ECC. During two years none has managed to decrypt it. Unparalleled benefits are encryption speed and self-spread function. The only thing you have to do is to get access to the core server, while LockBit 2.0 will do all the rest. The launch is realized on all devices of the domain network in case of administrator rights on the domain controller.

Brief feature set:

  • administrator panel in Tor system;communication with the company via Tor, chat room with PUSH notifications;
    automatic test decryption;
    automatic decryptor detection;
    port scanner in local subnetworks, can detect all DFS, SMB, WebDav shares;
    automatic distribution in the domain network at run-time without the necessity of scripts;
    termination of interfering services and processes;
    blocking of process launching that can destroy the encryption process;
    setting of file rights and removal of blocking attributes;
    removal of shadow copies;
    creation of hidden partitions, drag and drop files and folders;
    clearing of logs and self-clearing;
    windowed or hidden operating mode;
    launch of computers switched off via Wake-on-Lan;
    print-out of requirements on network printers;
    available for all versions of Windows OS;

LockBit 2.0 is the fastest encryption software all over the world. In order to make it clear, we made a comparative table with several similar programs indicating the encryption speed at same conditions, making no secret of their names.

If you have any doubts concerning this table, you can easily check the provided information downloading the samples, which have been used for testing.

Follow the link RansomwareSamples.7z Along with the encrypting system, you get access to the fastest stealer all over the world – StealBit automatically downloading all files of the attacked company to our updated blog.

Only you decide during communication how much the encrypted company will pay you. You get the payment to your personal ewallets in any currency, after which you transfer us the percentage of the foreclosure amount. LockBit 2.0 does not function in post-Soviet countries. We cooperate only with experienced pentesters who are real professionals in such tools as Metasploit Framework and Cobalt Strike. Cooperation terms and conditions are determined for each Customer individually. With our help you can easily get more targets over the weekend than with any other affiliate program over the week.

Contact Us Tox https://tox.chat/download.html

Tox ID Support

3085B89A0C515D2FB124D645906F5D3DA5CB97CEBEA975959AE4F95302A04E1D709C3C4AE9B7 XMPP (Jabber) Support

598954663666452@exploit.im

365473292355268@thesecure.biz

Conditions for partners and contacts files are encrypted by Lock Bit Encrypted files are published


30 Nov, 2021 17:35:00

abiom.nl Abiom is de toonaangevende en innovatieve speler in de Benelux met betrekking tot de ontwikkeling, levering, productie en service van hoogwaardige missie en business kritische communicatie oplossingen en voertuig signalerings systemen ten behoeve van professionele werkomgevingen All available data published !

File listing return back name date size 0/39100 *Select the file you want to download

About Post Author

Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence
Happy
Happy
0 %
Sad
Sad
0 %
Excited
Excited
0 %
Sleepy
Sleepy
0 %
Angry
Angry
0 %
Surprise
Surprise
0 %

By Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence