<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Threat Protection Coverage for LockBit 5.0 in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/threat-protection-coverage-for-lockbit-5-0/m-p/1242783#M125594</link>
    <description>&lt;P&gt;Hi All,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We like to have clarification regarding the current threat protection capabilities of Palo Alto Networks firewalls against &lt;STRONG&gt;LockBit 5.0 ransomware&lt;/STRONG&gt;, which has been reported as a newly emerging variant around &lt;STRONG&gt;September 2025&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;Upon reviewing the ThreatVault database, we found several existing threat signatures related to LockBit (e.g., &lt;EM&gt;Trojan/Win32.lockbit.dp&lt;/EM&gt;, &lt;EM&gt;LockBit Ransomware Powershell Script File Detection&lt;/EM&gt;, DNS-based signatures, etc.). However, these signatures appear to have been released &lt;STRONG&gt;prior to September 2025&lt;/STRONG&gt;, with the latest update we observed dated &lt;STRONG&gt;21 January 2025&lt;/STRONG&gt;. This indicates that they likely correspond to earlier variants of LockBit (e.g., v2.0 / v3.0 / v4.0).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;We would like to seek clarification on the following:&lt;/STRONG&gt;&lt;/P&gt;
&lt;OL data-end="1773" data-start="1056"&gt;
&lt;LI&gt;&lt;STRONG&gt;Has Palo Alto released any specific signatures or advanced threat protection updates that cover LockBit 5.0?&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;If not yet available, &lt;STRONG&gt;can existing protection mechanisms such as behavior-based detection (WildFire), Advanced Threat Prevention, or IPS/AV coverage effectively block LockBit 5.0-related activities?&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Is there an estimated timeline for when a signature or content update specific to LockBit 5.0 will be available in ThreatVault?&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;Are there &lt;STRONG&gt;recommended configuration best practices&lt;/STRONG&gt;&amp;nbsp;(e.g., security profile settings, file blocking policies, Zero Trust segmentation) to enhance protection against this new ransomware variant while awaiting an official signature?&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;thank you&lt;/P&gt;</description>
    <pubDate>Fri, 28 Nov 2025 09:44:33 GMT</pubDate>
    <dc:creator>Fariq_Zaidi</dc:creator>
    <dc:date>2025-11-28T09:44:33Z</dc:date>
    <item>
      <title>Threat Protection Coverage for LockBit 5.0</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/threat-protection-coverage-for-lockbit-5-0/m-p/1242783#M125594</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We like to have clarification regarding the current threat protection capabilities of Palo Alto Networks firewalls against &lt;STRONG&gt;LockBit 5.0 ransomware&lt;/STRONG&gt;, which has been reported as a newly emerging variant around &lt;STRONG&gt;September 2025&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;Upon reviewing the ThreatVault database, we found several existing threat signatures related to LockBit (e.g., &lt;EM&gt;Trojan/Win32.lockbit.dp&lt;/EM&gt;, &lt;EM&gt;LockBit Ransomware Powershell Script File Detection&lt;/EM&gt;, DNS-based signatures, etc.). However, these signatures appear to have been released &lt;STRONG&gt;prior to September 2025&lt;/STRONG&gt;, with the latest update we observed dated &lt;STRONG&gt;21 January 2025&lt;/STRONG&gt;. This indicates that they likely correspond to earlier variants of LockBit (e.g., v2.0 / v3.0 / v4.0).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;We would like to seek clarification on the following:&lt;/STRONG&gt;&lt;/P&gt;
&lt;OL data-end="1773" data-start="1056"&gt;
&lt;LI&gt;&lt;STRONG&gt;Has Palo Alto released any specific signatures or advanced threat protection updates that cover LockBit 5.0?&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;If not yet available, &lt;STRONG&gt;can existing protection mechanisms such as behavior-based detection (WildFire), Advanced Threat Prevention, or IPS/AV coverage effectively block LockBit 5.0-related activities?&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Is there an estimated timeline for when a signature or content update specific to LockBit 5.0 will be available in ThreatVault?&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;Are there &lt;STRONG&gt;recommended configuration best practices&lt;/STRONG&gt;&amp;nbsp;(e.g., security profile settings, file blocking policies, Zero Trust segmentation) to enhance protection against this new ransomware variant while awaiting an official signature?&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;thank you&lt;/P&gt;</description>
      <pubDate>Fri, 28 Nov 2025 09:44:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/threat-protection-coverage-for-lockbit-5-0/m-p/1242783#M125594</guid>
      <dc:creator>Fariq_Zaidi</dc:creator>
      <dc:date>2025-11-28T09:44:33Z</dc:date>
    </item>
    <item>
      <title>Re: Threat Protection Coverage for LockBit 5.0</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/threat-protection-coverage-for-lockbit-5-0/m-p/1243172#M125650</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/225107"&gt;@Fariq_Zaidi&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-path-to-node="6"&gt;Protection against known components of LockBit 5.0 is delivered via our regular content updates, which include specific Antivirus (AV) and Vulnerability Protection signatures.&lt;/P&gt;
&lt;P data-path-to-node="6"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-path-to-node="7"&gt;You can verify the latest coverage by checking the ThreatVault database for these and related signatures (released September 2025):&lt;/P&gt;
&lt;UL data-path-to-node="8"&gt;
&lt;LI&gt;
&lt;P data-path-to-node="8,0,0"&gt;&lt;A class="ng-star-inserted" href="https://threatvault.paloaltonetworks.com?query=745461977" target="_blank" rel="noopener"&gt;ThreatVault Query 1&lt;/A&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P data-path-to-node="8,1,0"&gt;&lt;A class="ng-star-inserted" href="https://threatvault.paloaltonetworks.com?query=745315692" target="_blank" rel="noopener"&gt;ThreatVault Query 2&lt;/A&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P data-path-to-node="8,2,0"&gt;&lt;A class="ng-star-inserted" href="https://threatvault.paloaltonetworks.com?query=745489543" target="_blank" rel="noopener"&gt;ThreatVault Query 3&lt;/A&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P data-path-to-node="8,3,0"&gt;&lt;A class="ng-star-inserted" href="https://threatvault.paloaltonetworks.com?query=744929268" target="_blank" rel="noopener"&gt;ThreatVault Query 4&lt;/A&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P data-path-to-node="8,4,0"&gt;&lt;A class="ng-star-inserted" href="https://threatvault.paloaltonetworks.com?query=744929457" target="_blank" rel="noopener"&gt;ThreatVault Query 5&lt;/A&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P data-path-to-node="10"&gt;Relying on signatures alone is insufficient for modern ransomware. LockBit 5.0 is designed for evasion (e.g., using a two-stage payload and API unhooking), which is why defense strategy should focused on behavioral and machine learning analysis:&lt;/P&gt;
&lt;P data-path-to-node="10"&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL data-path-to-node="11"&gt;
&lt;LI&gt;
&lt;P data-path-to-node="11,0,0"&gt;WildFire Real-Time ML and Sandboxing: This is your primary defense against zero-day and previously unknown ransomware samples. WildFire analyzes the payload in a virtual environment to detect malicious behaviors and instantly generates new protections, eliminating dwell time.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P data-path-to-node="11,1,0"&gt;Advanced Threat Prevention (ATP): This leverages inline machine learning models to detect malicious behaviors, exploit techniques (like process hollowing), and Command-and-Control (C2) patterns associated with ransomware activity, stopping the threat before it gets a signature.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P data-path-to-node="11,2,0"&gt;Anti-Spyware/Vulnerability Protection: These profiles stop common exploit techniques and lateral movement attempts (like abusing PowerShell) frequently leveraged by LockBit affiliates during the initial stages of an attack.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-path-to-node="13"&gt;Ransomware mitigation is less about a single setting and more about a unified security posture. We strongly recommend following our best practice guidelines:&lt;/P&gt;
&lt;UL data-path-to-node="14"&gt;
&lt;LI&gt;
&lt;P data-path-to-node="14,0,0"&gt;Enable Decryption: You cannot stop threats you cannot see. Enable SSL/TLS decryption for high-risk and medium-risk traffic to inspect the encrypted payload delivery and C2 communications.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P data-path-to-node="14,1,0"&gt;Aggressive Security Profiles: Ensure all Security Profiles are set aggressively (e.g., &lt;I&gt;Block&lt;/I&gt; actions) for:&lt;/P&gt;
&lt;UL data-path-to-node="14,1,1"&gt;
&lt;LI&gt;
&lt;P data-path-to-node="14,1,1,0,0"&gt;File Blocking: Block the download/upload of high-risk executable files (PE files) and multi-level encoded files.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P data-path-to-node="14,1,1,1,0"&gt;URL Filtering: Block all malicious URL categories (Malware, Phishing, Command-and-Control, Ransomware).&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P data-path-to-node="14,2,0"&gt;Policy Best Practices: Apply the full set of Security Profiles (Anti-Spyware, Vulnerability Protection, Antivirus, WildFire Analysis, URL Filtering) to all relevant Allow rules to ensure comprehensive scanning of allowed applications.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P data-path-to-node="15"&gt;For detailed steps on hardening your security profiles, please review the official documentation:&lt;/P&gt;
&lt;UL data-path-to-node="16"&gt;
&lt;LI&gt;
&lt;P data-path-to-node="16,0,0"&gt;&lt;A class="ng-star-inserted" href="https://docs.paloaltonetworks.com/best-practices/internet-gateway-best-practices/best-practice-internet-gateway-security-policy/create-best-practice-security-profiles" target="_blank" rel="noopener"&gt;Best Practice Internet Gateway Security Policy&lt;/A&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 04 Dec 2025 15:49:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/threat-protection-coverage-for-lockbit-5-0/m-p/1243172#M125650</guid>
      <dc:creator>kiwi</dc:creator>
      <dc:date>2025-12-04T15:49:03Z</dc:date>
    </item>
  </channel>
</rss>

