Thursday, April 16, 2026

LockBit 5.0 Infrastructure Exposed In Major Leak Of Servers, IPs, and Domains

LockBit 5.0, the ransomware group’s latest variant, has suffered a paramount operational security (opsec) breach.

Researchers exposed key infrastructure, including the IP address 205.185.116.233 and the domain karma0.xyz.

This server hosts LockBit’s newest leak site, where victims’ data appears after failed ransom payments.

Security researcher Rakesh Krishnan revealed the details on December 5, 2025, via X (formerly Twitter).

The server runs under AS53667 (PONYNET), operated by FranTech Solutions a network often linked to cybercrime.

A DDoS protection page on the server displays the branding “LOCKBITS.5.0,” confirming its ties to the group’s operations.

This leak comes as LockBit rebounds with stronger malware, targeting more systems despite past takedowns.

WHOIS records for karma0.xyz shows registration on April 12, 2025, with expiration in April 2026.

It uses Cloudflare nameservers (iris.ns.cloudflare.com and tom.ns.cloudflare.com) and Namecheap privacy protection.

LockBit 5.0 Infrastructure Exposed

The contact lists Reykjavik, Iceland. The domain’s “client transfer prohibited” status suggests efforts to secure control amid growing scrutiny.

Exposed Server Vulnerabilities

Scans of 205.185.116.233 reveal multiple open ports, creating easy entry points for attackers or defenders aiming to disrupt.

RDP on port 3389 poses the most significant risk, allowing remote access to the Windows host. Here’s a breakdown:

PortProtocolComponent
21TCPFTP Server
80TCPApache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.0.30
3389TCPRDP (WINDOWS-401V6QI)
5000TCPHTTP
5985TCPWinRM
47001TCPHTTP
49666TCPFile Server

These flaws could let rivals or law enforcement infiltrate the infrastructure.

LockBit 5.0 Features and Defender Actions

LockBit 5.0 launched around September 2025. It hits Windows, Linux, and ESXi systems.

Key upgrades include randomized file extensions to evade detection, geolocation evasion (skipping Russian targets), and fast encryption using the XChaCha20 algorithm.

The group has faced repeated disruptions such as server seizures but has rebuilt quickly.

This leak underscores LockBit’s ongoing opsec issues. Cybersecurity teams should block IP 205.185.116.233 and karma0.xyz now.

Add them to firewalls and threat intel feeds. Researchers: monitor for more leaks and share IoCs. Stay vigilant ransomware like this evolves fast.

Varshini
Varshini
Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies..

Recent News

Recent News