Categories: Cyber Security News

LockBit 5.0 Infrastructure Exposed in New Server, IP, and Domain Leak

LockBit 5.0 key infrastructure exposed, revealing the IP address 205.185.116.233, and the domain karma0.xyz is hosting the ransomware group’s latest leak site.

According to researcher Rakesh Krishnan, hosted under AS53667 (PONYNET, operated by FranTech Solutions), a network frequently abused for illicit activities, the server displays a DDoS protection page branded with “LOCKBITS.5.0,” confirming its role in the group’s operations.

This operational security lapse arrives amid LockBit’s resurgence with enhanced malware capabilities.​

Krishnan first publicized the findings on December 5, 2025, via X (formerly Twitter), noting the domain’s recent registration and direct ties to LockBit 5.0 activities.

https://twitter.com/RakeshKrish12/status/1997122573512200668?ref_src=twsrc%5Etfw

WHOIS records show karma0.xyz registered on April 12, 2025, with an expiration in April 2026, using Cloudflare nameservers (iris.ns.cloudflare.com and tom.ns.cloudflare.com) and Namecheap privacy protection listing Reykjavik, Iceland, as the contact location.

The domain status indicates client transfer prohibited, suggesting efforts to lock down control amid scrutiny.

Scans reveal multiple open ports on 205.185.116.233, including vulnerable remote access, exposing the server to potential disruption.

Sponsored
Port Protocol Component
21 TCP FTP Server
80 TCP Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.0.30 G7gGBXkXcAAcgxa.jpg​
3389 TCP RDP (WINDOWS-401V6QI)
5000 TCP HTTP
5985 TCP WinRM
47001 TCP HTTP
49666 TCP File Server

RDP on port 3389 stands out as a high-risk vector, potentially allowing unauthorized access to the Windows host.

LockBit 5.0, which emerged around September 2025, supports Windows, Linux, and ESXi, features randomized file extensions, geolocation-based evasion (skipping Russian systems), and accelerated encryption via XChaCha20.

This exposure highlights ongoing opsec failures for the group, disrupted multiple times, yet persistent. Defenders should block the IP and domain immediately; researchers can monitor for further leaks.​

Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

The post LockBit 5.0 Infrastructure Exposed in New Server, IP, and Domain Leak appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

The FlashForge Adventure 5M CoreXY 3D Printer Drops to Just $163 with Free Delivery

If you're interested in dipping your toes in the world of 3D printing, you can't…

45 minutes ago

Scream 7’s Cast Explains Why You Can’t Fake It | IGN Fan Fest 2026

Scream 7's Neve Campbell, Kevin Williamson, and Isabel May sat down with IGN for Fan…

45 minutes ago

Scrubs Cast Talk Recapturing the Magic for Season 10 | Fan Fest 2026

Scrubs is back. The show was canceled in 2010, and Zach Braff, Donald Faison and…

45 minutes ago

Documents: Juveniles, teen accused of killing man during crime spree in Abilene

ABILENE, Texas (KTAB/KRBC) - Two juveniles and a teen are accused of shooting and killing…

1 hour ago

Total lunar eclipse to create ‘blood moon’ in Tuesday morning sky

KTALnews.com (KTAL/KMSS) - A total lunar eclipse will create a "blood moon" early Tuesday morning,…

1 hour ago

HAVE YOU SEEN THEM? Two teens missing in Abilene

ABILENE, Texas (KTAB/KRBC) - Two teenagers have been reported missing in Abilene. One was last…

1 hour ago

This website uses cookies.