Lilith Ransomware: In-Depth Analysis, Detection, and Mitigation

What is Lilith Ransomware?

Lilith (aka LilithCrypt) ransomware is a low-sophistication ransomware family that emerged in July of 2022. Lilith engages in multi-pronged extortion, meaning should their victims fail to comply with the attacker’s demands, they are listed on the Lilith victim blog alongside their stolen data. There are both Windows and Linux variants of Lilith ransomware.

Lilith Ransomware - Featured Image | SentinelOne

What Does Lilith Ransomware Target?

Lilith ransomware is known to target small to medium sized businesses (SMBs). They have also been known to focus on those in the construction and manufacturing industries.

How Does Lilith Ransomware Work?

Lilith ransomware targets its victims through trojanized downloads as well as phishing emails.

Lilith Ransomware Technical Details

Random keys are generated via the CryptGenRandom function. Based on current observations, Lilith victims are given three days to comply with the attackers’ demands. Lilith operators appear to only communicate with the victims via TOX chat.

Once executed, Lilith payloads will attempt to discover problematic processes that may inhibit the encryption process and terminate them. Lilith payloads have the ability to achieve persistence by installing a persistent system service.

How to Detect Lilith Ransomware

The SentinelOne Singularity XDR Platform detects and prevents malicious behaviors and artifacts associated with Lilith ransomware.

If you do not have SentinelOne deployed, here are a few ways you can identify LilithLilth ransomware in your network:

Security Tools

Use anti-malware software or other security tools capable of detecting and blocking known ransomware variants. These tools may use signatures, heuristics, or machine learning algorithms, to identify and block suspicious files or activities.

Network Traffic

Monitor network traffic and look for indicators of compromise, such as unusual network traffic patterns or communication with known command-and-control servers.

Security Audits

Conduct regular security audits and assessments to identify network and system vulnerabilities and ensure that all security controls are in place and functioning properly.

Education & Training

Educate and train employees on cybersecurity best practices, including identifying and reporting suspicious emails or other threats.

Backup & Recovery Plan

Implement a robust backup and recovery plan to ensure that the organization has a copy of its data and can restore it in case of an attack.

How to Mitigate Lilith Ransomware

SentinelOne Singularity XDR Platform prevents Lilith ransomware infections. In case of an infection, the SentinelOne Singularity XDR Platform detects and prevents malicious behaviors and artifacts associated with Lilith ransomware.

SentinelOne customers are protected from Liith ransomware without any need to update or take action. In cases where the policy was set to Detect Only and a device became infected, remove the infection by using SentinelOne’s unique rollback capability. As the accompanying video shows,  the rollback will revert any malicious impact on the device and restore encrypted files to their original state.

In case you do not have SentinelOne deployed, there are several steps that organizations can take to mitigate the risk of Lilith ransomware attacks:

Educate employees

Employees should be educated on the risks of ransomware, and how to identify and avoid phishing emails, malicious attachments, and other threats. They should be encouraged to report suspicious emails or attachments, and to avoid opening them, or clicking on links or buttons in them.

Implement strong passwords

Organizations should implement strong, unique passwords for all user accounts, and should regularly update and rotate these passwords. Passwords should be at least 8 characters long and should include a combination of uppercase and lowercase letters, numbers, and special characters.

Enable multi-factor authentication

Organizations should enable multi-factor authentication (MFA) for all user accounts, to provide an additional layer of security. This can be done through the use of mobile apps, such as Google Authenticator or Microsoft Authenticator, or the use of physical tokens or smart cards.

Update and patch systems

Organizations should regularly update and patch their systems, to fix any known vulnerabilities, and to prevent attackers from exploiting them. This includes updating the operating system, applications, and firmware on all devices, as well as disabling any unnecessary or unused services or protocols.

Implement backup and disaster recovery

Organizations should implement regular backup and disaster recovery (BDR) processes, to ensure that they can recover from ransomware attacks or other disasters. This includes creating regular backups of all data and systems and storing these backups in a secure, offsite location. The backups should be tested regularly to ensure that they are working and that they can be restored quickly and easily.

Purpose Built to Prevent Tomorrow’s Threats. Today.
Your most sensitive data lives on the endpoint and in the cloud. Protect what matters most from cyberattacks. Fortify every edge of the network with realtime autonomous protection.

Lilith Ransomware FAQs

Lilith Ransomware came out around July of 2022. It’s a multi-pronged extortion tactic which means that if the victims fail to comply with the attacker’s demands, they will be listed on the Lilith victim blog along with their stolen data. Lilith Ransomware is available in Windows and Linux variants.

Lilith will attack its victims via trojanized downloads and phishing emails. How it works is, it basically generates random keys via the CryptGenRandom function. Lilith will communicate with victims via TOX chat. It will execute payloads and attempt to discover problematic processes that may inhibit its encryption and dominate them. Lilith payloads are very persistent and can install persistent system services.

How does Lilith Ransomware spread?

Lilith Ransomware usually comes in through fake email attachments, contaminated links, or pirated installs. When opened, it spreads between computers or networks at a fast rate by exploiting unknown security vulnerabilities.

Which operating systems are targeted by Lilith Ransomware?

Lilith Ransomware is mostly targeting Windows computers, and that is not surprising because most individuals are using that system. There are some mentions that it might also snoop around in some Linux configurations,

What happens when Lilith Ransomware infects a system?

Once your computer is infected by Lilith Ransomware, it automatically encrypts your files so that you cannot use them. There will usually be a message requesting you to pay money so that you can access your files. Paying them money does not necessarily mean that you can retrieve them because the scammers may simply vanish into thin air. The virus can also spread, lock your crucial files, and slow down your PC. It’s a heartless scam that takes over your computer.

What types of files does Lilith Ransomware encrypt?

Lilith Ransomware doesn’t care if your files are images, documents, or company reports—it locks them all. It usually encrypts typical file formats like Word documents, PDF documents, spreadsheets, and even photographs or videos. Once it enters your computer, it looks for whatever you or your company deems important. By encrypting many files, Lilith forces victims to pay if they want to access their property.

What encryption algorithms does Lilith Ransomware use?

Lilith Ransomware uses a combination of powerful ciphers such as AES to encrypt files and RSA to protect the encryption keys. This two-layered encryption makes it hard for individuals to decrypt their files easily without paying the ransom. Even the technologically savvy may not be in a position to decrypt these codes. If your files are encrypted by Lilith, it is best to consult security professionals rather than looking for a quick solution.

What security best practices help prevent Lilith Ransomware infections?

Monitor your network traffic continuously and look for indicators of compromises, like unusual network traffic patterns or communications with non-command and control servers. You should also do regular security audits and assessments to identify network and system vulnerabilities. Train your employees on the best cybersecurity practices and identify and report suspicious emails and other threats. Set up a robust backup and recovery plan and make sure that your organization retains its copy of data and can restore it if an attack ever does happen.