
Critical Path Security – Threat Intelligence Report
Date: May 2025
Prepared by: Critical Path Security Research Team
Executive Summary
In a rare and highly consequential breach of operational secrecy, internal chat logs from the LockBit3 ransomware group have been leaked to the public. This unique intelligence provides cybersecurity professionals and defenders with an unparalleled opportunity to examine the internal communications of one of the most prolific ransomware syndicates in recent history.
The Critical Path Security research team analysed more than 4,400 messages exchanged between LockBit affiliates and their victims. This report outlines significant trends in threat actor behaviour, negotiation tactics, and operational cadence, based on detailed analysis of the chat data.
Key Findings
Volume of Communications
A total of 4,423 messages were reviewed, capturing the full breadth of negotiation stages—from initial victim outreach to ransom payment instructions.
Average Ransom Demand
Across the dataset, ransom demands averaged approximately $32,223 CAD, with most communications insisting on Bitcoin as the exclusive method of payment.
Threat Actor and Victim Statistics
-
208 distinct clients (victims) engaged in chat-based negotiations
-
35 unique threat actors, with five accounting for the majority of message volume
File Transfers
188 messages involved file attachments, often used to:
-
Demonstrate access to exfiltrated data
-
Provide decryption samples
-
Clarify technical instructions
Operational Timeframes
Chat activity peaked between 11:00 a.m. and 2:00 p.m. UTC, suggesting structured shifts or synchronisation with the victim’s business hours.
Behavioural Analysis
Communication Tone and Method
LockBit3 actors conducted negotiations with a businesslike tone, often beginning with:
-
Offers for test decryption
-
Demands for Bitcoin-based payment
-
Strict file format requirements for proof-of-concept decryption
These interactions were transactional and typically avoided unnecessary intimidation or theatrics.
Dominant Threat Actor IDs
-
Actor ID 25: Engaged in 1,073 messages, leading numerous negotiations
-
Other active IDs included 65, 43, 70, and 12—each involved in over 130 messages
The disproportionate volume from a handful of actors suggests either increased skill, higher trust within the syndicate, or broader responsibilities.
Recurring Language Patterns
Phrases such as:
-
“Send correct file”
-
“We accept Bitcoin only”
-
“Upload test files”
...were repeated across multiple conversations, indicating common scripts or standard operating procedures that can inform automated detection systems.
Security Implications
The LockBit3 chat logs offer powerful insight into attacker decision-making, giving defenders and incident responders the opportunity to revise playbooks and enhance threat anticipation. These logs also support:
-
Behavioural Profiling and Simulation
Organizations can develop simulations and tabletop exercises that mimic real-world ransomware engagements using authentic communication tactics. -
Enhanced Detection Logic
Recurrent phrases, time-based behaviours, and file exchange patterns can be used to augment behavioural analytics in SIEMs and EDR platforms. -
Law Enforcement Support
Actor IDs, timestamp patterns, and IP metadata embedded in these logs serve as potential leads for attribution and broader takedown efforts.
Conclusion
Technical resilience is necessary, but intelligence-led defence is the future. The LockBit3 leak provides a critical boost to that future, offering defenders the insight required to dismantle the mystique surrounding ransomware operations.
At Critical Path Security, we believe that understanding your adversary is just as important as securing your perimeter. We continue to ingest, analyse, and operationalize threat intelligence across the dark web and criminal infrastructures to help our clients remain ahead of sophisticated threats.
About Critical Path Security
Critical Path Security is a leading cybersecurity provider specializing in threat intelligence, incident response, and continuous protection of critical infrastructure and high-risk industries. With clients across North America and globally, we equip security teams with cutting-edge capabilities and real-time threat intelligence to combat evolving cyber risks.
📧 info@criticalpathsecurity.com
🌐 www.criticalpathsecurity.com