LockBit 5.0 Ransomware Claims Attack on Greek Luxury Hotel Group EM Resorts

LockBit 5.0 Adds Greek Hospitality Brand EM Resorts to its Leak Site

HIGH
December 27, 2025
4m read
RansomwareData BreachCyberattack

Impact Scope

Affected Companies

EM Resorts

Industries Affected

Hospitality

Geographic Impact

Greece (national)

Related Entities

Threat Actors

Other

LockBit 5.0EM Resorts

Full Report

Executive Summary

The notorious LockBit ransomware operation, using its 5.0 variant, has claimed a new victim in the high-end hospitality sector. On December 26, 2025, the group added EM Resorts, a luxury hotel brand in Crete, Greece, to its dark web leak site. The post included a threat to publish stolen data, indicating a classic double-extortion attack. This incident underscores the persistent and indiscriminate nature of major ransomware-as-a-service (RaaS) groups, which continue to target organizations of all sizes and sectors. For EM Resorts, the potential leak of guest information, financial records, and operational data poses a significant threat to its reputation and business continuity.

Threat Overview

The attack was publicly claimed by the LockBit 5.0 group, which operates one of the most active RaaS platforms. The claim on their leak site is a standard tactic used to apply public pressure on victims to pay the ransom. By threatening to release exfiltrated data, the group employs a double-extortion strategy: the victim's systems are crippled by encryption (T1486 - Data Encrypted for Impact), and they face a potential data breach if they refuse to pay (T1657 - Financial Extortion).

While the initial access vector for the EM Resorts breach is unknown, LockBit affiliates commonly use methods such as:

  • Exploiting unpatched vulnerabilities in public-facing services (e.g., VPNs, RDP).
  • Phishing campaigns to steal employee credentials.
  • Purchasing access from initial access brokers (IABs).

Once inside, the attackers would have moved laterally across the network, escalated privileges, and exfiltrated sensitive data before deploying the ransomware payload to encrypt servers and workstations.

Technical Analysis

LockBit 5.0 is a sophisticated ransomware variant that includes features to evade security software and inhibit recovery. The attackers likely used legitimate administrative tools like PsExec or PowerShell for lateral movement (T1021.002 - Remote Services: SMB/Windows Admin Shares). Before encryption, they would have exfiltrated data to a cloud storage provider or their own infrastructure (T1567.002 - Exfiltration Over Web Service: Exfiltration to Cloud Storage). Finally, the ransomware executable is deployed, often via Group Policy Objects (GPO) or other software deployment tools, to achieve widespread impact.

Impact Assessment

For a luxury hospitality brand like EM Resorts, the impact of this attack is multi-faceted:

  • Data Breach: The potential leak of guest data, including personal identifiable information (PII) and payment details, could lead to significant regulatory fines under GDPR, reputational damage, and loss of customer trust.
  • Business Disruption: Encrypted systems for reservations, property management (PMS), and point-of-sale (POS) would severely disrupt hotel operations, potentially forcing a temporary shutdown.
  • Financial Loss: The costs associated with incident response, system restoration, potential ransom payment, legal fees, and lost revenue can be substantial.
  • Reputational Damage: Being listed on a prominent ransomware leak site damages the brand's image of security and exclusivity, which is critical in the luxury market.

Detection & Response

  1. Monitor for LockBit Indicators: Security teams should monitor for TTPs associated with LockBit, including the use of tools like PsExec, abuse of lsass.exe for credential dumping, and large, unexpected outbound data transfers.
  2. EDR and Antivirus: Ensure endpoint protection is configured to detect and block LockBit 5.0 signatures and behaviors. Monitor for processes that attempt to disable security services or delete volume shadow copies.
  3. Network Monitoring: Look for connections to known LockBit C2 servers or data exfiltration endpoints. This aligns with D3-NTA: Network Traffic Analysis.
  4. Incident Response: If an intrusion is suspected, immediately isolate affected systems to prevent further spread. Preserve logs and disk images for forensic analysis. Engage with a professional incident response firm to conduct a compromise assessment and eradicate the threat.

Mitigation

  1. Patch Management: Aggressively patch all internet-facing systems and critical software to close the vulnerabilities that ransomware groups commonly exploit. This is a direct application of D3-SU: Software Update.
  2. Multi-Factor Authentication (MFA): Enforce MFA on all remote access solutions (VPN, RDP), email accounts, and privileged administrative accounts. This is one of the most effective controls against credential-based attacks. This is D3-MFA: Multi-factor Authentication.
  3. Immutable Backups: Maintain and regularly test offline and immutable backups. This ensures that data can be restored without paying a ransom, neutralizing the encryption portion of the attack.
  4. Network Segmentation: Segment the network to limit an attacker's ability to move laterally. Isolate critical systems, such as property management and payment processing systems, from the general corporate network. This is a form of D3-NI: Network Isolation.

Timeline of Events

1
December 26, 2025
LockBit 5.0 posts a notice on its dark web leak site claiming to have breached EM Resorts.
2
December 27, 2025
This article was published

MITRE ATT&CK Mitigations

Enforce MFA on all remote access points and privileged accounts to prevent unauthorized access via stolen credentials.

Mapped D3FEND Techniques:

Maintain a rigorous patch management program to close vulnerabilities commonly exploited by ransomware for initial access.

Mapped D3FEND Techniques:

Segment the network to contain the blast radius of a ransomware attack, protecting critical systems like backups and payment processors.

Mapped D3FEND Techniques:

Conduct regular security awareness training to help employees identify and report phishing emails, a primary vector for ransomware.

D3FEND Defensive Countermeasures

The single most effective defense against attacks that leverage stolen credentials—a common tactic for LockBit affiliates—is the enforcement of Multi-Factor Authentication (MFA). All remote access points, including VPNs and RDP gateways, must be protected with MFA. Furthermore, MFA should be required for all administrative accounts and access to critical cloud services. For a hospitality company like EM Resorts, this includes securing access to the Property Management System (PMS), customer databases, and financial platforms. Implementing MFA drastically raises the difficulty for an attacker to gain initial access or move laterally, as a compromised password alone is no longer sufficient.

To counter the encryption aspect of the LockBit attack, EM Resorts and other potential targets must maintain a robust and tested backup strategy. This involves creating immutable (unalterable) backups stored in a separate, isolated network segment or cloud environment. Regularly test the restoration process to ensure that critical systems, like reservation and billing databases, can be brought back online within an acceptable timeframe (Recovery Time Objective). This strategy directly undermines the attacker's primary leverage for ransom payment. If the victim can confidently restore their own data, the encryption becomes a manageable disruption rather than a catastrophic event, shifting the focus to managing the data exfiltration threat.

To combat the double-extortion tactic, deploy Data Loss Prevention (DLP) and network monitoring solutions to detect and block large-scale data exfiltration. Establish a baseline of normal outbound data traffic from critical servers. Configure alerts for any significant deviations from this baseline, such as a server suddenly uploading hundreds of gigabytes of data to an unknown cloud storage provider. Egress filtering rules on the firewall can be used to block traffic to known malicious domains and non-categorized file-sharing sites. Detecting the data theft stage of the attack provides a critical opportunity to intervene before the final ransomware payload is deployed.

Sources & References

LockBit 5.0 Ransomware Attack on EM Resorts in Greece
dExpose (dexpose.io) December 26, 2025

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

LockBitRansomwareDouble ExtortionHospitalityGreeceData Breach

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading