The notorious LockBit ransomware operation, using its 5.0 variant, has claimed a new victim in the high-end hospitality sector. On December 26, 2025, the group added EM Resorts, a luxury hotel brand in Crete, Greece, to its dark web leak site. The post included a threat to publish stolen data, indicating a classic double-extortion attack. This incident underscores the persistent and indiscriminate nature of major ransomware-as-a-service (RaaS) groups, which continue to target organizations of all sizes and sectors. For EM Resorts, the potential leak of guest information, financial records, and operational data poses a significant threat to its reputation and business continuity.
The attack was publicly claimed by the LockBit 5.0 group, which operates one of the most active RaaS platforms. The claim on their leak site is a standard tactic used to apply public pressure on victims to pay the ransom. By threatening to release exfiltrated data, the group employs a double-extortion strategy: the victim's systems are crippled by encryption (T1486 - Data Encrypted for Impact), and they face a potential data breach if they refuse to pay (T1657 - Financial Extortion).
While the initial access vector for the EM Resorts breach is unknown, LockBit affiliates commonly use methods such as:
Once inside, the attackers would have moved laterally across the network, escalated privileges, and exfiltrated sensitive data before deploying the ransomware payload to encrypt servers and workstations.
LockBit 5.0 is a sophisticated ransomware variant that includes features to evade security software and inhibit recovery. The attackers likely used legitimate administrative tools like PsExec or PowerShell for lateral movement (T1021.002 - Remote Services: SMB/Windows Admin Shares). Before encryption, they would have exfiltrated data to a cloud storage provider or their own infrastructure (T1567.002 - Exfiltration Over Web Service: Exfiltration to Cloud Storage). Finally, the ransomware executable is deployed, often via Group Policy Objects (GPO) or other software deployment tools, to achieve widespread impact.
For a luxury hospitality brand like EM Resorts, the impact of this attack is multi-faceted:
PsExec, abuse of lsass.exe for credential dumping, and large, unexpected outbound data transfers.Enforce MFA on all remote access points and privileged accounts to prevent unauthorized access via stolen credentials.
Mapped D3FEND Techniques:
Maintain a rigorous patch management program to close vulnerabilities commonly exploited by ransomware for initial access.
Mapped D3FEND Techniques:
Segment the network to contain the blast radius of a ransomware attack, protecting critical systems like backups and payment processors.
Mapped D3FEND Techniques:
Conduct regular security awareness training to help employees identify and report phishing emails, a primary vector for ransomware.
The single most effective defense against attacks that leverage stolen credentials—a common tactic for LockBit affiliates—is the enforcement of Multi-Factor Authentication (MFA). All remote access points, including VPNs and RDP gateways, must be protected with MFA. Furthermore, MFA should be required for all administrative accounts and access to critical cloud services. For a hospitality company like EM Resorts, this includes securing access to the Property Management System (PMS), customer databases, and financial platforms. Implementing MFA drastically raises the difficulty for an attacker to gain initial access or move laterally, as a compromised password alone is no longer sufficient.
To counter the encryption aspect of the LockBit attack, EM Resorts and other potential targets must maintain a robust and tested backup strategy. This involves creating immutable (unalterable) backups stored in a separate, isolated network segment or cloud environment. Regularly test the restoration process to ensure that critical systems, like reservation and billing databases, can be brought back online within an acceptable timeframe (Recovery Time Objective). This strategy directly undermines the attacker's primary leverage for ransom payment. If the victim can confidently restore their own data, the encryption becomes a manageable disruption rather than a catastrophic event, shifting the focus to managing the data exfiltration threat.
To combat the double-extortion tactic, deploy Data Loss Prevention (DLP) and network monitoring solutions to detect and block large-scale data exfiltration. Establish a baseline of normal outbound data traffic from critical servers. Configure alerts for any significant deviations from this baseline, such as a server suddenly uploading hundreds of gigabytes of data to an unknown cloud storage provider. Egress filtering rules on the firewall can be used to block traffic to known malicious domains and non-categorized file-sharing sites. Detecting the data theft stage of the attack provides a critical opportunity to intervene before the final ransomware payload is deployed.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats