I want to tell you something the security industry usually doesn't bother to say to a small business owner: LockBit 4.0 is not an enterprise problem. It's not a "big company" problem. It's not a government problem. It is your problem — right now, today, whether you run a two-dentist practice in Sandton or a four-person accounting firm in the Cape Winelands.
LockBit is a Ransomware-as-a-Service operation. That means the people who built the malware aren't the ones attacking you. They've licensed it out to hundreds of criminal affiliates — the same way a franchise licences its brand — and those affiliates are hunting for targets everywhere, at all times, across every industry and every size of business. LockBit's developers get a cut. The affiliates do the work. And the affiliates have no minimum target size.
The statistics above are not hypothetical worst-case scenarios. They're documented outcomes from real attacks in the past twelve months. That 22-day downtime figure is particularly savage for a small business. You do not have 22 days of revenue to lose. You probably don't have the cash reserves to survive it, let alone pay a seven-figure ransom on top.
Everything in this article is sourced from verified threat intelligence, published researcher reports, and documented incident data. I'm not trying to sell you paranoia. I'm trying to give you the same briefing I'd give to a hospital CISO — but translated into language that's useful to a business owner who doesn't have an IT department.
What Exactly Is LockBit 4.0?
LockBit has been active since 2019. Over six years it has gone through multiple major versions, each more dangerous than the last. In February 2024, international law enforcement — the NCA, FBI, and Europol — executed a major takedown called Operation Cronos, seizing LockBit's servers and infrastructure. Most observers assumed that was the end.
It wasn't. Within days the group had restored servers and resumed operations. By December 2024, LockBit announced version 4.0 — which had been under development even as their infrastructure was being seized. It launched officially in February 2025.
LockBit 4.0 — also called LockBit Neo — was built from the ground up to be harder to detect, harder to stop, and harder to recover from. The people who built it watched every law enforcement and security team response to the previous versions and engineered around those responses. Here is what is new and what it means for you.
Traditional antivirus works by recognising known malware signatures — specific patterns of code that identify a known threat. LockBit 4.0's July 2025 variant introduced fully polymorphic code: the malware rewrites its own signature with every single deployment. It looks different every time it is deployed. Your antivirus has never seen this particular version before and cannot recognise it as malicious. The scan comes back clean. The malware runs.
This is not a minor upgrade. It renders signature-based endpoint protection — which is what most small businesses rely on — effectively useless as a first line of defence against this threat.
Endpoint Detection and Response tools — EDR — are the more sophisticated cousin of antivirus. Rather than just looking for known signatures, they monitor for suspicious behaviour: a process that starts encrypting large numbers of files, a script that disables Windows security settings, a program that attempts to escalate its own privileges. EDR is often cited as the answer to polymorphic malware.
LockBit 4.0 was designed specifically to defeat it. It patches EtwEventWrite — the Windows event tracing function — by overwriting it with a single return instruction, effectively silencing the event log. It then clears existing Windows event logs via EvtClearLog. Your monitoring tools are blind. The malware deletes itself from disk after execution to frustrate forensic recovery. By the time your EDR would normally flag something, there is nothing left to find except encrypted files.
Older ransomware had one lever: pay us or lose your data. Backups defeated it. LockBit 4.0 operates on a double-extortion model that removes backups as a solution entirely. Before a single file is encrypted, the malware exfiltrates your data to an external server. Your patient records. Your client files. Your financial data. Your staff information. All of it is copied out to attacker-controlled infrastructure first.
Now the attacker holds two guns. The first: pay us or your systems stay encrypted. The second: pay us or we publish everything we took on our dark web leak site — where journalists, competitors, and regulators will find it. A backup does not stop the second threat. Even if you restore from backup in four hours, the attacker still holds your data and the demand stands.
For South African businesses subject to POPIA, this second threat is often more terrifying than the encryption itself. A confirmed data leak triggers mandatory breach notification to the Information Regulator — which means your clients find out, your regulator finds out, and the reputational and legal consequences begin regardless of whether you pay.
How LockBit 4.0 Gets Into a Small Business
LockBit doesn't need a zero-day exploit or nation-state tooling to compromise your business. It relies on entry paths that exist in almost every small business in South Africa right now — the same misconfigurations and oversights that have always existed, combined with automation that makes finding them trivially easy at scale.
LockBit's RaaS model means none of these attacks require a skilled attacker. The affiliate buys access to the tooling for roughly $500 in Bitcoin, receives a full management dashboard, and is handed ready-made attack infrastructure. A moderately motivated criminal with no deep technical skills can run a successful LockBit campaign. The barrier to entry is lower than ever — and the volume of attacks reflects that reality.
What a LockBit 4.0 Attack Looks Like From the Inside
The attack doesn't announce itself. From your perspective, everything is normal — until it isn't. Here is how a typical LockBit 4.0 campaign against a small business unfolds, drawn from documented incident response data.
1–14
15–17
02:00
07:30
The POPIA Dimension — Why South African Businesses Face a Second Crisis
Most cybersecurity articles written for a global audience stop after describing the operational disruption. For South African businesses, there is a second crisis that runs in parallel — and in many cases causes more lasting damage than the ransomware itself.
The Protection of Personal Information Act (POPIA) places specific obligations on any "responsible party" — that's any business that processes the personal information of South African residents. If LockBit's double-extortion attack succeeds in exfiltrating your data, POPIA's breach notification provisions are triggered. You are required to notify the Information Regulator and, in most cases, your affected data subjects — your clients, your patients, your employees — as soon as reasonably possible after becoming aware of the breach.
This is a critical misunderstanding. Some business owners believe that paying the ransom, recovering the decryption key, and restoring systems means the incident "didn't happen" from a regulatory perspective. It did happen. Your data left your control. Whether the attacker honours the ransom and deletes their copy — which is unverifiable and frequently not true — is irrelevant to your POPIA obligations. The breach occurred the moment the data was exfiltrated. Notification is required. The Information Regulator has enforcement powers including administrative fines and, in serious cases, criminal prosecution of responsible parties.
The practical consequence of this is that a successful LockBit 4.0 attack against a South African small business triggers a cascade of simultaneous crises: operational shutdown, financial ransom demand, mandatory regulatory notification, client notification and the resulting reputational damage, potential civil claims from affected data subjects, and the costs of forensic investigation to determine exactly what was taken. Small businesses routinely underestimate how expensive the regulatory and reputational tail of a ransomware incident is relative to the ransom itself.
Six Things to Do Before LockBit Finds You
LockBit 4.0's evasion capabilities are real and significant. But the same truth applies here as it does to almost every cyberattack: the attackers still need an entry point. They still need to find you, get in, move around undetected, and exfiltrate your data before encrypting. Every one of those steps can be disrupted. None of these fixes require an enterprise IT budget.
From One South African to Another
I built Greyhat4Hire because I kept seeing the same story. A small practice owner — dentist, attorney, accountant, physio — who ran a good business, looked after their clients, and had absolutely no reason to think they were a target for serious cybercrime. Then they were. The attack didn't care how good they were at their job or how loyal their clients were. It cared that their RDP was exposed, or that someone on their team clicked a link, or that their backups were plugged into the network 24 hours a day.
LockBit 4.0 is not a more dangerous version of the same old threat because the code got better — although it did. It's more dangerous because the affiliate model means the number of attackers looking for businesses like yours has increased by an order of magnitude, the barrier to running an attack has dropped to near zero, and the detection gap created by polymorphic code and telemetry bypass means your existing defences are less effective than they were a year ago.
The good news is that the fundamentals still work. MFA, offline backups, patch management, and staff awareness would prevent the overwhelming majority of LockBit attacks. These are not exotic or expensive interventions. They are basic hygiene that the vast majority of South African small businesses have not yet implemented.
If you are not sure whether your business would survive a LockBit attack, it would be my pleasure to find out for you — before the attackers do.