Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Ransomware

Organizations Warned of Interlock Ransomware Attacks

The US government has issued an alert on the Interlock ransomware, which targets organizations via drive-by download attacks.

Ransomware

The US agencies CISA, FBI, HHS, and MS-ISAC have released a joint alert on Interlock ransomware attacks against critical infrastructure, businesses, and other organizations in North America and Europe.

Active since September 2024, Interlock is targeting both Windows and Linux systems with malware designed to encrypt virtual machines, and has been relying on drive-by downloads for the initial compromise.

Interlock’s operators, the US government agencies explain, are compromising legitimate websites and using the ClickFix social engineering technique to trick victims into executing malicious code on their systems. More recently, the hackers switched to FileFix attacks.

Previously, the ransomware group was relying on fake Google Chrome or Microsoft Edge browser updates for code deployment.

The hackers were seen deploying a RAT to drop a file in the Windows Startup folder and achieve persistence, but also executing PowerShell commands to modify Windows Registry keys for the same purpose.

After establishing remote control, the attackers ran PowerShell commands to deploy a credential stealer and a keylogger, and were also seen using information stealers such as Lumma Stealer and Berserk Stealer.

Advertisement. Scroll to continue reading.

For lateral movement, the ransomware group uses compromised credentials and RDP tools, and deploy legitimate software such as AnyDesk and PuTTY. It also compromises domain administrator accounts to elevate privileges.

The hackers were also seen accessing the victims’ Microsoft Azure Storage accounts and exfiltrating data to the Azure storage blob, using various file transfer tools, including WinSCP. Then, they proceed to encrypting VMs.

“Interlock actors employ a double extortion model in which actors encrypt systems after exfiltrating data, which increases pressure on victims to pay the ransom to both get their data decrypted and prevent it from being leaked,” the joint alert reads.

The ransomware group’s ransom notes do not include ransom and payment details, but instruct victims to contact the attackers via a Tor-based website. After the victim contacts them, the hackers ask that a ransom be paid in Bitcoin, threatening to leak the stolen information.

“To date, Interlock actors have been observed encrypting VMs, leaving hosts, workstations, and physical servers unaffected; however, this does not mean they will not expand to these systems in the future,” the joint advisory reads.

Since its emergence in 2024, Interlock has claimed at least three high-profile intrusions, namely Texas Tech University, National Presto Industries, and Kettering Health.

Related: New Interlock RAT Variant Distributed via FileFix Attacks

Related: SonicWall SMA Appliances Targeted With New ‘Overstep’ Malware

Related: MITRE Unveils AADAPT Framework to Tackle Cryptocurrency Threats

Related: Inside the Verizon 2025 DBIR: Five Trends That Signal a Shift in the Cyber Threat Economy

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

With "Shadow AI" usage becoming prevalent in organizations, learn how to balance the need for rapid experimentation with the rigorous controls required for enterprise-grade deployment.

Register

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

People on the Move

MongoDB has appointed Doug Bowers as Chief Information Security Officer.

Ben Wilkens has been promoted to Director of Cybersecurity at NMFTA.

Cato Networks has appointed Meital Koren as Chief Legal Officer.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.