Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      This week in AI updates: Mistral’s new Le Chat features, ChatGPT updates, and more (September 5, 2025)

      September 6, 2025

      Designing For TV: Principles, Patterns And Practical Guidance (Part 2)

      September 5, 2025

      Neo4j introduces new graph architecture that allows operational and analytics workloads to be run together

      September 5, 2025

      Beyond the benchmarks: Understanding the coding personalities of different LLMs

      September 5, 2025

      Development Release: KDE Linux 20250906

      September 6, 2025

      Hitachi Energy Pledges $1B to Strengthen US Grid, Build Largest Transformer Plant in Virginia

      September 5, 2025

      How to debug a web app with Playwright MCP and GitHub Copilot

      September 5, 2025

      Between Strategy and Story: Thierry Chopain’s Creative Path

      September 5, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Health Monitoring Android App using SQLite

      September 7, 2025
      Recent

      Health Monitoring Android App using SQLite

      September 7, 2025

      Convertedbook – Live LaTeX Preview in the Browser

      September 7, 2025

      Why browsers throttle JavaScript timers (and what to do about it)

      September 6, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Development Release: KDE Linux 20250906

      September 6, 2025
      Recent

      Development Release: KDE Linux 20250906

      September 6, 2025

      Harnessing GitOps on Linux for Seamless, Git-First Infrastructure Management

      September 6, 2025

      How DevOps Teams Are Redefining Reliability with NixOS and OSTree-Powered Linux

      September 5, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»CISA, FBI Issue Interlock Ransomware Warning

    CISA, FBI Issue Interlock Ransomware Warning

    July 22, 2025

    Interlock ransomware

    The FBI and the U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued an advisory today warning of the growing threat of Interlock ransomware.

    The Interlock ransomware variant first appeared in late September 2024, and while the FBI-CISA advisory doesn’t say how many victims the group has claimed, Cyble threat intelligence researchers have documented 50 Interlock victims to date. Interlock claimed 13 victims in June, according to Cyble, double its previous monthly high, making the agencies’ advisory particularly timely.

    The advisory looks at Interlock ransomware indicators of compromise (IOCs) and tactics, techniques and procedures (TTPs), based on FBI investigations and other sources. The FBI and CISA were joined in the advisory by the Department of Health and Human Services (HHS) and Multi-State Information Sharing and Analysis Center (MS-ISAC).

    Interlock Ransomware Targets VMs

    Interlock ransomware actors have targeted businesses, critical infrastructure, and other organizations in North America and Europe, based on opportunity and financial motivations, the FBI and CISA said.

    Interlock ransomware encryptors have been observed both for Windows and Linux operating systems, encrypting virtual machines (VMs) across both operating systems. Initial access has come via drive-by download from compromised legitimate websites, “an uncommon method among ransomware groups,” the advisory said. The ransomware group has also used the ClickFix social engineering technique for initial access.

    While Interlock actors have been focused on encrypting VMs, it’s possible the group could expand their targets to hosts, workstations, and physical servers in the future. The agencies recommend “robust endpoint detection and response (EDR) tooling and capabilities” to counter the VM threat.

    The agencies said they’re aware of reports detailing similarities between the Rhysida and Interlock ransomware variants.

    Interlock Ransomware TTPs

    One Interlock initial access method has been via fake Google Chrome or Microsoft Edge browser updates, although researchers recently noticed a shift to payload filenames “masquerading as updates for common security software,” CISA and the FBI said.

    The fake Google Chrome browser executable functions as a remote access trojan (RAT) that executes a PowerShell script to drop a file into the Windows Startup folder that is designed to run the RAT every time the victim logs in to establish persistence. A PowerShell command that establishes persistence through a Windows Registry key modification has also been observed.

    For reconnaissance, a PowerShell script executes a series of commands to gather information on victim machines, and applications like Cobalt Strike and SystemBC have been used for command and control, along with Interlock RAT and NodeSnake RAT.

    Once Interlock actors have established remote control of a compromised system, they download a credential stealer (cht.exe) and keylogger binary (klg.dll), and have also been observed using Lumma Stealer and Berserk Stealer to harvest credentials for lateral movement and privilege escalation.

    The ransomware actors use compromised credentials and Remote Desktop Protocol (RDP) to move between systems. They’ve used AnyDesk for remote connectivity and PuTTY for lateral movement. The ransomware group has also compromised domain administrator accounts, possibly via Kerberoasting attacks.

    Defending Against Interlock Ransomware

    The advisory contained a long list of cybersecurity defenses for preventing Interlock ransomware attacks, including:

    • Implementing domain name system (DNS) filtering to block users from accessing malicious sites and applications
    • Implementing web access firewalls to prevent unknown commands or process injection from malicious domains or websites
    • Keeping multiple copies of sensitive or proprietary data and servers in a physically separate, segmented, and secure location
    • Following NIST password standards and requiring multi-factor authentication
    • Keeping operating systems, software, and firmware up to date, prioritizing known exploited vulnerabilities in internet-facing systems
    • Segmenting networks to prevent lateral movement and the spread of ransomware
    • Implement network monitoring, traffic filtering and EDR tools
    • Reviewing domain controllers, servers, workstations, and active directories for new or unrecognized accounts, and applying least privilege principles
    • Disabling unused ports, as well as hyperlinks in received emails
    • Disabling command line and scripting activities and permissions
    • Maintain offline backups of data and ensure that all backup data is encrypted, immutable, “and covers the entire organization’s data infrastructure.”

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleWhat makes a senior engineer
    Next Article Any Intent to Pay a Ransom? UK Government Wants to Know

    Related Posts

    Development

    What is New in Go 1.25? Explained with Examples

    September 7, 2025
    Artificial Intelligence

    Scaling Up Reinforcement Learning for Traffic Smoothing: A 100-AV Highway Deployment

    September 7, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    CVE-2025-6700 – Xuxueli xxl-sso Remote Cross-Site Scripting Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-52450 – “Tableau Server Path Traversal”

    Common Vulnerabilities and Exposures (CVEs)

    I tested this beastly gaming laptop with flawless performance — but I’m obsessed with a different feature

    News & Updates

    Android adware: What is it, and how do I get it off my device?

    Development

    Highlights

    News & Updates

    Xbox Ally vs Steam Deck: Which is the better gaming handheld?

    June 10, 2025

    It turns out that the Xbox Ally is rather comparable to the Steam Deck. Here’s…

    Table Habit – establish and track your own micro habit

    August 3, 2025

    CVE-2025-43268 – Apple macOS Sequoia Root Privilege Escalation

    August 28, 2025

    CVE-2025-5394 – Alone – Charity Multipurpose Non-profit WordPress Theme Unauthenticated Arbitrary File Upload Vulnerability

    July 15, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.