Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      BrowserStack launches Figma plugin for detecting accessibility issues in design phase

      July 22, 2025

      Parasoft brings agentic AI to service virtualization in latest release

      July 22, 2025

      Node.js vs. Python for Backend: 7 Reasons C-Level Leaders Choose Node.js Talent

      July 21, 2025

      Handling JavaScript Event Listeners With Parameters

      July 21, 2025

      I finally gave NotebookLM my full attention – and it really is a total game changer

      July 22, 2025

      Google Chrome for iOS now lets you switch between personal and work accounts

      July 22, 2025

      How the Trump administration changed AI: A timeline

      July 22, 2025

      Download your photos before AT&T shuts down its cloud storage service permanently

      July 22, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Laravel Live Denmark

      July 22, 2025
      Recent

      Laravel Live Denmark

      July 22, 2025

      The July 2025 Laravel Worldwide Meetup is Today

      July 22, 2025

      Livewire Security Vulnerability

      July 22, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Galaxy Z Fold 7 review: Six years later — Samsung finally cracks the foldable code

      July 22, 2025
      Recent

      Galaxy Z Fold 7 review: Six years later — Samsung finally cracks the foldable code

      July 22, 2025

      Halo and Half-Life combine in wild new mod, bringing two of my favorite games together in one — here’s how to play, and how it works

      July 22, 2025

      Surprise! The iconic Roblox ‘oof’ sound is back — the beloved meme makes “a comeback so good it hurts” after three years of licensing issues

      July 22, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»CISA, FBI Issue Interlock Ransomware Warning

    CISA, FBI Issue Interlock Ransomware Warning

    July 22, 2025

    Interlock ransomware

    The FBI and the U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued an advisory today warning of the growing threat of Interlock ransomware.

    The Interlock ransomware variant first appeared in late September 2024, and while the FBI-CISA advisory doesn’t say how many victims the group has claimed, Cyble threat intelligence researchers have documented 50 Interlock victims to date. Interlock claimed 13 victims in June, according to Cyble, double its previous monthly high, making the agencies’ advisory particularly timely.

    The advisory looks at Interlock ransomware indicators of compromise (IOCs) and tactics, techniques and procedures (TTPs), based on FBI investigations and other sources. The FBI and CISA were joined in the advisory by the Department of Health and Human Services (HHS) and Multi-State Information Sharing and Analysis Center (MS-ISAC).

    Interlock Ransomware Targets VMs

    Interlock ransomware actors have targeted businesses, critical infrastructure, and other organizations in North America and Europe, based on opportunity and financial motivations, the FBI and CISA said.

    Interlock ransomware encryptors have been observed both for Windows and Linux operating systems, encrypting virtual machines (VMs) across both operating systems. Initial access has come via drive-by download from compromised legitimate websites, “an uncommon method among ransomware groups,” the advisory said. The ransomware group has also used the ClickFix social engineering technique for initial access.

    While Interlock actors have been focused on encrypting VMs, it’s possible the group could expand their targets to hosts, workstations, and physical servers in the future. The agencies recommend “robust endpoint detection and response (EDR) tooling and capabilities” to counter the VM threat.

    The agencies said they’re aware of reports detailing similarities between the Rhysida and Interlock ransomware variants.

    Interlock Ransomware TTPs

    One Interlock initial access method has been via fake Google Chrome or Microsoft Edge browser updates, although researchers recently noticed a shift to payload filenames “masquerading as updates for common security software,” CISA and the FBI said.

    The fake Google Chrome browser executable functions as a remote access trojan (RAT) that executes a PowerShell script to drop a file into the Windows Startup folder that is designed to run the RAT every time the victim logs in to establish persistence. A PowerShell command that establishes persistence through a Windows Registry key modification has also been observed.

    For reconnaissance, a PowerShell script executes a series of commands to gather information on victim machines, and applications like Cobalt Strike and SystemBC have been used for command and control, along with Interlock RAT and NodeSnake RAT.

    Once Interlock actors have established remote control of a compromised system, they download a credential stealer (cht.exe) and keylogger binary (klg.dll), and have also been observed using Lumma Stealer and Berserk Stealer to harvest credentials for lateral movement and privilege escalation.

    The ransomware actors use compromised credentials and Remote Desktop Protocol (RDP) to move between systems. They’ve used AnyDesk for remote connectivity and PuTTY for lateral movement. The ransomware group has also compromised domain administrator accounts, possibly via Kerberoasting attacks.

    Defending Against Interlock Ransomware

    The advisory contained a long list of cybersecurity defenses for preventing Interlock ransomware attacks, including:

    • Implementing domain name system (DNS) filtering to block users from accessing malicious sites and applications
    • Implementing web access firewalls to prevent unknown commands or process injection from malicious domains or websites
    • Keeping multiple copies of sensitive or proprietary data and servers in a physically separate, segmented, and secure location
    • Following NIST password standards and requiring multi-factor authentication
    • Keeping operating systems, software, and firmware up to date, prioritizing known exploited vulnerabilities in internet-facing systems
    • Segmenting networks to prevent lateral movement and the spread of ransomware
    • Implement network monitoring, traffic filtering and EDR tools
    • Reviewing domain controllers, servers, workstations, and active directories for new or unrecognized accounts, and applying least privilege principles
    • Disabling unused ports, as well as hyperlinks in received emails
    • Disabling command line and scripting activities and permissions
    • Maintain offline backups of data and ensure that all backup data is encrypted, immutable, “and covers the entire organization’s data infrastructure.”

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleWhat I learned from Inspired
    Next Article Any Intent to Pay a Ransom? UK Government Wants to Know

    Related Posts

    Development

    Laravel Live Denmark

    July 22, 2025
    Development

    The July 2025 Laravel Worldwide Meetup is Today

    July 22, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    Meta AI One Click AI Video Edits Are Here on Instagram, Facebook and Official Website

    Operating Systems

    CVE-2025-30680 – Trend Micro Apex Central SSRF Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Windows 11 Installation Assistant Download: 2025 Guide

    Operating Systems

    Trump’s AI-generated papal portrait sparks controversy and debate

    Artificial Intelligence

    Highlights

    CVE-2025-6532 – NOYAFA/Xiami LF9 Pro RTSP Live Video Stream Endpoint Improper Access Control Vulnerability

    June 23, 2025

    CVE ID : CVE-2025-6532

    Published : June 24, 2025, 12:15 a.m. | 1 hour, 46 minutes ago

    Description : A vulnerability classified as problematic was found in NOYAFA/Xiami LF9 Pro up to 20250611. Affected by this vulnerability is an unknown functionality of the component RTSP Live Video Stream Endpoint. The manipulation leads to improper access controls. The attack can only be initiated within the local network. The exploit has been disclosed to the public and may be used. This dashcam is distributed by multiple resellers and different names.

    Severity: 4.3 | MEDIUM

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    Intel’s new CEO vows to run chipmaker ‘as a startup, on day one’

    April 1, 2025

    Double Fine announced its new game, and I’m so ready to play as a sentient lighthouse

    June 10, 2025

    My favorite red light wand is 50% off for the first time in over a year – but hurry

    July 11, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.