Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New Interlock RAT Variant Distributed via FileFix Attacks

New Interlock RAT Variant Distributed via FileFix Attacks

Posted on July 14, 2025July 14, 2025 By CWS

A brand new model of the Interlock ransomware group’s RAT is being distributed by way of compromised web sites utilizing a variant of the ClickFix assault, safety researchers warn.

A social engineering method, ClickFix depends on malicious code injected into net pages to trick guests into executing malicious code on their methods underneath the disguise of performing an replace, resolving an error, or verifying they’re people.

FileFix is a variant of the assault by which a immediate notifies the consumer {that a} file has been shared with them, and a faux ‘Open File Explorer’ button on the web page routinely launches File Explorer and copies PowerShell code to the clipboard.

The sufferer is then instructed to seek out the shared file utilizing File Explorer’s handle bar by pasting the file’s path and urgent Enter. This, nevertheless, results in the execution of a malicious file, as safety researcher mr.d0x reported.

Beginning Could 2025, The DFIR Report and Proofpoint noticed Interlock RAT distribution exercise related to KongTuke (aka LandUpdate808), a complicated site visitors distribution system (TDS) that results in malware infections although a multi-stage course of that entails faux captcha lures.

The KongTuke net injections lately transitioned from ClickFix to FileFix assaults and began distributing a PHP variant of the Interlock RAT in early June, The DFIR Report explains. In some circumstances, the Node.js variant of the malware was delivered.

Upon execution, the RAT begins fingerprinting the system, utilizing PowerShell instructions to reap and exfiltrate system data. It additionally checks the privileges the logged-in consumer has on the system.

Interlock RAT (linked to NodeSnake RAT) establishes persistence utilizing a run key, and permits the attackers to provide it with instructions to be executed. The truth is, The DFIR Report has noticed robust proof of hands-on-keyboard exercise from the risk actors.Commercial. Scroll to proceed studying.

For command-and-control (C&C) communication, the malware depends on trycloudflare.com URLs, abusing the respectable Cloudflare Tunnel service to cover its C&C.

The safety researchers additionally noticed using RDP for lateral motion throughout the compromised environments, and notice that the hackers have been seen focusing on a number of industries, concluding that the marketing campaign is probably going opportunistic.

“This discovery highlights the continued evolution of the Interlock group’s tooling and their operational sophistication. Whereas the Node.js variant of Interlock RAT was recognized for its use of Node.js, this variant leverages PHP, a standard net scripting language, to realize and preserve entry to sufferer networks,” The DFIR Report notes.

Associated: Chinese language Hackers Goal Chinese language Customers With RAT, Rootkit

Associated: Ransomware Gang Leaks Alleged Kettering Well being Information

Associated: Two Individuals Arrested in Australia and US for Improvement and Sale of Hive RAT

Associated: Ransomware Group Takes Credit score for Nationwide Presto Industries Assault

Security Week News Tags:Attacks, Distributed, FileFix, Interlock, RAT, Variant

Post navigation

Previous Post: Threat Actors Use Sophisticated Hacking Tools to Destroy Organizations Critical Infrastructure
Next Post: Pune Auto Parts Firm Loses ₹2.35 Crore in Man-in-the-Middle Attack

Related Posts

SAP Patches Another Critical NetWeaver Vulnerability SAP Patches Another Critical NetWeaver Vulnerability Security Week News
Microsoft Unveils Security Enhancements for Identity, Defense, Compliance Microsoft Unveils Security Enhancements for Identity, Defense, Compliance Security Week News
Microsoft Disables Downloaded File Previews to Block NTLM Hash Leaks Microsoft Disables Downloaded File Previews to Block NTLM Hash Leaks Security Week News
Defend Against Identity Threats: Join Our Webinar Defend Against Identity Threats: Join Our Webinar Security Week News
Decade-Old Pixie Dust Wi-Fi Hack Still Impacts Many Devices Decade-Old Pixie Dust Wi-Fi Hack Still Impacts Many Devices Security Week News
Microsoft Revokes Over 200 Certificates to Disrupt Ransomware Campaign Microsoft Revokes Over 200 Certificates to Disrupt Ransomware Campaign Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark