Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Interlock Ransomware With Double Extortion Tactics Attacking Windows and Linux Systems

Posted on July 22, 2025July 22, 2025 By CWS

The Cybersecurity and Infrastructure Safety Company (CISA), FBI, Division of Well being and Human Providers, and Multi-State Data Sharing and Evaluation Heart have issued an pressing joint advisory warning of escalating assaults by the Interlock ransomware group, which has been concentrating on companies and demanding infrastructure sectors since late September 2024.

The newly emerged Interlock variant represents a very refined menace, using unconventional assault strategies that set it aside from typical ransomware operations.

Not like many cybercriminal teams, Interlock actors achieve preliminary entry by drive-by downloads from compromised authentic web sites, an unusual method within the ransomware panorama that makes detection more difficult.

“Interlock actors are opportunistic and financially motivated, concentrating on victims based mostly on alternative slightly than particular business focus,” in accordance with the CISA advisory launched immediately.

The group has efficiently infiltrated organizations throughout North America and Europe, demonstrating their broad operational attain and flexibility.

Double Extortion Amplifies Menace

Central to Interlock’s technique is the usage of double extortion ways, the place attackers each encrypt sufferer knowledge and exfiltrate delicate data.

This twin method considerably will increase strain on organizations to pay ransoms, as victims face not solely operational disruption but in addition the specter of public knowledge publicity by the group’s darkish internet leak web site.

The ransomware has been noticed concentrating on each Home windows and Linux working programs, with specific concentrate on encrypting digital machines throughout each platforms. This cross-platform functionality makes Interlock particularly harmful for organizations working hybrid IT environments.

Maybe most regarding is Interlock’s adoption of the ClickFix social engineering method, the place victims are deceived into executing malicious payloads by clicking faux CAPTCHA prompts that seem to resolve system points.

This methodology has beforehand been related to different malware campaigns however represents a brand new evolution in ransomware supply strategies.

“Victims are supplied with a singular code and are instructed to contact the ransomware group by way of a .onion URL by the Tor browser,” the advisory states.

Not like many ransomware teams, Interlock doesn’t embody preliminary ransom calls for in its notes; as a substitute, it establishes direct communication channels for negotiations.

Instruments Leveraged by Interlock Ransomware Actors

Software NameDescriptionAnyDeskA distant monitoring and administration (RMM) software utilized by menace actors for distant entry and persistence. It additionally facilitates distant file transfers.Cobalt StrikeA penetration testing software designed for safety professionals, which has been co-opted by the actors.PowerShellA cross-platform process automation and configuration administration framework used for scripting malicious actions on Home windows, Linux, and macOS.PSExecA software for executing applications and instructions on distant programs.PuTTY.exeAn open-source software for distant system connections by way of SSH, additionally supporting file switch protocols like SFTP and SCP.ScreenConnectRemote assist and entry software program. Interlock actors have been noticed utilizing a cracked model of this software.SystemBCA software that permits actors to compromise programs, execute instructions, obtain payloads, and act as a proxy to command and management (C2) servers.Home windows Console HostThe conhost.exe manages the person interface for command-line purposes and has been utilized in these assaults.WinSCPA free, open-source consumer for safe file transfers utilizing SFTP, FTP, WebDAV, and different protocols.

Essential Infrastructure at Danger

The concentrating on of crucial infrastructure sectors raises specific considerations about potential service disruptions. Federal investigators word that whereas present assaults have centered totally on encrypting digital machines, there may be potential for growth to bodily servers and workstations in future campaigns.

To counter these threats, CISA recommends organizations implement sturdy endpoint detection and response (EDR) capabilities, significantly for digital machine environments. Further protecting measures embody DNS filtering, internet entry firewalls, community segmentation, and complete person coaching on social engineering recognition.

FBI investigations, persevering with as not too long ago as June 2025, have revealed similarities between Interlock and the beforehand recognized Rhysida ransomware variant, suggesting potential connections or shared technical assets between the teams.

The joint advisory represents a part of the continuing #StopRansomware initiative, offering community defenders with detailed technical indicators and mitigation methods to guard towards this rising menace.

Enhance detection, cut back alert fatigue, speed up response; all with an interactive sandbox constructed for safety groups -> Strive ANY.RUN Now 

Cyber Security News Tags:Attacking, Double, Extortion, Interlock, Linux, Ransomware, Systems, Tactics, Windows

Post navigation

Previous Post: Dell Says Data Leaked by Hackers Is Fake
Next Post: Microsoft Links Ongoing SharePoint Exploits to Three Chinese Hacker Groups

Related Posts

New DuplexSpy RAT Let Attackers Gain Complete Control of Windows Machine Cyber Security News
Chinese Hackers Exploit SAP RCE Vulnerability to Upload Supershell Backdoors Cyber Security News
Threat Actors Mimic CNN, BBC, and CNBC Websites to Promote Investment Scams Cyber Security News
Threat Actors Combine Android Malware With Click Fraud Apps to Steal Login Credentials Cyber Security News
Acer Control Center Vulnerability Let Attackers Execute Malicious Code as a Privileged User Cyber Security News
RapperBot Botnet Attack Peaks 50,000+ Attacks Targeting Network Edge Devices Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Researchers Unmasked Russia’s Most Secretive FSB’s Spy Network
  • How to Recognize Deepfake Videos
  • Threat Actors Attacking Linux SSH Servers to Deploy SVF Botnet
  • New Web3 Phishing Attack Leverages Fake AI Platforms to Steal Usernames and Passwords
  • How to Use Threat Intelligence to Enhance Cybersecurity Operations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Researchers Unmasked Russia’s Most Secretive FSB’s Spy Network
  • How to Recognize Deepfake Videos
  • Threat Actors Attacking Linux SSH Servers to Deploy SVF Botnet
  • New Web3 Phishing Attack Leverages Fake AI Platforms to Steal Usernames and Passwords
  • How to Use Threat Intelligence to Enhance Cybersecurity Operations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News