Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Interlock Ransomware Utilizes Zero-Day to Evade Security

Interlock Ransomware Utilizes Zero-Day to Evade Security

Posted on February 4, 2026 By CWS

The Interlock ransomware group has become a significant cybersecurity threat, focusing on educational institutions in the US and UK. This group distinguishes itself by not adhering to the common Ransomware-as-a-Service (RaaS) model but rather operating as a smaller, independent team.

Unlike larger operations, Interlock develops and manages its own malware, maintaining control over their entire attack strategy. Their operations display a high degree of sophistication, initiating attacks through MintLoader infections often facilitated by ‘ClickFix’ social engineering tactics.

Advanced Attack Techniques

Upon infiltrating a system, usually with the help of a JavaScript implant known as NodeSnakeRAT, the attackers proceed to move laterally through the network. They utilize legitimate user accounts and existing system utilities to maintain persistence and thoroughly explore the compromised environment. The consequences of such an intrusion are devastating, as it typically results in both the encryption and theft of sensitive data.

The group employs tools like AZcopy to transfer large volumes of data to cloud storage before unleashing their ransomware, employing a double-extortion approach. This ensures leverage over victims, even when backups are available.

Security Evasion Tactics

According to Fortinet analysts, Interlock uses a specialized array of tools to disable security protocols after gaining access. This capability allows for the seamless execution of ransomware on both Windows and Nutanix hypervisor platforms without interference.

One of their key tools, dubbed ‘Hotta Killer,’ is designed to disable Endpoint Detection and Response (EDR) and antivirus (AV) systems. This tool leverages a ‘Bring Your Own Vulnerable Driver’ (BYOVD) method, exploiting a zero-day vulnerability in a legitimate gaming anti-cheat driver.

Exploiting Zero-Day Vulnerabilities

The gaming driver vulnerability, identified as CVE-2025-61155, enables Interlock to execute privileged operations by using a renamed version of the driver, thereby subverting security measures. The ‘Hotta Killer’ tool, implemented as a DLL file, is injected into system processes to conceal its actions. It creates symbolic links to interact with the compromised driver, targeting security software processes for termination by passing their Process IDs to the driver.

To counter such threats, organizations should enforce strict policies against unauthorized remote access software and limit workstation-to-workstation SMB and RDP connections. Additionally, blocking outbound PowerShell network activities can hinder the download of malicious software.

For more updates, follow us on Google News, LinkedIn, and X, and set CSN as a preferred source on Google.

Cyber Security News Tags:antivirus evasion, BYOVD, Cybersecurity, data exfiltration, EDR, education sector attack, Fortinet analysis, gaming driver vulnerability, Interlock ransomware, zero-day exploit

Post navigation

Previous Post: Stealthy DEAD#VAX Malware Uses AsyncRAT via IPFS VHDs
Next Post: Addressing SOC False Negatives with Interactive Analysis

Related Posts

CrowdStrike Fires Insider for Sharing Internal System Details with Hackers CrowdStrike Fires Insider for Sharing Internal System Details with Hackers Cyber Security News
Gemini CLI Vulnerability Allows Hackers to Execute Malicious Commands on Developer Systems Gemini CLI Vulnerability Allows Hackers to Execute Malicious Commands on Developer Systems Cyber Security News
How to Implement Zero Trust Architecture in Enterprise Networks How to Implement Zero Trust Architecture in Enterprise Networks Cyber Security News
Threat Actors Abuse Windows Run Prompt to Execute Malicious Command and Deploy DeerStealer Threat Actors Abuse Windows Run Prompt to Execute Malicious Command and Deploy DeerStealer Cyber Security News
Flipper Zero ‘DarkWeb’ Firmware Bypasses Rolling Code Security on Major Vehicle Brands Flipper Zero ‘DarkWeb’ Firmware Bypasses Rolling Code Security on Major Vehicle Brands Cyber Security News
Storm-0249 Abusing EDR Process Via Sideloading to Hide Malicious Activity Storm-0249 Abusing EDR Process Via Sideloading to Hide Malicious Activity Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Addressing SOC False Negatives with Interactive Analysis
  • Interlock Ransomware Utilizes Zero-Day to Evade Security
  • Stealthy DEAD#VAX Malware Uses AsyncRAT via IPFS VHDs
  • PhantomVAI Loader Utilizes RunPE for Stealthy Attacks
  • Microsoft Unveils Tool to Detect AI Model Backdoors

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Addressing SOC False Negatives with Interactive Analysis
  • Interlock Ransomware Utilizes Zero-Day to Evade Security
  • Stealthy DEAD#VAX Malware Uses AsyncRAT via IPFS VHDs
  • PhantomVAI Loader Utilizes RunPE for Stealthy Attacks
  • Microsoft Unveils Tool to Detect AI Model Backdoors

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark