Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

KongTuke Attacking Windows Users With New Interlock RAT Variant Using FileFix Technique

Posted on July 14, 2025July 14, 2025 By CWS

A classy malware marketing campaign leveraging the KongTuke menace cluster has emerged, concentrating on Home windows customers by way of a novel FileFix method that deploys a sophisticated PHP-based variant of the Interlock distant entry trojan (RAT).

This represents a big evolution from earlier JavaScript-based implementations, demonstrating elevated operational sophistication and resilience.

Since Could 2025, cybersecurity researchers have noticed widespread exercise associated to the Interlock RAT in reference to the LandUpdate808 web-inject menace clusters, often known as KongTuke.

The marketing campaign makes use of compromised web sites as preliminary assault vectors, injecting single-line scripts into HTML pages that stay largely undetected by web site house owners and guests alike.

The DFIR Report analysts, working in partnership with Proofpoint researchers, recognized this new variant in June 2025 campaigns.

The menace actors have efficiently transitioned from their beforehand documented JavaScript-based Interlock RAT, nicknamed NodeSnake, to a extra strong PHP-based implementation that enhances each performance and evasion capabilities.

The marketing campaign’s opportunistic concentrating on strategy impacts organizations throughout a number of industries, with menace actors using refined social engineering methods to maximise an infection charges.

The malware’s evolution demonstrates the Interlock group’s continued funding in growing extra resilient and harder-to-detect assault methodologies.

An infection Mechanism Evaluation

The KongTuke FileFix assault chain begins with compromised web sites serving malicious JavaScript that employs heavy IP filtering to selectively goal particular victims.

Upon accessing an contaminated web site, customers encounter a seemingly reliable captcha verification immediate requesting them to “Confirm you might be human,” adopted by detailed verification steps that instruct victims to open Home windows Run command dialog and paste clipboard content material.

KongTuke web-inject transitioning to a FileFix variant (Supply – The DFIR Report)

This social engineering strategy successfully bypasses conventional safety consciousness coaching, as customers understand the captcha as a normal internet safety measure.

When victims adjust to the directions, they unknowingly execute a PowerShell script that initiates the Interlock RAT deployment sequence.

The execution chain demonstrates refined technical implementation, with PowerShell spawning PHP processes utilizing suspicious arguments.

The malware hundreds configuration recordsdata from non-standard places throughout the person’s AppData listing, particularly invoking the PHP executable with ZIP extension directives.

A consultant command construction seems as:-

“C:Customers[REDACTED]AppDataRoamingphpphp.exe” -d extension=zip -c config.cfg

Upon profitable execution, the RAT instantly performs complete system reconnaissance, accumulating detailed info together with system specs, working processes, Home windows providers, mounted drives, and community neighborhood information by way of ARP desk queries.

This intelligence gathering allows menace actors to shortly assess compromise scope and privilege ranges, figuring out whether or not they have USER, ADMIN, or SYSTEM entry rights for subsequent assault phases.

The malware establishes strong command and management communications by way of trycloudflare.com URLs, intentionally abusing reliable Cloudflare Tunnel providers to masks true server places whereas sustaining hardcoded fallback IP addresses for operational resilience.

Detect malware in a stay atmosphere Analyze suspicious recordsdata & URLs in ANY.RUN’s Sandbox -> Strive for Free

Cyber Security News Tags:Attacking, FileFix, Interlock, KongTuke, RAT, Technique, Users, Variant, Windows

Post navigation

Previous Post: RenderShock 0-Click Vulnerability Executes Payloads via Background Process Without User Interaction
Next Post: New Forensic Technique Uncovers Hidden Trails Left by Hackers Exploiting RDP

Related Posts

Mitigating Malware Threats on Unmanaged Endpoint Devices Cyber Security News
Hackers Exploit SimpleHelp RMM Tool to Deploy DragonForce Ransomware Cyber Security News
Hackers Exploiting Critical Langflow Vulnerability to Deploy Flodrix Botnet and Take System Control Cyber Security News
Microsoft 365 PDF Export LFI Vulnerability Allows Access to Sensitive Server Data Cyber Security News
1inch rolls out expanded bug bounties with rewards up to $500K Cyber Security News
Microsoft Defender Vulnerability Allows Attackers to Elevate Privileges Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Wing FTP Server Vulnerability Actively Exploited
  • The Unusual Suspect: Git Repos
  • Threat Actors Attacking Gen Z Gamers With Weaponized Versions of Popular Games
  • Train Hack Gets Proper Attention After 20 Years: Researcher 
  • CitrixBleed 2 Flaw Poses Unacceptable Risk: CISA

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Wing FTP Server Vulnerability Actively Exploited
  • The Unusual Suspect: Git Repos
  • Threat Actors Attacking Gen Z Gamers With Weaponized Versions of Popular Games
  • Train Hack Gets Proper Attention After 20 Years: Researcher 
  • CitrixBleed 2 Flaw Poses Unacceptable Risk: CISA

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News