Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Interlock Ransomware Utilizes Zero-Day to Evade Security

Interlock Ransomware Utilizes Zero-Day to Evade Security

Posted on February 4, 2026 By CWS

The Interlock ransomware group has become a significant cybersecurity threat, focusing on educational institutions in the US and UK. This group distinguishes itself by not adhering to the common Ransomware-as-a-Service (RaaS) model but rather operating as a smaller, independent team.

Unlike larger operations, Interlock develops and manages its own malware, maintaining control over their entire attack strategy. Their operations display a high degree of sophistication, initiating attacks through MintLoader infections often facilitated by ‘ClickFix’ social engineering tactics.

Advanced Attack Techniques

Upon infiltrating a system, usually with the help of a JavaScript implant known as NodeSnakeRAT, the attackers proceed to move laterally through the network. They utilize legitimate user accounts and existing system utilities to maintain persistence and thoroughly explore the compromised environment. The consequences of such an intrusion are devastating, as it typically results in both the encryption and theft of sensitive data.

The group employs tools like AZcopy to transfer large volumes of data to cloud storage before unleashing their ransomware, employing a double-extortion approach. This ensures leverage over victims, even when backups are available.

Security Evasion Tactics

According to Fortinet analysts, Interlock uses a specialized array of tools to disable security protocols after gaining access. This capability allows for the seamless execution of ransomware on both Windows and Nutanix hypervisor platforms without interference.

One of their key tools, dubbed ‘Hotta Killer,’ is designed to disable Endpoint Detection and Response (EDR) and antivirus (AV) systems. This tool leverages a ‘Bring Your Own Vulnerable Driver’ (BYOVD) method, exploiting a zero-day vulnerability in a legitimate gaming anti-cheat driver.

Exploiting Zero-Day Vulnerabilities

The gaming driver vulnerability, identified as CVE-2025-61155, enables Interlock to execute privileged operations by using a renamed version of the driver, thereby subverting security measures. The ‘Hotta Killer’ tool, implemented as a DLL file, is injected into system processes to conceal its actions. It creates symbolic links to interact with the compromised driver, targeting security software processes for termination by passing their Process IDs to the driver.

To counter such threats, organizations should enforce strict policies against unauthorized remote access software and limit workstation-to-workstation SMB and RDP connections. Additionally, blocking outbound PowerShell network activities can hinder the download of malicious software.

For more updates, follow us on Google News, LinkedIn, and X, and set CSN as a preferred source on Google.

Cyber Security News Tags:antivirus evasion, BYOVD, Cybersecurity, data exfiltration, EDR, education sector attack, Fortinet analysis, gaming driver vulnerability, Interlock ransomware, zero-day exploit

Post navigation

Previous Post: Stealthy DEAD#VAX Malware Uses AsyncRAT via IPFS VHDs
Next Post: Addressing SOC False Negatives with Interactive Analysis

Related Posts

Microsoft Releases Windows 11 Cumulative Updates (KB5063878, KB5063875) August 2025 with New Features Microsoft Releases Windows 11 Cumulative Updates (KB5063878, KB5063875) August 2025 with New Features Cyber Security News
CISA Warns of Federal Agencies Not Fully Patching Actively Exploited Cisco ASA or Firepower Devices CISA Warns of Federal Agencies Not Fully Patching Actively Exploited Cisco ASA or Firepower Devices Cyber Security News
Microsoft Integrated Azure Firewall With AI-powered Security Copilot Microsoft Integrated Azure Firewall With AI-powered Security Copilot Cyber Security News
Internet Archive Abused for Hosting Stealthy JScript Loader Malware Internet Archive Abused for Hosting Stealthy JScript Loader Malware Cyber Security News
Hackers Attacking MongoDB Instances to Delete Database and Add Ransom Note Hackers Attacking MongoDB Instances to Delete Database and Add Ransom Note Cyber Security News
Microsoft Defender Vulnerability Allows Attackers to Elevate Privileges Microsoft Defender Vulnerability Allows Attackers to Elevate Privileges Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News