Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Interlock Ransomware Utilizes Zero-Day to Evade Security

Interlock Ransomware Utilizes Zero-Day to Evade Security

Posted on February 4, 2026 By CWS

The Interlock ransomware group has become a significant cybersecurity threat, focusing on educational institutions in the US and UK. This group distinguishes itself by not adhering to the common Ransomware-as-a-Service (RaaS) model but rather operating as a smaller, independent team.

Unlike larger operations, Interlock develops and manages its own malware, maintaining control over their entire attack strategy. Their operations display a high degree of sophistication, initiating attacks through MintLoader infections often facilitated by ‘ClickFix’ social engineering tactics.

Advanced Attack Techniques

Upon infiltrating a system, usually with the help of a JavaScript implant known as NodeSnakeRAT, the attackers proceed to move laterally through the network. They utilize legitimate user accounts and existing system utilities to maintain persistence and thoroughly explore the compromised environment. The consequences of such an intrusion are devastating, as it typically results in both the encryption and theft of sensitive data.

The group employs tools like AZcopy to transfer large volumes of data to cloud storage before unleashing their ransomware, employing a double-extortion approach. This ensures leverage over victims, even when backups are available.

Security Evasion Tactics

According to Fortinet analysts, Interlock uses a specialized array of tools to disable security protocols after gaining access. This capability allows for the seamless execution of ransomware on both Windows and Nutanix hypervisor platforms without interference.

One of their key tools, dubbed ‘Hotta Killer,’ is designed to disable Endpoint Detection and Response (EDR) and antivirus (AV) systems. This tool leverages a ‘Bring Your Own Vulnerable Driver’ (BYOVD) method, exploiting a zero-day vulnerability in a legitimate gaming anti-cheat driver.

Exploiting Zero-Day Vulnerabilities

The gaming driver vulnerability, identified as CVE-2025-61155, enables Interlock to execute privileged operations by using a renamed version of the driver, thereby subverting security measures. The ‘Hotta Killer’ tool, implemented as a DLL file, is injected into system processes to conceal its actions. It creates symbolic links to interact with the compromised driver, targeting security software processes for termination by passing their Process IDs to the driver.

To counter such threats, organizations should enforce strict policies against unauthorized remote access software and limit workstation-to-workstation SMB and RDP connections. Additionally, blocking outbound PowerShell network activities can hinder the download of malicious software.

For more updates, follow us on Google News, LinkedIn, and X, and set CSN as a preferred source on Google.

Cyber Security News Tags:antivirus evasion, BYOVD, Cybersecurity, data exfiltration, EDR, education sector attack, Fortinet analysis, gaming driver vulnerability, Interlock ransomware, zero-day exploit

Post navigation

Previous Post: Stealthy DEAD#VAX Malware Uses AsyncRAT via IPFS VHDs
Next Post: Addressing SOC False Negatives with Interactive Analysis

Related Posts

Threat Actors Using Fake Notepad++ and 7-zip Websites to Deploy Remote Monitoring Tools Threat Actors Using Fake Notepad++ and 7-zip Websites to Deploy Remote Monitoring Tools Cyber Security News
Critical Flaw in Trivy Scanner Added to CISA’s Vulnerability List Critical Flaw in Trivy Scanner Added to CISA’s Vulnerability List Cyber Security News
Telnyx Python SDK Backdoored by Hackers to Steal Credentials Telnyx Python SDK Backdoored by Hackers to Steal Credentials Cyber Security News
Microsoft Released an Emergency Security Update to Patch a Critical SharePoint 0-Day Vulnerability Microsoft Released an Emergency Security Update to Patch a Critical SharePoint 0-Day Vulnerability Cyber Security News
Cellik Android Malware with One-Click APK Builder Let Attackers Wrap its Payload Inside with Google Play Store Apps Cellik Android Malware with One-Click APK Builder Let Attackers Wrap its Payload Inside with Google Play Store Apps Cyber Security News
Dutch Intelligence Exposes Russian “Laundry Bear” Cyber Group Behind Police Hack Dutch Intelligence Exposes Russian “Laundry Bear” Cyber Group Behind Police Hack Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • F5 Resolves Over 50 Security Flaws in Software
  • Windows Vulnerabilities: BitLocker Bypass and CTFMON Exploit
  • Seedworm Group Exploits Signed Binaries for Cyber Attacks
  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • F5 Resolves Over 50 Security Flaws in Software
  • Windows Vulnerabilities: BitLocker Bypass and CTFMON Exploit
  • Seedworm Group Exploits Signed Binaries for Cyber Attacks
  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark