CXO Corner

Interlock: The New Kid on the Block (and It’s a Bad One)


Interlock, the newest kid on the ransomware block, is causing quite a stir. This sneaky little malware is targeting critical infrastructure, specifically FreeBSD servers. It's like they're going after the low-hanging fruit, but with a twist.

How does Interlock work its magic?

Remember, cybersecurity is an ongoing battle. Don't let your guard down. Stay vigilant, stay informed, and stay safe.
So, how can you protect yourself from this nasty piece of malware?

Interlock Ransomware - Detailed report

Interlock is a relatively new ransomware operation first detected in late September 202412. The group behind Interlock has targeted organisations worldwide, with a particular focus on the healthcare sector.

Targeting and Attack Vectors

Interlock employs an unusual approach compared to other ransomware operations by specifically targeting FreeBSD servers, an operating system commonly used in critical infrastructure. This suggests that Interlock operators are seeking to disrupt vital services and potentially demand  higher ransoms due to the impact of their attacks.

Key attack vectors include:

Ransomware Execution and Impact

Interlock has developed both Windows and FreeBSD encryptors69. The Windows version clears Windows event logs and can delete itself using a DLL10.

During an attack, Interlock performs the following actions:

Ransom demands range from hundreds of thousands to millions of dollars, depending on the victim organisation's size.

Command and Control

Interlock establishes command and control (C2) through a scheduled task over an anonymized network, using a reverse shell for communication78. This sophisticated approach helps the ransomware evade detection by traditional network monitoring tools.

Malware Analysis and Detection

Foresiet, a digital security firm, has analysed Interlock's processes and identified several components that facilitate its malicious activities:

MITRE ATT&CK Techniques

Interlock utilises various techniques mapped to the MITRE ATT&CK framework. Some notable examples include:

Prevention and Mitigation

Organisations can take the following steps to protect themselves from Interlock ransomware:

By implementing a multi-layered security approach, organisations can significantly reduce their risk of falling victim to Interlock and other sophisticated ransomware threats.

Exit mobile version