Federal Agencies Warn of Interlock Ransomware Targeting Critical Infrastructure with Unusual Tactics | #ransomware | #cybercrime


The FBI, CISA, Department of Health and Human Services (HHS), and Multi-State Information-Sharing and Analysis Center (MS-ISAC) have released a joint Cybersecurity Advisory on Interlock ransomware.

The Interlock ransomware variant was first observed in late September 2024, targeting various business, critical infrastructure, and other organizations in North America and Europe. FBI maintains these actors target their victims based on opportunity, and their activity is financially motivated. FBI is aware of Interlock ransomware encryptors designed for both Windows and Linux operating systems; these encryptors have been observed encrypting virtual machines (VMs) across both operating systems. FBI observed actors obtaining initial access via drive-by download from compromised legitimate websites, which is an uncommon method among ransomware groups. Actors were also observed using the ClickFix social engineering technique for initial access, in which victims are tricked into executing a malicious payload under the guise of fixing an issue on the victim’s system. Actors then use various methods for discovery, credential access, and lateral movement to spread to other systems on the network.

Interlock actors employ a double extortion model in which actors encrypt systems after exfiltrating data, which increases pressure on victims to pay the ransom to both get their data decrypted and prevent it from being leaked.

Read the full advisory here.

(AI was used in part to facilitate this article.)



Source link

.........................

National Cyber Security

FREE
VIEW