Huseyin Can YUCEEL | 7 MIN READ

CREATED ON July 23, 2025

Interlock Ransomware Analysis, Simulation, and Mitigation - CISA Alert AA25-203A

On July 22, 2025, the Cybersecurity and Infrastructure Security Agency (CISA) released a joint advisory on Interlock ransomware [1]. Interlock ransomware has been actively targeting critical infrastructure across North America and Europe since late 2024. Their attacks are opportunistic but highly disruptive impacting virtual machines across Windows and Linus operating systems.

In this blog post, we explain the Tactics, Techniques, and Procedures (TTPs) used by Interlock ransomware and how organizations can defend themselves against Interlock ransomware attacks.

Simulate Ransomware Threats with 14-Day Free Trial of Picus Platform

Interlock Ransomware Group

Interlock is a financially motivated ransomware group first observed in September 2024. Interlock operators employ a double extortion strategy encrypting victim data and threatening to leak stolen information if ransom demands are not met.

The group has primarily targeted organizations in North America and Europe, affecting sectors ranging from business services to critical infrastructure. Victims include a mix of large enterprises and smaller organizations, reflecting an opportunistic targeting strategy.

Interlock follows an unusual ransom process. Instead of providing a ransom amount or payment details in the initial note, victims are given a unique ID and directed to a Tor-based website to initiate negotiations. The group has previously followed through on threats to publish stolen data, showing their willingness to escalate pressure on non-compliant victims.

The group's modus operandi involves compromising networks, exfiltrating sensitive data, and then deploying an encryptor tailored for virtualized environments. Interlock operators gain initial access through less common methods, such as drive-by downloads from compromised websites and a deceptive tactic known as ClickFix, which tricks users into executing malicious PowerShell payloads via fake CAPTCHA or alert prompting. After gaining access, they conduct extensive reconnaissance and deploy remote access tools like Cobalt Strike, AnyDesk, and PuTTY. Credential harvesting is facilitated through custom stealers, Lumma Stealer, and Berserk Stealer, while data exfiltration often involves AzCopy to transfer stolen files to Azure storage blobs. The final payload is typically named conhost.exe. It encrypts data using a combination of AES and RSA algorithms, appends .interlock or .1nt3rlock file extensions, and is deleted post-execution to evade detection.

Interlock Ransomware Analysis and MITRE ATT&CK TTPs

Initial Access

T1189 Drive-by Compromise

Interlock actors gain initial access by delivering malicious payloads through drive-by downloads on compromised legitimate websites. Victims are tricked into downloading disguised files, often presented as fake updates for browsers or security tools like FortiClient and Cisco AnyConnect.

T1204.004 User Execution: Malicious Copy and Paste

Using the ClickFix technique, Interlock operators prompt users to run a fake CAPTCHA, which leads them to open the Windows Run dialog and execute a malicious, Base64-encoded PowerShell script. This method depends on manual user interaction to initiate infection.

Execution

T1059.001 Command and Scripting Interpreter: PowerShell

Interlock actors execute PowerShell scripts to drop remote access trojans and perform system reconnaissance. These scripts also create persistence mechanisms, such as registry key modifications.

Persistence

T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder

Interlock operators establish persistence by placing malicious files in the Windows Startup folder or modifying registry run keys. One observed registry entry is disguised as "Chrome Updater" and triggers on user login.

Privilege Escalation

T1078.002 Valid Accounts: Domain Accounts

After gaining access, Interlock actors escalate privileges by compromising domain administrator accounts, possibly through techniques like Kerberoasting.

Defense Evasion

T1036.005 Masquerading: Match Legitimate Name or Location

Malicious components are disguised with names resembling legitimate Windows files, such as conhost.exe and conhost.txt, to blend in with normal system processes and evade detection.

T1070.004 Indicator Removal: File Deletion

Following encryption, Interlock operators use the remove() function in DLL files (e.g., tmp41.wasd) or equivalent Linux commands to delete the ransomware binary and reduce forensic evidence.

T1218.011 System Binary Proxy Execution: Rundll32

Interlock actors use rundll32.exe to execute DLL payloads indirectly, which helps bypass certain security controls and execute post-encryption cleanup.

Discovery

T1033 System Owner/User Discovery

Interlock operators use PowerShell commands like WindowsIdentity.GetCurrent() to identify the current user and determine their access level.

T1082 System Information Discovery

Commands like systeminfo and Get-PSDrive are used to collect details about the operating system, hardware, and logical drives.

T1007 System Service Discovery

Interlock actors run tasklist /svc and Get-Service to enumerate active services, which can indicate the presence of security tools or monitoring systems.

T1016 System Network Configuration Discovery

The arp -a command is used to inspect the ARP cache, helping attackers map internal network IPs and MAC addresses.

Credential Access

T1555.003 Credentials from Web Browsers

Interlock uses information stealers like Lumma and Berserk to collect login credentials stored in web browsers, enabling further access and lateral movement.

T1056.001 Input Capture: Keylogging

Keyloggers such as klg.dll are deployed to record keystrokes and store them in files like conhost.txt, enabling theft of sensitive user input.

T1558.003 Steal or Forge Kerberos Tickets: Kerberoasting

To escalate privileges, Interlock actors may perform Kerberoasting attacks to obtain Kerberos service tickets associated with high-privilege accounts.

Lateral Movement

T1078 Valid Accounts

Harvested credentials are reused to authenticate across systems within the network, enabling stealthy lateral movement.

T1021.001 Remote Services: Remote Desktop Protocol (RDP)

Interlock operators access other systems over RDP using stolen credentials. Tools like AnyDesk and PuTTY are also used to facilitate remote access and movement.

Collection

T1530 Data from Cloud Storage

Before encryption, Interlock actors use tools like Azure Storage Explorer to browse victims' cloud storage environments and identify valuable data.

Exfiltration

T1567.002 Exfiltration to Cloud Storage

Interlock operators exfiltrate data using AzCopy, which uploads files to Azure blob storage controlled by the attackers.

T1048 Exfiltration Over Alternative Protocol

File transfer tools like WinSCP are also used to move exfiltrated data out of the environment using secure copy or FTP protocols.

Command and Control

T1105 Ingress Tool Transfer

Payloads are downloaded to compromised systems using PowerShell and disguised installers. These include credential stealers and keyloggers.

T1219 Remote Access Software

Interlock operators rely on tools like AnyDesk and PuTTY to maintain persistent remote access across victim environments. Cobalt Strike, SystemBC, and custom RATs like Interlock RAT and NodeSnake RAT are used for C2 communication and post-exploitation control.

Impact

T1486 Data Encrypted for Impact

Interlock ransomware encrypts files using AES and RSA encryption algorithms. Encrypted files are given .interlock or .1nt3rlock extensions, and a ransom note (!__README__!.txt) is delivered via group policy.

How Picus Helps Simulate Interlock Ransomware Attacks?

We also strongly suggest simulating Interlock ransomware attacks to test the effectiveness of your security controls against real-life cyber attacks using the Picus Security Validation Platform. You can also test your defenses against hundreds of other ransomware variants, such as Medusa, Rhysida, and Black Basta, within minutes with a 14-day free trial of the Picus Platform.

Picus Threat Library includes the following threats for Interlock ransomware

Threat ID

Threat Name

Attack Module

21524

Interlock Ransomware Download Threat

Network Infiltration

96088

Interlock Ransomware Email Threat

Email Infiltration (Phishing)

Picus also provides actionable mitigation content. Picus Mitigation Library includes prevention signatures to address Interlock ransomware and other ransomware attacks in preventive security controls. Currently, Picus Labs has validated the following signatures for Interlock ransomware:

Security Control

Signature ID

Signature Name

Check Point NGFW

08B3EB31F


Ransomware.Win32.Interlock.TC.1df5VOTF

Check Point NGFW

09ABBFEA6

Ransomware.Linux.KeyLogger.TC.bcaeCRBq

Check Point NGFW

0C204264B

Generic.Win32.Generic.TC.d553GGkR

Check Point NGFW

0ED3EEC09

Ransomware.Linux.KeyLogger.TC.18cbZXxn

Check Point NGFW

0BDCA5EC7

Generic.Win32.Generic.TC.a91eIWYD

Check Point NGFW

09F809A53

Generic.Win32.Generic.TC.6ff7afMP

Cisco FirePower

 

Auto.E86BB8.272353.in02

Cisco FirePower

 

Auto.A26F0A.272351.in02

Cisco FirePower

 

W32.GenericKD:MalwareXgenTrj.27k2.1201

Cisco FirePower

 

Auto.4A9759.281561.in02

Cisco FirePower

 

W32.B85586F954-95.SBX.TG

Cisco FirePower

 

Auto.33DC99.281562.in02

Cisco FirePower

 

W32.Attribute.28fz.1201

Forcepoint NGFW

 

File_Malware-Blocked 

Fortigate AV

10193449

Linux/Filecoder_InterLock.A!tr 

Fortigate AV

10193896

W32/Kryptik.HXUY!tr.ransom 

Fortigate AV

10188004

W64/Filecoder_Rhysida.C!tr 

Fortigate AV

10190660

W32/Kryptik.HXUY!tr

Palo Alto

676221598

trojan/Linux.interlock.a  

Palo Alto

660282886

trojan/Win32.rhysida.r  

Palo Alto

681771457

trojan/Win32.interlock.b  

Palo Alto

701844994

Program/Win32.wacapew.fijl  

Palo Alto

715013317

trojan/Win32.interlock.e

Palo Alto

706345643

Trojan/Win32.wacatac.weql

Palo Alto

701849705

Ransom/Win32.rapidstop.d

Trellix

0x4840c900

MALWARE: Malicious File Detected by GTI

Start simulating emerging threats today and get actionable mitigation insights with a  14-day free trialof the Picus Security Validation Platform.

References

[1] "#StopRansomware: Interlock Ransomware," Cybersecurity and Infrastructure Security Agency CISA. Available: https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-203a

Table of Contents