Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Interlock Ransomware Targeting Businesses

0
Medium
Published: Fri Aug 29 2025 (08/29/2025, 20:20:00 UTC)
Source: AlienVault OTX General

Description

The Interlock ransomware group has been actively targeting businesses and critical infrastructures in North America and Europe since September 2024. Their ransomware employs AES-256-GCM encryption with RSA-4096 key protection, leveraging the OpenSSL library for efficient file encryption. The malware includes code obfuscation techniques and specific arguments for various behaviors. It excludes certain folders, file extensions, and files from encryption to avoid system damage. The ransomware changes file extensions to '.!NT3RLOCK' and may terminate processes during encryption. Interlock's operations involve data theft and public disclosure threats for ransom leverage. The group utilizes a Tor-based negotiation site and references legal regulations to pressure victims. To counter this threat, offsite data backups and regular recovery drills are recommended.

AI-Powered Analysis

AILast updated: 09/01/2025, 08:47:48 UTC

Technical Analysis

The Interlock ransomware group has been actively targeting businesses and critical infrastructure sectors across North America and Europe since September 2024. This ransomware employs strong cryptographic techniques, specifically AES-256-GCM for symmetric encryption of files combined with RSA-4096 for key protection, leveraging the OpenSSL library to efficiently perform encryption operations. The malware is designed with code obfuscation to evade detection and analysis, and it accepts specific command-line arguments to modify its behavior during execution. Notably, it excludes certain folders, file extensions, and files from encryption to avoid system instability or damage, which is a tactic often used to maintain system operability and increase the likelihood of ransom payment. During the encryption process, Interlock ransomware changes the file extensions to '.!NT3RLOCK' and may forcibly terminate processes to unlock files for encryption. Beyond encrypting data, the group exfiltrates sensitive information and threatens public disclosure to coerce victims into paying ransom, a double extortion tactic that increases pressure on targeted organizations. Communication and ransom negotiations are conducted via a Tor-based hidden service, enhancing the attackers' anonymity. The group also references legal regulations in their communications to intimidate victims and justify their demands. While no known exploits in the wild have been reported for initial infection vectors, the ransomware’s operational sophistication and targeting of critical infrastructure highlight its threat level. The recommended defensive measures include maintaining offsite backups and conducting regular recovery drills to ensure rapid restoration of systems in case of infection.

Potential Impact

For European organizations, the Interlock ransomware poses significant risks to confidentiality, integrity, and availability of critical business data and operational systems. The use of strong encryption algorithms and key protection mechanisms means that without backups or decryption keys, data recovery is virtually impossible. The double extortion tactic—data theft combined with encryption—exposes organizations to reputational damage, regulatory penalties under GDPR for data breaches, and potential operational disruptions. Critical infrastructure sectors, such as energy, healthcare, and transportation, are particularly vulnerable due to their essential services and potential cascading effects on public safety and economic stability. The threat of public data disclosure increases the risk of intellectual property loss and customer trust erosion. The ransomware’s ability to terminate processes can disrupt ongoing operations and cause downtime. European organizations may also face legal and compliance challenges, as attackers reference legal regulations to pressure victims, complicating incident response and ransom negotiation strategies.

Mitigation Recommendations

Beyond standard recommendations, European organizations should implement the following specific measures: 1) Conduct thorough network segmentation to limit ransomware lateral movement, especially isolating critical infrastructure systems. 2) Deploy advanced endpoint detection and response (EDR) solutions capable of detecting code obfuscation and process termination attempts characteristic of Interlock ransomware. 3) Regularly audit and restrict administrative privileges to reduce the risk of privilege escalation and ransomware deployment. 4) Implement strict application whitelisting to prevent execution of unauthorized binaries, including those with known hashes associated with Interlock. 5) Monitor network traffic for connections to Tor networks or unusual outbound encrypted traffic indicative of ransomware communication. 6) Maintain immutable, offline backups with frequent recovery testing to ensure data integrity and availability. 7) Develop and rehearse incident response plans that include legal and regulatory considerations, given the attackers’ use of legal references in negotiations. 8) Educate employees on phishing and social engineering tactics, as initial infection vectors often exploit human factors. 9) Collaborate with national cybersecurity agencies and share threat intelligence to stay updated on emerging tactics and indicators of compromise related to Interlock.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://asec.ahnlab.com/en/89912"]
Adversary
Interlock
Pulse Id
68b20b7055ffeacc23cb94c9
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash3104efb23ea174ac5eda9f5fd0e8c077
hash33d8eabbf428fef8c5cd50b440ee3d07
hash6c3b2558fc8cfcb2751437b6e5cdeb6f
hash9451420233168c7b0c595257d43c7b85
hashc6d1d360b62c59624549d6a59c5acb59
hasha8007339971f9ab233b5f73155f2f5035e7cdac6
hashb5f5c4fa7a76b942030d3fb1e807e63cb9c30f4b
hashd5891134109b9c3f8ec0050465f7325c26f0793e
hashe1265333feb2d7648ae50253f24c6278fe148471
hashe31cc32a226ed740dbafc838ac4fe9eaeb12955b
hash0fff8fb05cee8dc4a4f7a8f23fa2d67571f360a3025b6d515f9ef37dfdb4e2ea
hash4a97599ff5823166112d9221d0e824af7896f6ca40cd3948ec129533787a3ea9
hash69096579b4823930defc5b3ae5599d93626669de7fb1a810a274867cc140c844
hash9ca2b9e82846c819eb11b65d9ebe9ab51250a1407e7fc93c56c0e308719f260f
hashb85586f95412bc69f3dceb0539f27c79c74e318b249554f0eace45f3f073c039

Threat ID: 68b55a26ad5a09ad00cb9af5

Added to database: 9/1/2025, 8:32:38 AM

Last enriched: 9/1/2025, 8:47:48 AM

Last updated: 10/19/2025, 9:25:45 AM

Views: 46

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats