Skip to main content

Threat Actor Profile: Interlock Ransomware

Medium
Published: Fri Aug 15 2025 (08/15/2025, 19:40:03 UTC)
Source: AlienVault OTX General

Description

Interlock, a relatively new ransomware group first observed in September 2024, has gained prominence in 2025 as an opportunistic ransomware operator. Unlike traditional Ransomware-as-a-Service models, Interlock operates without affiliates or public advertisements. The group conducts double extortion campaigns, leveraging compromised websites and multi-stage social engineering techniques to deliver payloads. Interlock's attack chain involves initial access through fake software updaters, execution of PowerShell scripts, and the use of custom remote access trojans. The group has targeted various sectors across North America and Europe, including education, healthcare, technology, and government entities. Notable attacks include the DaVita breach in April 2025 and the ransomware attack on the city of St. Paul, Minnesota in July 2025.

AI-Powered Analysis

AILast updated: 08/15/2025, 20:47:50 UTC

Technical Analysis

Interlock ransomware is a relatively new but increasingly prominent ransomware threat actor first observed in September 2024 and gaining significant activity in 2025. Unlike typical Ransomware-as-a-Service (RaaS) models that rely on affiliates and public recruitment, Interlock operates as a closed, self-contained group without affiliates or public advertisements, indicating a potentially more controlled and sophisticated operation. Their attack methodology involves double extortion campaigns, where data is not only encrypted but also exfiltrated to pressure victims into paying ransoms to avoid public data leaks. The initial access vector is primarily through social engineering, specifically fake software updaters that trick users into executing malicious payloads. Once inside a network, the group leverages PowerShell scripts for execution and persistence, and deploys custom remote access trojans (RATs) such as Interlock RAT, NodeSnake RAT, and SystemBC, which facilitate lateral movement, reconnaissance, and command and control (C2) communications. The use of tools like Cobalt Strike (noted as s0154) suggests advanced post-exploitation capabilities. The group targets a broad range of sectors including education, healthcare, technology, and government entities across North America and Europe, with notable incidents such as the DaVita breach and the ransomware attack on St. Paul, Minnesota. The tactics, techniques, and procedures (TTPs) employed align with MITRE ATT&CK techniques including scheduled task execution (T1053.005), PowerShell execution (T1059.001), system information discovery (T1082), and defense evasion (T1562.001). The absence of known exploits in the wild suggests that the group relies heavily on social engineering and custom malware rather than exploiting public vulnerabilities. Overall, Interlock represents a medium-severity ransomware threat with sophisticated social engineering and multi-stage attack chains that can cause significant operational disruption and data compromise.

Potential Impact

For European organizations, the Interlock ransomware threat poses a substantial risk to confidentiality, integrity, and availability of critical systems and data. The double extortion approach means that even if organizations have robust backups and can restore encrypted data, they remain vulnerable to data leaks that can damage reputation and lead to regulatory penalties under GDPR. Sectors such as healthcare and government are particularly sensitive due to the critical nature of their services and the potential impact on public safety and trust. The use of social engineering and fake software updaters increases the likelihood of successful initial compromise, especially in environments with less mature user awareness programs. The deployment of custom RATs and Cobalt Strike frameworks enables attackers to maintain persistence, escalate privileges, and move laterally, potentially compromising large parts of an organization's network before detection. This can lead to prolonged downtime, loss of sensitive data, and significant financial costs related to incident response, remediation, and potential ransom payments. Additionally, the targeting of education and technology sectors could disrupt research, intellectual property, and innovation activities within Europe. Given the geopolitical climate and the strategic importance of these sectors, European organizations must consider Interlock a credible and evolving threat.

Mitigation Recommendations

To mitigate the threat posed by Interlock ransomware, European organizations should implement a multi-layered defense strategy tailored to the group's TTPs. First, enhance user awareness training focusing on recognizing social engineering attempts, particularly fake software update prompts and unsolicited download links. Deploy application control and endpoint detection and response (EDR) solutions capable of detecting PowerShell abuse and anomalous script execution. Restrict the use of PowerShell and other scripting environments to only trusted administrators and monitor their usage closely. Implement network segmentation to limit lateral movement opportunities for attackers deploying RATs and Cobalt Strike beacons. Employ robust email filtering and web gateway solutions to block access to compromised websites used for payload delivery. Regularly audit and harden scheduled tasks and persistence mechanisms to detect unauthorized modifications. Maintain offline, immutable backups and test restoration procedures frequently to ensure resilience against encryption. Additionally, deploy threat hunting and anomaly detection to identify early signs of compromise, such as unusual network traffic patterns or new service creations. Finally, establish incident response plans that include procedures for double extortion scenarios, including legal and communication strategies to handle potential data leaks.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://arcticwolf.com/resources/blog/threat-actor-profile-interlock-ransomware"]
Adversary
Interlock
Pulse Id
689f8d13d92fa7802f9dd44a
Threat Score
null

Indicators of Compromise

Ip

ValueDescriptionCopy
ip216.245.184.181
ip45.61.136.202
ip177.136.225.135
ip193.149.180.58

Hash

ValueDescriptionCopy
hash7a5af6b8cc4b94cf0af8ae8bd56224f3
hashb0eeed515eea64dd38d48a17a26d75ae
hashde87dbf8445090ff7c92648094bbbcde
hash25971efd02c0cb95889a76f30257551c13a03f55
hash6b4bdffdd5734842120e1772d1c81ee7bd99c2f1
hash9256cc0ec4607becf8e72d6d416bf9e6da0e03dd
hasha8a2086b5994bc84365e4fc7e9d21c4ff2b992cd
hashb49707615290ffc5baa2d02c3b5d22574a953b50
hashbd19b3ccfb5220b53acff5474a7f63b95775a2c7
hash0b47e53f2ada0555588aa8a6a4491e14d7b2528c9a829ebb6f7e9463963cd0e4
hash0dd67fa3129acbf191eeb683fb164074cc1ba5d7bce286e0cc5ad47cc0bbcef0
hash2acaa9856ee58537c06cc2858fd71b860f53219504e6756faa3812019b5df5a6
hash3e4407dfd827714a66e25c2baccefd915233eeec8fb093257e458f4153778bee
hash60d95d385e76bb83d38d713887d2fa311b4ecd9c5013882cd648afdeeb5dc7c3
hash61d092e5c7c8200377a8bd9c10288c2766186a11153dcaa04ae9d1200db7b1c5
hash6b72706fe0a0d2192d578e9e754d0e3f5715154a41bd18f80b32adcffad26522
hash7501623230eef2f6125dcf5b5d867991bdf333d878706d77c1690b632195c3ff
hashb28a9062100a7fbf0f65dbb23db319717c4e613e890d0a3f1ae27ec6e34cf35a
hashe40e82b77019edca06c7760b6133c6cc481d9a22585dd80bce393f0bfbe47a99
hashfcdbe8f6204919f94fd57309806f5609ae88ae1bbd000d6226f25d2200cf6d47

Domain

ValueDescriptionCopy
domainfake-domain-1892572220.com
domainbasiclock.cc
domaindijoin.org
domainplayiro.net
domaindoriot.info
domainkingrouder.tech
domainpeasplecore.net
domaindashes.cc
domainnettixx.com

Threat ID: 689f9976ad5a09ad007098ab

Added to database: 8/15/2025, 8:32:54 PM

Last enriched: 8/15/2025, 8:47:50 PM

Last updated: 8/16/2025, 12:32:39 AM

Views: 4

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats