Threat Actor Profile: Interlock Ransomware
Interlock, a relatively new ransomware group first observed in September 2024, has gained prominence in 2025 as an opportunistic ransomware operator. Unlike traditional Ransomware-as-a-Service models, Interlock operates without affiliates or public advertisements. The group conducts double extortion campaigns, leveraging compromised websites and multi-stage social engineering techniques to deliver payloads. Interlock's attack chain involves initial access through fake software updaters, execution of PowerShell scripts, and the use of custom remote access trojans. The group has targeted various sectors across North America and Europe, including education, healthcare, technology, and government entities. Notable attacks include the DaVita breach in April 2025 and the ransomware attack on the city of St. Paul, Minnesota in July 2025.
AI Analysis
Technical Summary
Interlock ransomware is a relatively new but increasingly prominent ransomware threat actor first observed in September 2024 and gaining significant activity in 2025. Unlike typical Ransomware-as-a-Service (RaaS) models that rely on affiliates and public recruitment, Interlock operates as a closed, self-contained group without affiliates or public advertisements, indicating a potentially more controlled and sophisticated operation. Their attack methodology involves double extortion campaigns, where data is not only encrypted but also exfiltrated to pressure victims into paying ransoms to avoid public data leaks. The initial access vector is primarily through social engineering, specifically fake software updaters that trick users into executing malicious payloads. Once inside a network, the group leverages PowerShell scripts for execution and persistence, and deploys custom remote access trojans (RATs) such as Interlock RAT, NodeSnake RAT, and SystemBC, which facilitate lateral movement, reconnaissance, and command and control (C2) communications. The use of tools like Cobalt Strike (noted as s0154) suggests advanced post-exploitation capabilities. The group targets a broad range of sectors including education, healthcare, technology, and government entities across North America and Europe, with notable incidents such as the DaVita breach and the ransomware attack on St. Paul, Minnesota. The tactics, techniques, and procedures (TTPs) employed align with MITRE ATT&CK techniques including scheduled task execution (T1053.005), PowerShell execution (T1059.001), system information discovery (T1082), and defense evasion (T1562.001). The absence of known exploits in the wild suggests that the group relies heavily on social engineering and custom malware rather than exploiting public vulnerabilities. Overall, Interlock represents a medium-severity ransomware threat with sophisticated social engineering and multi-stage attack chains that can cause significant operational disruption and data compromise.
Potential Impact
For European organizations, the Interlock ransomware threat poses a substantial risk to confidentiality, integrity, and availability of critical systems and data. The double extortion approach means that even if organizations have robust backups and can restore encrypted data, they remain vulnerable to data leaks that can damage reputation and lead to regulatory penalties under GDPR. Sectors such as healthcare and government are particularly sensitive due to the critical nature of their services and the potential impact on public safety and trust. The use of social engineering and fake software updaters increases the likelihood of successful initial compromise, especially in environments with less mature user awareness programs. The deployment of custom RATs and Cobalt Strike frameworks enables attackers to maintain persistence, escalate privileges, and move laterally, potentially compromising large parts of an organization's network before detection. This can lead to prolonged downtime, loss of sensitive data, and significant financial costs related to incident response, remediation, and potential ransom payments. Additionally, the targeting of education and technology sectors could disrupt research, intellectual property, and innovation activities within Europe. Given the geopolitical climate and the strategic importance of these sectors, European organizations must consider Interlock a credible and evolving threat.
Mitigation Recommendations
To mitigate the threat posed by Interlock ransomware, European organizations should implement a multi-layered defense strategy tailored to the group's TTPs. First, enhance user awareness training focusing on recognizing social engineering attempts, particularly fake software update prompts and unsolicited download links. Deploy application control and endpoint detection and response (EDR) solutions capable of detecting PowerShell abuse and anomalous script execution. Restrict the use of PowerShell and other scripting environments to only trusted administrators and monitor their usage closely. Implement network segmentation to limit lateral movement opportunities for attackers deploying RATs and Cobalt Strike beacons. Employ robust email filtering and web gateway solutions to block access to compromised websites used for payload delivery. Regularly audit and harden scheduled tasks and persistence mechanisms to detect unauthorized modifications. Maintain offline, immutable backups and test restoration procedures frequently to ensure resilience against encryption. Additionally, deploy threat hunting and anomaly detection to identify early signs of compromise, such as unusual network traffic patterns or new service creations. Finally, establish incident response plans that include procedures for double extortion scenarios, including legal and communication strategies to handle potential data leaks.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Belgium, Sweden, Poland
Indicators of Compromise
- ip: 216.245.184.181
- ip: 45.61.136.202
- hash: 7a5af6b8cc4b94cf0af8ae8bd56224f3
- hash: b0eeed515eea64dd38d48a17a26d75ae
- hash: de87dbf8445090ff7c92648094bbbcde
- hash: 25971efd02c0cb95889a76f30257551c13a03f55
- hash: 6b4bdffdd5734842120e1772d1c81ee7bd99c2f1
- hash: 9256cc0ec4607becf8e72d6d416bf9e6da0e03dd
- hash: a8a2086b5994bc84365e4fc7e9d21c4ff2b992cd
- hash: b49707615290ffc5baa2d02c3b5d22574a953b50
- hash: bd19b3ccfb5220b53acff5474a7f63b95775a2c7
- hash: 0b47e53f2ada0555588aa8a6a4491e14d7b2528c9a829ebb6f7e9463963cd0e4
- hash: 0dd67fa3129acbf191eeb683fb164074cc1ba5d7bce286e0cc5ad47cc0bbcef0
- hash: 2acaa9856ee58537c06cc2858fd71b860f53219504e6756faa3812019b5df5a6
- hash: 3e4407dfd827714a66e25c2baccefd915233eeec8fb093257e458f4153778bee
- hash: 60d95d385e76bb83d38d713887d2fa311b4ecd9c5013882cd648afdeeb5dc7c3
- hash: 61d092e5c7c8200377a8bd9c10288c2766186a11153dcaa04ae9d1200db7b1c5
- hash: 6b72706fe0a0d2192d578e9e754d0e3f5715154a41bd18f80b32adcffad26522
- hash: 7501623230eef2f6125dcf5b5d867991bdf333d878706d77c1690b632195c3ff
- hash: b28a9062100a7fbf0f65dbb23db319717c4e613e890d0a3f1ae27ec6e34cf35a
- hash: e40e82b77019edca06c7760b6133c6cc481d9a22585dd80bce393f0bfbe47a99
- hash: fcdbe8f6204919f94fd57309806f5609ae88ae1bbd000d6226f25d2200cf6d47
- ip: 177.136.225.135
- ip: 193.149.180.58
- domain: fake-domain-1892572220.com
- domain: basiclock.cc
- domain: dijoin.org
- domain: playiro.net
- domain: doriot.info
- domain: kingrouder.tech
- domain: peasplecore.net
- domain: dashes.cc
- domain: nettixx.com
Threat Actor Profile: Interlock Ransomware
Description
Interlock, a relatively new ransomware group first observed in September 2024, has gained prominence in 2025 as an opportunistic ransomware operator. Unlike traditional Ransomware-as-a-Service models, Interlock operates without affiliates or public advertisements. The group conducts double extortion campaigns, leveraging compromised websites and multi-stage social engineering techniques to deliver payloads. Interlock's attack chain involves initial access through fake software updaters, execution of PowerShell scripts, and the use of custom remote access trojans. The group has targeted various sectors across North America and Europe, including education, healthcare, technology, and government entities. Notable attacks include the DaVita breach in April 2025 and the ransomware attack on the city of St. Paul, Minnesota in July 2025.
AI-Powered Analysis
Technical Analysis
Interlock ransomware is a relatively new but increasingly prominent ransomware threat actor first observed in September 2024 and gaining significant activity in 2025. Unlike typical Ransomware-as-a-Service (RaaS) models that rely on affiliates and public recruitment, Interlock operates as a closed, self-contained group without affiliates or public advertisements, indicating a potentially more controlled and sophisticated operation. Their attack methodology involves double extortion campaigns, where data is not only encrypted but also exfiltrated to pressure victims into paying ransoms to avoid public data leaks. The initial access vector is primarily through social engineering, specifically fake software updaters that trick users into executing malicious payloads. Once inside a network, the group leverages PowerShell scripts for execution and persistence, and deploys custom remote access trojans (RATs) such as Interlock RAT, NodeSnake RAT, and SystemBC, which facilitate lateral movement, reconnaissance, and command and control (C2) communications. The use of tools like Cobalt Strike (noted as s0154) suggests advanced post-exploitation capabilities. The group targets a broad range of sectors including education, healthcare, technology, and government entities across North America and Europe, with notable incidents such as the DaVita breach and the ransomware attack on St. Paul, Minnesota. The tactics, techniques, and procedures (TTPs) employed align with MITRE ATT&CK techniques including scheduled task execution (T1053.005), PowerShell execution (T1059.001), system information discovery (T1082), and defense evasion (T1562.001). The absence of known exploits in the wild suggests that the group relies heavily on social engineering and custom malware rather than exploiting public vulnerabilities. Overall, Interlock represents a medium-severity ransomware threat with sophisticated social engineering and multi-stage attack chains that can cause significant operational disruption and data compromise.
Potential Impact
For European organizations, the Interlock ransomware threat poses a substantial risk to confidentiality, integrity, and availability of critical systems and data. The double extortion approach means that even if organizations have robust backups and can restore encrypted data, they remain vulnerable to data leaks that can damage reputation and lead to regulatory penalties under GDPR. Sectors such as healthcare and government are particularly sensitive due to the critical nature of their services and the potential impact on public safety and trust. The use of social engineering and fake software updaters increases the likelihood of successful initial compromise, especially in environments with less mature user awareness programs. The deployment of custom RATs and Cobalt Strike frameworks enables attackers to maintain persistence, escalate privileges, and move laterally, potentially compromising large parts of an organization's network before detection. This can lead to prolonged downtime, loss of sensitive data, and significant financial costs related to incident response, remediation, and potential ransom payments. Additionally, the targeting of education and technology sectors could disrupt research, intellectual property, and innovation activities within Europe. Given the geopolitical climate and the strategic importance of these sectors, European organizations must consider Interlock a credible and evolving threat.
Mitigation Recommendations
To mitigate the threat posed by Interlock ransomware, European organizations should implement a multi-layered defense strategy tailored to the group's TTPs. First, enhance user awareness training focusing on recognizing social engineering attempts, particularly fake software update prompts and unsolicited download links. Deploy application control and endpoint detection and response (EDR) solutions capable of detecting PowerShell abuse and anomalous script execution. Restrict the use of PowerShell and other scripting environments to only trusted administrators and monitor their usage closely. Implement network segmentation to limit lateral movement opportunities for attackers deploying RATs and Cobalt Strike beacons. Employ robust email filtering and web gateway solutions to block access to compromised websites used for payload delivery. Regularly audit and harden scheduled tasks and persistence mechanisms to detect unauthorized modifications. Maintain offline, immutable backups and test restoration procedures frequently to ensure resilience against encryption. Additionally, deploy threat hunting and anomaly detection to identify early signs of compromise, such as unusual network traffic patterns or new service creations. Finally, establish incident response plans that include procedures for double extortion scenarios, including legal and communication strategies to handle potential data leaks.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://arcticwolf.com/resources/blog/threat-actor-profile-interlock-ransomware"]
- Adversary
- Interlock
- Pulse Id
- 689f8d13d92fa7802f9dd44a
- Threat Score
- null
Indicators of Compromise
Ip
Value | Description | Copy |
---|---|---|
ip216.245.184.181 | — | |
ip45.61.136.202 | — | |
ip177.136.225.135 | — | |
ip193.149.180.58 | — |
Hash
Value | Description | Copy |
---|---|---|
hash7a5af6b8cc4b94cf0af8ae8bd56224f3 | — | |
hashb0eeed515eea64dd38d48a17a26d75ae | — | |
hashde87dbf8445090ff7c92648094bbbcde | — | |
hash25971efd02c0cb95889a76f30257551c13a03f55 | — | |
hash6b4bdffdd5734842120e1772d1c81ee7bd99c2f1 | — | |
hash9256cc0ec4607becf8e72d6d416bf9e6da0e03dd | — | |
hasha8a2086b5994bc84365e4fc7e9d21c4ff2b992cd | — | |
hashb49707615290ffc5baa2d02c3b5d22574a953b50 | — | |
hashbd19b3ccfb5220b53acff5474a7f63b95775a2c7 | — | |
hash0b47e53f2ada0555588aa8a6a4491e14d7b2528c9a829ebb6f7e9463963cd0e4 | — | |
hash0dd67fa3129acbf191eeb683fb164074cc1ba5d7bce286e0cc5ad47cc0bbcef0 | — | |
hash2acaa9856ee58537c06cc2858fd71b860f53219504e6756faa3812019b5df5a6 | — | |
hash3e4407dfd827714a66e25c2baccefd915233eeec8fb093257e458f4153778bee | — | |
hash60d95d385e76bb83d38d713887d2fa311b4ecd9c5013882cd648afdeeb5dc7c3 | — | |
hash61d092e5c7c8200377a8bd9c10288c2766186a11153dcaa04ae9d1200db7b1c5 | — | |
hash6b72706fe0a0d2192d578e9e754d0e3f5715154a41bd18f80b32adcffad26522 | — | |
hash7501623230eef2f6125dcf5b5d867991bdf333d878706d77c1690b632195c3ff | — | |
hashb28a9062100a7fbf0f65dbb23db319717c4e613e890d0a3f1ae27ec6e34cf35a | — | |
hashe40e82b77019edca06c7760b6133c6cc481d9a22585dd80bce393f0bfbe47a99 | — | |
hashfcdbe8f6204919f94fd57309806f5609ae88ae1bbd000d6226f25d2200cf6d47 | — |
Domain
Value | Description | Copy |
---|---|---|
domainfake-domain-1892572220.com | — | |
domainbasiclock.cc | — | |
domaindijoin.org | — | |
domainplayiro.net | — | |
domaindoriot.info | — | |
domainkingrouder.tech | — | |
domainpeasplecore.net | — | |
domaindashes.cc | — | |
domainnettixx.com | — |
Threat ID: 689f9976ad5a09ad007098ab
Added to database: 8/15/2025, 8:32:54 PM
Last enriched: 8/15/2025, 8:47:50 PM
Last updated: 8/16/2025, 12:32:39 AM
Views: 4
Related Threats
ThreatFox IOCs for 2025-08-15
MediumColt Telecom attack claimed by WarLock ransomware, data up for sale
HighBuilding a Free Library for Phishing & Security Awareness Training — Looking for Feedback!
Low'Blue Locker' Analysis: Ransomware Targeting Oil & Gas Sector in Pakistan
MediumKawabunga, Dude, You've Been Ransomed!
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.