Interlock ransomware just keeps getting more powerful – here’s how to stay safe

  • Interlock ransomware reached operational maturity, now targeting healthcare, government, and manufacturing sectors
  • It supports multi-platform attacks, cloud-based C2, full lifecycle automation
  • Forescout urges early detection, behavioral analysis, and access controls to reduce risk

Interlock ransomware is no longer a mid-tier credentials stealer. It is now a highly sophisticated, cloud-enabled, multi-platform ransomware enterprise with its own affiliates, automation, and professionalized operations.

This is according to a new report from security researchers Forescout, who have been tracking Interlock since its inception in mid-2024.

In the report, Forescout says Interlock entered “operational maturity” (phase 3) in February 2025, becoming capable of attacking high-value targets in sectors like healthcare, government, and manufacturing.

Operational maturity stage

In the operational maturity stage, Interlock began performing like a business platform, allowing affiliates or partner groups to conduct attacks under its name. It also integrated a full attack lifecycle, no longer relying on fragmented, or experimental methods. Everything from initial access and lateral movement, to encryption and data exfiltration, can be done through Interlock.

The ransomware was expanded to target not just Windows, but also Linux, BSD, and VMware ESXi servers, and now uses legitimate cloud services for command-and-control (C2) and data exfiltration, including Cloudflare tunnels and Azure’s AzCopy utility.

It shifted from fake update pages to impersonating business software such as FortiClient, or Cisco AnyConnect, and adopted new social-engineering lures like ClickFix and FileFix. The maintainers purchased credentials from initial access brokers, obtaining them immediate privileged access. They then used tools like Cobalt Strike, SystemBC, Putty, PsExec, and Posh-SSH to move laterally and control systems across networks.

The malicious platform has also improved its persistence and stealth, and now exploits cloud for data theft. Its ransom notes have become more professional-sounding, and other communications now more resemble corporate “incident alerts”, Forescout added. Now, the focus is on negotiation efficiency:

“The communication tone is characteristic of business-focused ransomware operations with emphasis on this being a “security alert” rather than a disruption, though messages emphasize consequences of nonpayment including legal liability for customer data exposure and regulatory penalties under GDPR, HIPAA, or other frameworks,” the report stressed.

To defend against Interlock, Forescout recommends focusing on detecting the ransomware’s behavior early, and reducing the attack surface. That includes using risk-based, conditional access policies, implementing behavioral analysis, monitoring PowerShell activity, hunting for anomalies in authentication logs, and watching for signs of lateral movement.

Follow TechRadar on Google News and add us as a preferred source to get our expert news, reviews, and opinion in your feeds. Make sure to click the Follow button!

And of course you can also follow TechRadar on TikTok for news, reviews, unboxings in video form, and get regular updates from us on WhatsApp too.

You might also like

Read more @ TechRadar

Latest posts

Old-school platforming, Metroidvania horror and other new indie games worth checking out

Welcome to our latest roundup of what's going on in the indie game space. As ever, it's been a busy week of new games...

Italy vs South Africa free streams: How to watch Autumn International 2025 rugby from anywhere, TV channel, preview

Italy vs South Africa: Saturday, November 15 at 12.40pm GMT / 7.40am ETStream on Peacock (US) and TNT Sports (UK)Unlock your stream with NordVPN's...

Remote work and the big breaches of 2025: Cause or convenient excuse?

It’s an easy story. People at home, less control, more entry points and therefore more breaches. But the reality is not so transparent. Remote...

Don’t splash the cash! Here are 23 cheap and cheerful early Black Friday deals to grab this weekend

Black Friday officially kicks off on November 28, but deals are already available. Yet you may be a little reticent when it comes to...

This new Netflix movie is a dream come true for its director – here’s what inspired the animated adventure In Your Dreams

From Wall-E to the Incredibles 2, Alex Woo has worked in the art department of some of Pixar's biggest films, and now the animator...

The ransomware payment debate: what it means for organizations

Ransomware is on the rise, and with it comes the renewed debate around ransomware payments.Hackers are increasingly using ransomware as an attack strategy, seeking...

5 things we want from the iPhone 18 and iPhone 18 Pro

With the iPhone 17 series Apple made some major upgrades, including whole new designs, new cameras, and more. But there’s still room for improvement.That’s...

Disney is back on YouTube TV after a new deal is agreed – and subscribers should see live channels coming back now

YouTube TV and Disney have settled their differencesDisney channels are now returning to YouTube TVThe two companies have signed a new multi-year dealAfter a...

Fluance’s chic powered bookshelf speakers offer impressively detailed, almost neutral sound – with very few drawbacks

Fluance Ri71: Two-minute reviewIf you’ve looked into mid-range speakers from Fluance like the Fluance Ri71 powered speakers reviewed here, you’ll see people talk about...

ICYMI: the week’s 7 biggest tech stories from iPhone Pockets to Steam’s new hardware

What's this week's biggest tech news announcement? Is it the Steam Machine, Valve's impressive new gaming machine, or the iPhone Pocket, a sock for...