Close Menu
  • Home
  • AI
  • Big Data
  • Cloud Computing
  • iOS Development
  • IoT
  • IT/ Cybersecurity
  • Tech
    • Nanotechnology
    • Green Technology
    • Apple
    • Software Development
    • Software Engineering

Subscribe to Updates

Get the latest technology news from Bigteetechhub about IT, Cybersecurity and Big Data.

    What's Hot

    Royal Mail and Loganair launch UK’s first electric mail flights across Scotland

    March 31, 2026

    This Homemade Machine Winds Large BLDC Motors

    March 31, 2026

    How agentic software development will change databases

    March 31, 2026
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram
    Big Tee Tech Hub
    • Home
    • AI
    • Big Data
    • Cloud Computing
    • iOS Development
    • IoT
    • IT/ Cybersecurity
    • Tech
      • Nanotechnology
      • Green Technology
      • Apple
      • Software Development
      • Software Engineering
    Big Tee Tech Hub
    Home»IT/ Cybersecurity»Interlock ransomware gang pushes fake IT tools in ClickFix attacks
    IT/ Cybersecurity

    Interlock ransomware gang pushes fake IT tools in ClickFix attacks

    big tee tech hubBy big tee tech hubApril 19, 2025013 Mins Read
    Share Facebook Twitter Pinterest Copy Link LinkedIn Tumblr Email Telegram WhatsApp
    Follow Us
    Google News Flipboard
    Interlock ransomware gang pushes fake IT tools in ClickFix attacks
    Share
    Facebook Twitter LinkedIn Pinterest Email Copy Link


    Interlock ransomware gang pushes fake IT tools in ClickFix attacks

    The Interlock ransomware gang now uses ClickFix attacks that impersonate IT tools to breach corporate networks and deploy file-encrypting malware on devices.

    ClickFix is a social engineering tactic where victims are tricked into executing dangerous PowerShell commands on their systems to supposedly fix an error or verify themselves, resulting in the installation of malware.

    Though this isn’t the first time ClickFix has been linked to ransomware infections, confirmation about Interlock shows an increasing trend in these types of threat actors utilizing the tactic.

    Interlock is a ransomware operation launched in late September 2024, targeting FreeBSD servers and Windows systems.

    Interlock is not believed to operate as a ransomware-as-a-service model. Still, it maintains a data leak portal on the dark web to increase pressure on victims, demanding payments ranging from hundreds of thousands of dollars to millions.

    From ClickFix to ransomware

    In the past, Interlock utilized fake browser and VPN client updates to install malware and breach networks.

    According to Sekoia researchers, the Interlock ransomware gang began utilizing ClickFix attacks in January 2025.

    Interlock used at least four URLs to host fake CAPTCHA prompts that tell visitors to execute a command on their computer to verify themselves and download a promoted tool.

    The researchers say they detected the malicious captcha on four different sites, mimicking Microsoft or Advanced IP Scanner portals:

    • microsoft-msteams[.]com/additional-check.html
    • microstteams[.]com/additional-check.html
    • ecologilives[.]com/additional-check.html
    • advanceipscaner[.]com/additional-check.html

    However, only the site impersonating Advanced IP Scanner, a popular IP scanning tool commonly used by IT staff, led to downloading a malicious installer.

    Page hosting Interlock's ClickFix bait
    Page hosting Interlock’s ClickFix bait
    Source: Sekoia

    Clicking the ‘Fix it’ button copies the malicious PowerShell command to the victim’s clipboard. If executed in a command prompt or Windows Run dialog, it will download a 36MB PyInstaller payload.

    At the same time, the legitimate AdvanceIPScanner website opens in a browser window to reduce suspicion.

    The malicious payload installs a legitimate copy of the software it pretends to be and simultaneously executes an embedded PowerShell script that runs in a hidden window.

    This script registers a Run key in Windows Registry for persistence and then collects and exfiltrates system info including OS version, user privilege level, running processes, and available drives.

    Sekoia has observed the command and control (C2) responding with various payloads, including LummaStealer, BerserkStealer, keyloggers, and the Interlock RAT.

    The latter is a simple trojan that can be dynamically configured, supporting file exfiltration, shell command execution, and running malicious DLLs.

    Commands Interlock RAT supports
    Commands Interlock RAT supports
    Source: Sekoia

    After the initial compromise and RAT deployment, Interlock operators used stolen credentials to move laterally via RDP, while Sekoia also saw PuTTY, AnyDesk, and LogMeIn used in some attacks.

    The last step before the ransomware execution is data exfiltration, with the stolen files uploaded to attacker-controlled Azure Blobs.

    The Windows variant of Interlock is set (via a scheduled task) to run daily at 08:00 PM, but thanks to file extension-based filtering, this doesn’t cause multiple layers of encryption but serves as a redundancy measure.

    Sekoia also reports that the ransom note has evolved, too, with the latest versions focusing more on the legal aspect of the data breach and the regulatory consequences if stolen data is made public.

    Interlock's latest ransom note
    Interlock’s latest ransom note
    Source: BleepingComputer

    ClickFix attacks have now been adopted by a wide range of threat actors, including other ransomware gangs and North Korean hackers.

    Last month, Sekoia discovered that the infamous Lazarus North Korean hacking group was using ClickFix attacks targeting job seekers in the cryptocurrency industry.



    Source link

    Attacks ClickFix Fake gang Interlock pushes Ransomware Tools
    Follow on Google News Follow on Flipboard
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
    tonirufai
    big tee tech hub
    • Website

    Related Posts

    Healthcare tech firm CareCloud says hackers stole patient data

    March 31, 2026

    Three China-Linked Clusters Target Southeast Asian Government in 2025 Cyber Campaign

    March 30, 2026

    Microsoft Patch Tuesday, March 2026 Edition – Krebs on Security

    March 29, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Editors Picks

    Royal Mail and Loganair launch UK’s first electric mail flights across Scotland

    March 31, 2026

    This Homemade Machine Winds Large BLDC Motors

    March 31, 2026

    How agentic software development will change databases

    March 31, 2026

    Healthcare tech firm CareCloud says hackers stole patient data

    March 31, 2026
    About Us
    About Us

    Welcome To big tee tech hub. Big tee tech hub is a Professional seo tools Platform. Here we will provide you only interesting content, which you will like very much. We’re dedicated to providing you the best of seo tools, with a focus on dependability and tools. We’re working to turn our passion for seo tools into a booming online website. We hope you enjoy our seo tools as much as we enjoy offering them to you.

    Don't Miss!

    Royal Mail and Loganair launch UK’s first electric mail flights across Scotland

    March 31, 2026

    This Homemade Machine Winds Large BLDC Motors

    March 31, 2026

    Subscribe to Updates

    Get the latest technology news from Bigteetechhub about IT, Cybersecurity and Big Data.

      • About Us
      • Contact Us
      • Disclaimer
      • Privacy Policy
      • Terms and Conditions
      © 2026 bigteetechhub.All Right Reserved

      Type above and press Enter to search. Press Esc to cancel.