Interlock Ransomware Targets Industries with New PHP-Based RAT

Alan V Gutnov
Alan V Gutnov

Director of Strategy

 
July 16, 2025 3 min read

Interlock Ransomware and FileFix Delivery Mechanism

Overview of FileFix Technique

FileFix is a new malware deployment technique that has emerged as a significant threat in ransomware attacks. Building on the previously known ClickFix technique, FileFix tricks users into executing commands via Windows File Explorer. Initially, victims are led to believe they are solving a legitimate problem, such as a CAPTCHA or a virus alert, prompting them to paste a seemingly harmless string into the File Explorer address bar.

Ransomware
Image courtesy of TechRadar

The command that users paste is designed to download and execute malware, specifically a PHP-based variant of the Interlock Remote Access Trojan (RAT). This technique has been noted for its ability to evade traditional antivirus solutions and Windows’ built-in protections.

Interlock Ransomware Evolution

The Interlock ransomware has evolved rapidly, with its new PHP variant being observed in widespread campaigns since May 2025. This new variant, dubbed the Interlock RAT (PHP edition), was deployed using the FileFix technique and has been linked to various industries, including healthcare and local government.

Research from The DFIR Report indicates that the Interlock RAT can gather extensive system information, enumerate Active Directory, and check for backups. The RAT's capabilities enable it to deploy the Interlock ransomware encryptor after gaining initial access.

The first detection of Interlock occurred in late September 2024, and it has since gained notoriety for employing double-extortion tactics, where sensitive data is exfiltrated before encryption. Victims of this ransomware have included notable organizations such as Wayne County, Michigan, and Texas Tech University Health Sciences Center.

Technical Details of the Interlock RAT

Upon execution, the PHP variant of the Interlock RAT immediately begins automated reconnaissance on the compromised system. It uses PowerShell commands to collect data, including:

  • System specifications
  • Running processes and services
  • Mounted drives and network details

This data is exfiltrated in JSON format back to the attackers, who can then leverage the information to understand the context of the compromise. The malware establishes a command-and-control (C2) channel using Cloudflare Tunnel, which masks the true location of the C2 server. Hard-coded IP addresses serve as fallback mechanisms to ensure continuous communication with the attackers.

Cybersecurity
Image courtesy of The Hacker News

Delivery Mechanism and Social Engineering

The FileFix technique is a sophisticated evolution of ClickFix, which previously relied on misleading users into pasting commands into the Windows Run dialog. FileFix uses a subtle approach where users are prompted to interact with a fake CAPTCHA, after which they are instructed to paste a command that executes a PowerShell script leading to the deployment of the Interlock RAT.

This method relies heavily on social engineering, making it accessible even to less experienced cybercriminals. The attackers compromise legitimate websites, injecting malicious scripts that redirect users to the fake verification pages.

Researchers warn that the simplicity and effectiveness of the FileFix method may lead to its adoption by other threat actors, emphasizing the need for increased user awareness and security training.

Summary of Interlock's Capabilities

The Interlock RAT's functionality includes:

  • Executing malicious files
  • Establishing persistence through Windows Registry modifications
  • Remote execution of commands
  • Lateral movement via Remote Desktop Protocol (RDP)

The continued evolution of the Interlock group’s tactics highlights the importance of vigilance in cybersecurity practices. Organizations are encouraged to implement user training focused on recognizing social engineering tactics and to monitor for unusual PowerShell activity.

For more information on ransomware protection strategies, visit TechRadar or Infosecurity Magazine.

Alan V Gutnov
Alan V Gutnov

Director of Strategy

 

MBA-credentialed cybersecurity expert specializing in Post-Quantum Cybersecurity solutions with proven capability to reduce attack surfaces by 90%.

Related Articles

Ransomware Attacks Target Russian Vodka and Healthcare Sectors

The Novabev Group, parent company of the Beluga vodka brand, experienced a ransomware attack on July 14, 2025, causing significant disruptions. The attack affected WineLab, the company's liquor store chain, leading to a three-day closure of over 2,000 locations in Russia. The company reported that the attack crippled its IT infrastructure, particularly point-of-sale systems and online services. Novabev Group stated, "The company maintains a principled position of rejecting any interaction with cybercriminals and refuses to fulfill their demands."

By Alan V Gutnov July 19, 2025 3 min read
Read full article

Retail Sector Faces Surge in Ransomware Attacks: A 2025 Analysis

Publicly disclosed ransomware attacks on the retail sector globally surged by 58% in Q2 2025 compared to Q1, with UK-based firms being particularly targeted, according to a report by BlackFog. This spike in attacks follows high-profile breaches affecting retailers like Marks & Spencer (M&S), The Co-op, and Harrods, attributed to the threat actor known as Scattered Spider.

By Alan V Gutnov July 19, 2025 2 min read
Read full article

AI-Driven Lcryx Ransomware Emerges in Cryptomining Botnet

A cryptomining botnet active since 2019 has incorporated a likely AI-generated ransomware known as Lcryx into its operations. Recent analysis by the FortiCNAPP team at FortiGuard Labs identified the first documented incident linking H2miner and Lcryx ransomware. This investigation focused on a cluster of virtual private servers (VPS) utilized for mining Monero.

By Edward Zhou July 19, 2025 3 min read
Read full article

Preventing ClickFix Attacks: Safeguarding Against Human Error

ClickFix is an emerging social engineering technique utilized by threat actors to exploit human error. This technique involves misleading users into executing malicious commands under the guise of providing "quick fixes" for common computer issues. Threat actors use familiar platforms and deceptive prompts to encourage victims to paste and run harmful scripts.

By Alan V Gutnov July 19, 2025 3 min read
Read full article