On July 22, 2025, the Cybersecurity and Infrastructure Security Agency (CISA), Federal Bureau of Investigation (FBI), Department of Health and Human Services (HHS), and the Multi-State Information Sharing and Analysis Center (MS-ISAC) issued a joint cybersecurity advisory addressing a rapidly evolving ransomware threat: Interlock Ransomware.
This advisory is part of a broader push to bolster critical infrastructure resilience in the face of increasingly targeted and financially motivated ransomware campaigns that leverage a blend of sophisticated delivery mechanisms, extortion tactics, and novel infrastructure.
Who is Interlock Ransomware?
Interlock is a ransomware adversary focused on financial gain through double extortion — not only encrypting victim data but also threatening to leak it if ransom demands aren’t met.
According to the threat model (see below), Interlock exhibits these key tactics and capabilities:
Primary targets include:
Geographically, victims are primarily located in the United States and Europe, with observed activity aligning with sectors that have limited downtime tolerance and often weak segmentation or legacy systems.
Recent FBI investigations have uncovered active Interlock infrastructure, including:
Domains leveraging Cloudflare's temporary tunneling service:
Suspicious IPs and subnets:
Malware Hashes:
These IOCs are tied to initial access payloads and configuration files that facilitate further lateral movement, credential harvesting, and data staging.
The advisory emphasizes a multi-layered defense strategy. Key recommended actions include:
Want to see how your blue team stacks up against Interlock’s real-world tactics, techniques, and procedures (TTPs)?
We've modeled Interlock Ransomware behaviors in SCYTHE, including:
This emulation gives defenders the opportunity to:
Perfect for purple team exercises, tabletop simulations, or SOC readiness testing.
Interlock is just one example of how ransomware continues to evolve, combining stealthy initial access, evasive infrastructure, and aggressive extortion tactics. Joint advisories like this help the community stay ahead, but emulating the threat in your own environment is what brings defense to life.
If you’re serious about resilience, detection, and readiness, now is the time to test your defenses against Interlock.