Meet Interlock — The new ransomware targeting FreeBSD servers

Teilen:

A relatively new ransomware operation named Interlock attacks organizations worldwide, taking the unusual approach of creating an encryptor to target FreeBSD servers.

Launched at the end of September 2024, Interlock has since claimed attacks on six organizations, publishing stolen data on their data leak site after a ransom was not paid. One of the victims is Wayne County, Michigan, which suffered a cyberattack at the beginning of October.

Not much is known about the ransomware operation, with some of the first information coming from incident responder Simo in early October, who found a new backdoor [VirusTotal] deployed in an Interlock ransomware incident.

Soon after, cybersecurity researcher MalwareHunterTeam found what was believed to be a Linux ELF encryptor [VirusTotal] for the Interlock operation. Sharing the sample with BleepingComputer, we attempted to test it on a virtual machine, where it immediately crashed.

Examining the strings within the executable indicated that it was compiled specifically for FreeBSD, with the Linux “File” command further confirming it was compiled on FreeBSD 10.4.

interlock.elf: ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, BuildID[sha1]=c7f876806bf4d3ccafbf2252e77c2a7546c301e6, for FreeBSD 10.4, FreeBSD-style, not stripped

However, even when testing the sample on a FreeBSD virtual machine, BleepingComputer was unable to get the sample to properly execute.

While it is common to see Linux encryptors created to target VMware ESXi servers and virtual machines, it is rare to see ones created for FreeBSD. The only other ransomware operation known to have created FreeBSD encryptors is the now-defunct Hive ransomware operation, which was disrupted by the FBI in 2023.

This week, researchers from cybersecurity firm Trend Micro shared on X that they found an additional sample of the FreeBSD ELF encryptor [VirusTotal] and a sample of the operation’s Windows encryptor [VirusTotal].

Trend Micro further said that the threat actors likely created a FreeBSD encryptor as the operating system is commonly used in critical infrastructure, where attacks can cause widespread disruption.

“Interlock targets FreeBSD as it’s widely utilized in servers and critical infrastructure. Attackers can disrupt vital services, demand hefty ransoms, and coerce victims into paying,” explains Trend Micro.

It goes without saying that the Interlock ransomware operation is not linked to the cryptocurrency token of the same name.

The Interlock ransomware

While BleepingComputer could not get the FreeBSD encryptor working, the Windows version ran without a problem on our virtual machine.

According to Trend Micro, the Windows encryptor will clear Windows event logs, and if self-deletion is enabled, will use a DLL to delete the main binary using rundll32.exe.

When encrypting files, the ransomware will append the .interlock extension to all encrypted file names, and create a ransom note in each folder.

Files encrypted by Interlock
Files encrypted by Interlock
Quelle: BleepingComputer

This ransom note is named !__README__!.txt and briefly describes what happened to the victim’s files, makes threats, and links to the Tor negotiation and data leak sites.

Interlock ransom note
Interlock ransom note
Quelle: BleepingComputer

Each victim has a unique “Company ID” that is used along with an email address to register on the threat actor’s Tor negotiation site. Like many other recent ransomware operations, the victim-facing negotiation site just includes a chat system that can be used to communicate with the threat actors.

Trend Micro further said that the threat actors likely created a FreeBSD encryptor as the operating system is commonly used in critical infrastructure, where attacks can cause widespread disruption.

“Interlock targets FreeBSD as it’s widely utilized in servers and critical infrastructure. Attackers can disrupt vital services, demand hefty ransoms, and coerce victims into paying,” explains Trend Micro.

It goes without saying that the Interlock ransomware operation is not linked to the cryptocurrency token of the same name.

The Interlock ransomware

While BleepingComputer could not get the FreeBSD encryptor working, the Windows version ran without a problem on our virtual machine.

According to Trend Micro, the Windows encryptor will clear Windows event logs, and if self-deletion is enabled, will use a DLL to delete the main binary using rundll32.exe.

When encrypting files, the ransomware will append the .interlock extension to all encrypted file names, and create a ransom note in each folder.

Files encrypted by Interlock
Files encrypted by Interlock
Quelle: BleepingComputer

This ransom note is named !__README__!.txt and briefly describes what happened to the victim’s files, makes threats, and links to the Tor negotiation and data leak sites.

Interlock ransom note
Interlock ransom note
Quelle: BleepingComputer

Each victim has a unique “Company ID” that is used along with an email address to register on the threat actor’s Tor negotiation site. Like many other recent ransomware operations, the victim-facing negotiation site just includes a chat system that can be used to communicate with the threat actors.

When conducting attacks, Interlock will breach a corporate network and steal data from servers while spreading laterally to other devices. When done, the threat actors deploy the ransomware to encrypt all of the files on the network.

The stolen data is used as part of a double-extortion attack, where the threat actors threaten to publicly leak it if a ransom is not paid.

BleepingComputer has learned that the ransomware operation demands ransoms ranging from hundreds of thousands of dollars to millions, depending on the size of the organization.

Lawrence Abrams

Kommentar verfassen

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit * markiert

lade-bild
London, GB
7:35 pm, Juni 28, 2025
Wetter-Symbol 28°C
L: 26° | H: 29°
klarer Himmel
Luftfeuchtigkeit: 58 %
Druck: 1024 mb
Wind: 11 mph SW
Windböe: 0 mph
UV-Index: 0
Niederschlag: 0 mm
Wolken: 2%
Regen Chance: 0%
Sichtbarkeit: 10 km
Sonnenaufgang: 4:45 am
Sonnenuntergang: 9:21 pm
TäglichStündlich
Tägliche VorhersageStündliche Vorhersage
Today 10:00 pm
Wetter-Symbol
26° | 29°°C 0 mm 0% 8 mph 62 % 1024 mb 0 mm/h
Tomorrow 10:00 pm
Wetter-Symbol
18° | 31°°C 0 mm 0% 7 mph 83 % 1025 mb 0 mm/h
Mo. Juni 30 10:00 pm
Wetter-Symbol
21° | 36°°C 1 mm 100% 8 mph 67 % 1021 mb 0 mm/h
Di. Juli 01 10:00 pm
Wetter-Symbol
21° | 32°°C 0.74 mm 74% 12 mph 73 % 1019 mb 0 mm/h
Mi. Juli 02 10:00 pm
Wetter-Symbol
17° | 25°°C 1 mm 100% 18 mph 85 % 1021 mb 0 mm/h
Today 10:00 pm
Wetter-Symbol
22° | 26°°C 0 mm 0% 8 mph 62 % 1024 mb 0 mm/h
Tomorrow 1:00 am
Wetter-Symbol
20° | 23°°C 0 mm 0% 7 mph 70 % 1025 mb 0 mm/h
Tomorrow 4:00 am
Wetter-Symbol
18° | 18°°C 0 mm 0% 5 mph 83 % 1025 mb 0 mm/h
Tomorrow 7:00 am
Wetter-Symbol
19° | 19°°C 0 mm 0% 5 mph 75 % 1025 mb 0 mm/h
Tomorrow 10:00 am
Wetter-Symbol
23° | 23°°C 0 mm 0% 5 mph 53 % 1025 mb 0 mm/h
Tomorrow 1:00 pm
Wetter-Symbol
28° | 28°°C 0 mm 0% 6 mph 40 % 1024 mb 0 mm/h
Tomorrow 4:00 pm
Wetter-Symbol
31° | 31°°C 0 mm 0% 5 mph 33 % 1023 mb 0 mm/h
Tomorrow 7:00 pm
Wetter-Symbol
30° | 30°°C 0 mm 0% 4 mph 33 % 1021 mb 0 mm/h
Name Preis24H (%)
Bitcoin(BTC)
€91,651.60
0.66%
Ethereum(ETH)
€2,081.42
1.66%
Fesseln(USDT)
€0.85
-0.01%
XRP(XRP)
€1.87
4.90%
Solana(SOL)
€128.76
6.97%
USDC(USDC)
€0.85
-0.01%
Dogecoin(DOGE)
€0.139716
3.12%
Shiba Inu(SHIB)
€0.000009
3.22%
Pepe(PEPE)
€0.000009
5.60%
Nach oben scrollen