Meet Interlock — The new ransomware targeting FreeBSD servers

Share:

A relatively new ransomware operation named Interlock attacks organizations worldwide, taking the unusual approach of creating an encryptor to target FreeBSD servers.

Launched at the end of September 2024, Interlock has since claimed attacks on six organizations, publishing stolen data on their data leak site after a ransom was not paid. One of the victims is Wayne County, Michigan, which suffered a cyberattack at the beginning of October.

Not much is known about the ransomware operation, with some of the first information coming from incident responder Simo in early October, who found a new backdoor [VirusTotal] deployed in an Interlock ransomware incident.

Soon after, cybersecurity researcher MalwareHunterTeam found what was believed to be a Linux ELF encryptor [VirusTotal] for the Interlock operation. Sharing the sample with BleepingComputer, we attempted to test it on a virtual machine, where it immediately crashed.

Examining the strings within the executable indicated that it was compiled specifically for FreeBSD, with the Linux “File” command further confirming it was compiled on FreeBSD 10.4.

interlock.elf: ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, BuildID[sha1]=c7f876806bf4d3ccafbf2252e77c2a7546c301e6, for FreeBSD 10.4, FreeBSD-style, not stripped

However, even when testing the sample on a FreeBSD virtual machine, BleepingComputer was unable to get the sample to properly execute.

While it is common to see Linux encryptors created to target VMware ESXi servers and virtual machines, it is rare to see ones created for FreeBSD. The only other ransomware operation known to have created FreeBSD encryptors is the now-defunct Hive ransomware operation, which was disrupted by the FBI in 2023.

This week, researchers from cybersecurity firm Trend Micro shared on X that they found an additional sample of the FreeBSD ELF encryptor [VirusTotal] and a sample of the operation’s Windows encryptor [VirusTotal].

Trend Micro further said that the threat actors likely created a FreeBSD encryptor as the operating system is commonly used in critical infrastructure, where attacks can cause widespread disruption.

“Interlock targets FreeBSD as it’s widely utilized in servers and critical infrastructure. Attackers can disrupt vital services, demand hefty ransoms, and coerce victims into paying,” explains Trend Micro.

It goes without saying that the Interlock ransomware operation is not linked to the cryptocurrency token of the same name.

The Interlock ransomware

While BleepingComputer could not get the FreeBSD encryptor working, the Windows version ran without a problem on our virtual machine.

According to Trend Micro, the Windows encryptor will clear Windows event logs, and if self-deletion is enabled, will use a DLL to delete the main binary using rundll32.exe.

When encrypting files, the ransomware will append the .interlock extension to all encrypted file names, and create a ransom note in each folder.

Files encrypted by Interlock
Files encrypted by Interlock
Source: BleepingComputer

This ransom note is named !__README__!.txt and briefly describes what happened to the victim’s files, makes threats, and links to the Tor negotiation and data leak sites.

Interlock ransom note
Interlock ransom note
Source: BleepingComputer

Each victim has a unique “Company ID” that is used along with an email address to register on the threat actor’s Tor negotiation site. Like many other recent ransomware operations, the victim-facing negotiation site just includes a chat system that can be used to communicate with the threat actors.

Trend Micro further said that the threat actors likely created a FreeBSD encryptor as the operating system is commonly used in critical infrastructure, where attacks can cause widespread disruption.

“Interlock targets FreeBSD as it’s widely utilized in servers and critical infrastructure. Attackers can disrupt vital services, demand hefty ransoms, and coerce victims into paying,” explains Trend Micro.

It goes without saying that the Interlock ransomware operation is not linked to the cryptocurrency token of the same name.

The Interlock ransomware

While BleepingComputer could not get the FreeBSD encryptor working, the Windows version ran without a problem on our virtual machine.

According to Trend Micro, the Windows encryptor will clear Windows event logs, and if self-deletion is enabled, will use a DLL to delete the main binary using rundll32.exe.

When encrypting files, the ransomware will append the .interlock extension to all encrypted file names, and create a ransom note in each folder.

Files encrypted by Interlock
Files encrypted by Interlock
Source: BleepingComputer

This ransom note is named !__README__!.txt and briefly describes what happened to the victim’s files, makes threats, and links to the Tor negotiation and data leak sites.

Interlock ransom note
Interlock ransom note
Source: BleepingComputer

Each victim has a unique “Company ID” that is used along with an email address to register on the threat actor’s Tor negotiation site. Like many other recent ransomware operations, the victim-facing negotiation site just includes a chat system that can be used to communicate with the threat actors.

When conducting attacks, Interlock will breach a corporate network and steal data from servers while spreading laterally to other devices. When done, the threat actors deploy the ransomware to encrypt all of the files on the network.

The stolen data is used as part of a double-extortion attack, where the threat actors threaten to publicly leak it if a ransom is not paid.

BleepingComputer has learned that the ransomware operation demands ransoms ranging from hundreds of thousands of dollars to millions, depending on the size of the organization.

Lawrence Abrams

Leave a Comment

Your email address will not be published. Required fields are marked *

loader-image
London, GB
11:09 pm, Jun 28, 2025
weather icon 23°C
L: 21° | H: 24°
clear sky
Humidity: 74 %
Pressure: 1024 mb
Wind: 10 mph WSW
Wind Gust: 0 mph
UV Index: 0
Precipitation: 0 mm
Clouds: 0%
Rain Chance: 0%
Visibility: 10 km
Sunrise: 4:45 am
Sunset: 9:21 pm
DailyHourly
Daily ForecastHourly Forecast
Tomorrow 10:00 pm
weather icon
21° | 24°°C 0 mm 0% 7 mph 81 % 1026 mb 0 mm/h
Mon Jun 30 10:00 pm
weather icon
20° | 34°°C 1 mm 100% 6 mph 66 % 1022 mb 0 mm/h
Tue Jul 01 10:00 pm
weather icon
20° | 32°°C 0.77 mm 77% 11 mph 68 % 1019 mb 0 mm/h
Wed Jul 02 10:00 pm
weather icon
16° | 24°°C 1 mm 100% 12 mph 89 % 1019 mb 0 mm/h
Thu Jul 03 10:00 pm
weather icon
15° | 22°°C 0 mm 0% 15 mph 81 % 1022 mb 0 mm/h
Tomorrow 1:00 am
weather icon
20° | 22°°C 0 mm 0% 7 mph 75 % 1024 mb 0 mm/h
Tomorrow 4:00 am
weather icon
18° | 19°°C 0 mm 0% 5 mph 81 % 1025 mb 0 mm/h
Tomorrow 7:00 am
weather icon
19° | 19°°C 0 mm 0% 5 mph 81 % 1026 mb 0 mm/h
Tomorrow 10:00 am
weather icon
23° | 23°°C 0 mm 0% 4 mph 58 % 1026 mb 0 mm/h
Tomorrow 1:00 pm
weather icon
28° | 28°°C 0 mm 0% 5 mph 43 % 1025 mb 0 mm/h
Tomorrow 4:00 pm
weather icon
30° | 30°°C 0 mm 0% 3 mph 35 % 1023 mb 0 mm/h
Tomorrow 7:00 pm
weather icon
30° | 30°°C 0 mm 0% 1 mph 34 % 1021 mb 0 mm/h
Tomorrow 10:00 pm
weather icon
24° | 24°°C 0 mm 0% 6 mph 56 % 1022 mb 0 mm/h
Name Price24H (%)
Bitcoin(BTC)
€91,579.93
0.18%
Ethereum(ETH)
€2,078.58
0.55%
Tether(USDT)
€0.85
-0.01%
XRP(XRP)
€1.87
2.03%
Solana(SOL)
€128.72
5.62%
USDC(USDC)
€0.85
-0.01%
Dogecoin(DOGE)
€0.140048
1.90%
Shiba Inu(SHIB)
€0.000010
2.21%
Pepe(PEPE)
€0.000009
4.13%
Scroll to Top