Interlock Ransomware Strikes Again: New PHP Trojan Variant Hits the Web

The Interlock ransomware group is getting creative with their malware, now deploying a PHP variant of their remote access trojan. Using a JavaScript traffic distribution system, they lure users with fake CAPTCHA pages and unleash the Interlock RAT. Remember, folks: CAPTCHA might stand for “Can’t Access, Please Try Harder Again.”

Pro Dashboard

Hot Take:

Watch out world, the Interlock ransomware group is back in town with a new trick up their sleeves! This time, they’re not just sticking to their Node.js roots; they’re expanding their horizons with a PHP variant that’s about as welcome as a raccoon in your trash can. It seems the Interlock gang is determined to prove that when it comes to the illegal access game, they’re truly platform-agnostic. So, webmasters, gird your loins and keep your anti-malware tools up to date, because these cyber scalawags are making the rounds!

Key Points:

  • Interlock ransomware group introduces a new PHP variant of their RAT.
  • Malware campaign involves compromised websites with hidden scripts.
  • Fake CAPTCHA pages trick users into running malicious scripts.
  • FileFix mechanism exploits Windows File Explorer’s address bar.
  • RAT uses Cloudflare Tunnel subdomains for C2 server obfuscation.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?