Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    The NexPhone is a working product that runs both Windows and Android

    Tesla Malaysia unleases Model 3 Standard RWD and Model Y Long Range RWD

    6 billion leaked passwords reveal the ones you should never, ever use

    Facebook X (Twitter) Instagram
    • Artificial Intelligence
    • Business Technology
    • Cryptocurrency
    • Gadgets
    • Gaming
    • Health
    • Software and Apps
    • Technology
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Tech AI Verse
    • Home
    • Artificial Intelligence

      Ashley St. Clair, the mother of one of Elon Musk’s children, sues xAI over Grok sexual images

      January 17, 2026

      Anthropic joins OpenAI’s push into health care with new Claude tools

      January 12, 2026

      The mother of one of Elon Musk’s children says his AI bot won’t stop creating sexualized images of her

      January 7, 2026

      A new pope, political shake-ups and celebs in space: The 2025-in-review news quiz

      December 31, 2025

      AI has become the norm for students. Teachers are playing catch-up.

      December 23, 2025
    • Business

      New VoidLink malware framework targets Linux cloud servers

      January 14, 2026

      Nvidia Rubin’s rack-scale encryption signals a turning point for enterprise AI security

      January 13, 2026

      How KPMG is redefining the future of SAP consulting on a global scale

      January 10, 2026

      Top 10 cloud computing stories of 2025

      December 22, 2025

      Saudia Arabia’s STC commits to five-year network upgrade programme with Ericsson

      December 18, 2025
    • Crypto

      Monero Holds $500, But Rising Risk Emerges as Traders Pull Back

      January 23, 2026

      US DOJ Recasts Crypto as Fraud Infrastructure in New Review

      January 23, 2026

      Where Is Ethereum’s Bottom? Analysts Weigh On-Chain and Technical Signals

      January 23, 2026

      Ledger To Turn Crypto Security into Wall Street Gold in $4 Billion IPO

      January 23, 2026

      Can XRP HODLer Conviction Beat Profit Booking and the 18% Price Breakdown Risk?

      January 23, 2026
    • Technology

      6 billion leaked passwords reveal the ones you should never, ever use

      January 23, 2026

      A Lenovo update hints at Nvidia Arm CPUs coming soon

      January 23, 2026

      7 awesome Philips Hue smart light features you’re not using

      January 23, 2026

      Nintendo made a real Talking Flower and it won’t stop talking

      January 23, 2026

      Raspberry Pi launches a USB flash drive that won’t flake under pressure

      January 23, 2026
    • Others
      • Gadgets
      • Gaming
      • Health
      • Software and Apps
    Check BMI
    Tech AI Verse
    You are at:Home»Technology»Interlock ransomware adopts FileFix method to deliver malware
    Technology

    Interlock ransomware adopts FileFix method to deliver malware

    TechAiVerseBy TechAiVerseJuly 15, 2025No Comments3 Mins Read4 Views
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    Interlock ransomware adopts FileFix method to deliver malware
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp Email

    Interlock ransomware adopts FileFix method to deliver malware

    Hackers have adopted the new technique called ‘FileFix’ in Interlock ransomware attacks to drop a remote access trojan (RAT) on targeted systems.

    Interlock ransomware operations have increased over the past months as the threat actor started using the KongTuke web injector (aka ‘LandUpdate808’) to deliver payloads through compromised websites.

    This shift in modus operandi was observed by researchers at The DFIR Report and Proofpoint since May. Back then, visitors of compromised sites were prompted to pass a fake CAPTCHA + verification, and then paste into a Run dialog content automatically saved to the clipboard, a tactic consistent with ClickFix attacks.

    The trick led users to execute a PowerShell script that fetched and launched a Node.js-based variant of the Interlock RAT.

    In June, researchers found a PHP-based variant of Interlock RAT used in the wild, which was delivered using the same KongTuke injector.

    Earlier this month, a significant change in the delivery wrapper occurred, with Interlock now switching to the FileFix variation of the ClickFix method as the preferred delivery method.

    Interlock’s FileFix attack
    Source: The DFIR Report

    FileFix is a social engineering attack technique developed by security researcher mr.d0x. It’s an evolution of the ClickFix attack, which became one of the most widely employed payload distribution methods over the past year.

    In the FileFix variation, the attacker weaponizes trusted Windows UI elements, such as File Explorer and HTML Applications (.HTA), to trick users into executing malicious PowerShell or JavaScript code without displaying any security warnings.

    Users are prompted to “open a file” by pasting a copied string into File Explorer’s address bar. The string is a PowerShell command disguised to look like a file path using comment syntax.

    In the recent Interlock attacks, targets are asked to paste a command disguised with a fake file path onto File Explorer, leading to the downloading of the PHP RAT from ‘trycloudflare.com’ and its execution on the system.

    Post-infection, the RAT executes a series of PowerShell commands to gather system and network information and exfiltrates this data as structured JSON to the attacker.

    The DFIR Report also mentions evidence of interactive activity, including Active Directory enumeration, checking for backups, navigating local directories, and examining domain controllers.

    The command and control (C2) server can send shell commands for the RAT to execute, introduce new payloads, add persistence via a Registry run key, or move laterally via remote desktop (RDP).

    Interlock ransomware launched in September 2024, claiming notable victims like the Texas Tech University, DaVita, and Kettering Health.

    The ransomware operation leveraged ClickFix to infect targets, but its pivoting to FileFix indicates that the attacker is quick to adapt to stealthier attack methods.

    This is the first public confirmation of FileFix being used in actual cyberattacks. It is likely to gain more popularity as threat actors explore ways to incorporate it into their attack chains.

    8 Common Threats in 2025

    While cloud attacks may be growing more sophisticated, attackers still succeed with surprisingly simple techniques.

    Drawing from Wiz’s detections across thousands of organizations, this report reveals 8 key techniques used by cloud-fluent threat actors.

    Share. Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Telegram Email
    Previous ArticleGigabyte motherboards vulnerable to UEFI malware bypassing Secure Boot
    Next Article UK launches vulnerability research program for external experts
    TechAiVerse
    • Website

    Jonathan is a tech enthusiast and the mind behind Tech AI Verse. With a passion for artificial intelligence, consumer tech, and emerging innovations, he deliver clear, insightful content to keep readers informed. From cutting-edge gadgets to AI advancements and cryptocurrency trends, Jonathan breaks down complex topics to make technology accessible to all.

    Related Posts

    6 billion leaked passwords reveal the ones you should never, ever use

    January 23, 2026

    A Lenovo update hints at Nvidia Arm CPUs coming soon

    January 23, 2026

    7 awesome Philips Hue smart light features you’re not using

    January 23, 2026
    Leave A Reply Cancel Reply

    Top Posts

    Ping, You’ve Got Whale: AI detection system alerts ships of whales in their path

    April 22, 2025632 Views

    Lumo vs. Duck AI: Which AI is Better for Your Privacy?

    July 31, 2025239 Views

    6.7 Cummins Lifter Failure: What Years Are Affected (And Possible Fixes)

    April 14, 2025138 Views

    6 Best MagSafe Phone Grips (2025), Tested and Reviewed

    April 6, 2025111 Views
    Don't Miss
    Gadgets January 24, 2026

    The NexPhone is a working product that runs both Windows and Android

    The NexPhone is a working product that runs both Windows and Android If you have…

    Tesla Malaysia unleases Model 3 Standard RWD and Model Y Long Range RWD

    6 billion leaked passwords reveal the ones you should never, ever use

    A Lenovo update hints at Nvidia Arm CPUs coming soon

    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    About Us
    About Us

    Welcome to Tech AI Verse, your go-to destination for everything technology! We bring you the latest news, trends, and insights from the ever-evolving world of tech. Our coverage spans across global technology industry updates, artificial intelligence advancements, machine learning ethics, and automation innovations. Stay connected with us as we explore the limitless possibilities of technology!

    Facebook X (Twitter) Pinterest YouTube WhatsApp
    Our Picks

    The NexPhone is a working product that runs both Windows and Android

    January 24, 20261 Views

    Tesla Malaysia unleases Model 3 Standard RWD and Model Y Long Range RWD

    January 24, 20260 Views

    6 billion leaked passwords reveal the ones you should never, ever use

    January 23, 20262 Views
    Most Popular

    A Team of Female Founders Is Launching Cloud Security Tech That Could Overhaul AI Protection

    March 12, 20250 Views

    7 Best Kids Bikes (2025): Mountain, Balance, Pedal, Coaster

    March 13, 20250 Views

    VTOMAN FlashSpeed 1500: Plenty Of Power For All Your Gear

    March 13, 20250 Views
    © 2026 TechAiVerse. Designed by Divya Tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions

    Type above and press Enter to search. Press Esc to cancel.