Cyber News

New Interlock RAT Variant Targets Windows Users via FileFix Technique, Warns KongTuke

Security researchers from The DFIR Report, in collaboration with Proofpoint, have uncovered a resilient new variant of the notorious Interlock ransomware group’s remote access trojan (RAT).

This latest version, marking a significant shift from previous JavaScript-based Interlock RAT (also known as NodeSnake), is written in PHP and is now being deployed in a widespread and opportunistic campaign, primarily targeting Windows systems.

FileFix Variant: A New Intrusion Pathway

Since May 2025, investigators have linked Interlock RAT activity to threats stemming from the LandUpdate808 (aka KongTuke) web-inject clusters.

Attackers launch their campaign by compromising legitimate websites with single-line, hidden JavaScript injections. These scripts carefully filter incoming IPs and lure unwitting visitors into a multi-stage social engineering trap.

Victims are prompted to complete a “captcha” and then “verification steps,” which ultimately instruct them to paste a string into the Windows run command.

When executed, this triggers a PowerShell script responsible for fetching and deploying the PHP-based Interlock RAT.

A notable evolution is the FileFix variant’s role in delivering the RAT. The malware dropper leverages PowerShell to execute a locally deployed PHP interpreter residing within the user’s AppData directory.

It loads a configuration file containing operational directives, with suspicious command-line arguments and ZIP extension activation. Associated config files, such as config.cfg, have been observed with unique SHA256 hashes, signaling continued adaptation.

Stealthy Reconnaissance and Command & Control

Upon execution, the Interlock RAT immediately performs automated reconnaissance, issuing a suite of PowerShell commands to profile system information, enumerate processes and services, scan local drives, and probe the local network neighborhood.

Privilege checks determine if the malware is running as USER, ADMIN, or SYSTEM, allowing attackers to tailor further actions.

Further evidence suggests “hands on keyboard” activity, with attackers leveraging PowerShell and native commands for Active Directory enumeration, user and computer discovery, and session persistence.

Interlock RAT establishes a covert command and control channel via trycloudflare.com, abusing Cloudflare Tunnel for traffic obfuscation and resilience. Hardcoded fallback IP addresses ensure continued access if the primary tunnels are blocked.

The RAT is capable of downloading and executing additional payloads, running arbitrary commands, and setting up registry-based persistence. Post-compromise, attackers have been observed using RDP for lateral movement across victim environments.

Growing Threat Landscape

This campaign is indiscriminate, targeting a broad range of industries and organizations.

The emergence of a PHP-based Interlock RAT highlights the expanding technical sophistication of ransomware operators, who are increasingly leveraging common scripting languages and cloud services to evade detection.

Security organizations are urged to monitor for suspicious PHP process execution, PowerShell abuse, and connections to the listed Cloudflare Tunnel domains and fallback IPs.

As the threat actors continue to evolve their tactics, defenders should remain vigilant and ensure endpoint controls and network monitoring are up-to-date.

IOCs

Configs

Name: config.cfg | File Size: 27392 Byte(s) SHA256: 28a9982cf2b4fc53a1545b6ed0d0c1788ca9369a847750f5652ffa0ca7f7b7d3 
Name: config.cfg | File Size: 28268 Byte(s) SHA256: 8afd6c0636c5d70ac0622396268786190a4
Priya

Recent Posts

Burp Suite Supercharges Its Scanning Capabilities With React2Shell Vulnerability Detection

PortSwigger has leveled up Burp Suite's scanning arsenal with the latest Active Scan++ extension, version…

4 months ago

Malicious MCP Servers Enable New Prompt Injection Attack To Drain Resources

Unit 42 researchers at Palo Alto Networks exposed serious flaws in the Model Context Protocol…

4 months ago

Law Enforcement Detains Hackers Equipped With Specialized Flipper Hacking Tools

Polish police have arrested three Ukrainian men traveling through Europe and seized a cache of…

4 months ago

Google Unveils 10 New Gemini-Powered AI Features For Chrome

Google has launched its most significant Chrome update ever, embedding Gemini AI across the browser…

4 months ago

CISA Alerts On Actively Exploited Buffer Overflow Flaw In D-Link Routers

Attackers exploit this vulnerability through the router's web interface components, specifically "cgibin" and "hnap_main," by…

4 months ago

Over 500 Apache Tika Toolkit Instances Exposed To Critical XXE Vulnerability

Security researchers have uncovered a severe flaw in Apache Tika, a popular open-source toolkit for…

4 months ago