• Menu
  • Skip to right header navigation
  • Skip to main content
  • Skip to primary sidebar

DigiBanker

Bringing you cutting-edge new technologies and disruptive financial innovations.

  • Home
  • Pricing
  • Features
    • Overview Of Features
    • Search
    • Favorites
  • Share!
  • Log In
  • Home
  • Pricing
  • Features
    • Overview Of Features
    • Search
    • Favorites
  • Share!
  • Log In

Interlock ransomware group’s attack tactics evolve from ini tial social engineering involving browser update lures to software updates, masquerading as security products

April 22, 2025 //  by Finnovate

Interlock, a sophisticated ransomware threat, has been expanding since its first appearance in September 2024. The malware uses a multi-stage attack chain, compromising legitimate websites to deliver fake browser updates to unsuspecting users. The group operates across various sectors in North America and Europe, using an opportunistic target selection approach. Interlock cannot be classified as a Ransomware-as-a-Service (RaaS) operation, as no advertisements for recruiting affiliates have been discovered. The group maintains a data leak site called “Worldwide Secrets Blog” where they expose victim data and provide negotiation channels. Despite continuing operations, Interlock has claimed fewer victims than more prolific ransomware groups that claimed over one hundred victims in Q1 2025 alone. Sekoia Threat Detection & Research (TDR) team analysts have identified significant evolution in Interlock’s tactics since its emergence. The initial infection vector relies on social engineering, tricking users into downloading and executing fake browser updates. The attackers have evolved their tactics, switching from browser update lures to security software updaters, masquerading as security products.

Read Article

Category: Members, Cybersecurity, Innovation Topics

Previous Post: « New Gmail hack attack employs an OAuth application and “creative DomainKeys Identified Mail workaround” to fool victims into thinking a security alert email originated from Google itself
Next Post: Pillar Security’s tech auto-maps all AI-related assets across the organization and uses real-world threat intelligence to address AI-specific risks such as evasion attacks, data privacy and intellectual property leakage »

Copyright © 2025 Finnovate Research · All Rights Reserved · Privacy Policy
Finnovate Research · Knyvett House · Watermans Business Park · The Causeway Staines · TW18 3BA · United Kingdom · About · Contact Us · Tel: +44-20-3070-0188

We use cookies to provide the best website experience for you. If you continue to use this site we will assume that you are happy with it.OkayPrivacy policy