Key Findings

  • We revisit Interlock’s 1-year history and identify three phases of operation:
    • Phase 1 – Emergence (September – October 2024)
    • Phase 2 – Capability expansion (November 2024 – January 2025)
    • Phase 3 – Operational maturity (since February 2025)
  • We analyze their current TTPs and detail the most relevant:
    • Initial access includes social engineering (ClickFix/FileFix) and credentials purchased from initial access brokers (IABs).
    • Session hijacking with valid tokens allows attackers to impersonate users without knowing passwords or completing MFA challenges.
    • Abuse of legitimate cloud utilities like AzCopy and Cloudflare tunnel services for command and control (C2) and data exfiltration.
    • Execution and persistence with four variants of a custom remote access trojan (RAT) .
    • Encryption of assets beyond Windows, such as BSD servers and virtual machines in ESXi hypervisors, amplifies operational impact.
    • New intelligence includes code excerpts for Interlock’s PowerShell RAT, as well as their Putty and Posh-SSH executions.
  • Further analysis points to a growing cybercriminal enterprise:
    • “Big game hunting” focused on sectors that maximize ransom payment leverage: 85% of victims in healthcare, government, or manufacturing.
    • Potential associations with Rhysida, Vice Society (Vanilla Tempest), and commodity malware operators, including SocGholish.

 

Mitigation Recommendations

 

  • For each analyzed TTP, we present detection and hunting opportunities, so please see sections below, including guidance for: Initial Access, Execution, Persistence, Privilege Escalation, Defense Evasion, Credential Access, Discovery, Lateral Movement, Command and Control, Exfiltration.
  • Deploy risk-based, conditional access policies
  • Use behavioral analysis to help detect and prevent session hijacking techniques.

In one year, Interlock evolved from an unknown entity developing yet another “infostealing” Remote Access Trojan (RAT) into an emergency-level threat to organizations in healthcare, government, and manufacturing.

We started tracking Interlock in September 2024. We labelled their first intrusions as Chaya_002, which later proved to be a Traffic Distribution System (TDS) – a key component in Interlock’s double-extortion ransomware operations.

One year later, the group has claimed over 60 victims – over 50 in 2025 alone – distributed as follows.

Interlock continues to evolve by diversifying initial access methods while maintaining consistent post-exploitation leveraging cloud-native data exfiltration and cross-platform encryption.

Here, we revisit their history and analyze their current tactics, techniques, and procedures (TTPs), including: a dangerous combination of social engineering, legitimate or administrative tool abuse, rapid dwell times of 15-24 days on average, and use of trusted cloud services for exfiltration. Based on this analysis, we provide risk mitigation recommendations, including threat detection and hunting opportunities.

 

Interlock Evolution and Current TTPs

The earliest confirmed Interlock incidents established several technical signatures that persist throughout their operations, including Cloudflare tunnel services (via trycloudflare.com domains) for command and control (C2) and backup infrastructure hosted on BLNWX and Hetzner autonomous systems.

Using the diamond model, we dive deep into Interlock’s first year of existence using these signatures—and dividing operations into three phases:

  • Phase 1 – Emergence (September – October 2024)
    • Adversary: Unknown actor with financial motivation and medium sophistication
    • Capability: Basic PowerShell backdoor focused on credential theft
    • Infrastructure: Cloudflare tunnels with hardcoded backup IPs
    • Victims: Opportunistic targeting with limited scale
  • Phase 2 – Capability Expansion (October 2024 – January 2025)
    • Adversary: “Interlock” name emerges, organized team suspected
    • Capability: Multi-language RAT family with sophisticated reconnaissance
    • Infrastructure: Previous core kept and Azure exfiltration added
    • Victims: Healthcare/government targeting pattern emerges
  • Phase 3 – Operational Maturity (since February 2025)
    • Adversary: Adoption of RaaS model and possible link with other groups
    • Capability: Full attack lifecycle and cross-platform encryption
    • Infrastructure: Mature, redundant, cloud-native
    • Victims: Confirmed big-game hunting pattern

The table below summarizes their current TTPs. In the next section we analyze the most relevant ones in detail to describe their current attack lifecycle.

Tactic Technique Procedure examples
TA0001 – Initial
Access
T1189 – Drive-by Compromise Compromise legitimate websites to host and deliver malicious payloads
T1204.004 – User Execution:
Malicious Copy and Paste
ClickFix/FileFix to trick users into executing malicious commands
T1078 – Valid Accounts Leverage previously compromised credentials
TA0002 –
Execution
T1059.001 – Command and
Scripting Interpreter: PowerShell
PowerShell for backdoor execution, reconnaissance, persistence, and downloading additional payloads
T1218.011 – System Binary
Proxy Execution: Rundll32
rundll32.exe to execute malicious DLLs, such as the keylogger and cleanup tools
TA0003 – Persistence
T1547.001 – Boot or Logon
Autostart Execution: Registry Run Keys / Startup Folder
Create registry run keys or files/shortcuts in the Startup folder
T1053.005 – Scheduled
Task/Job: Scheduled Task
Scheduled tasks to execute malware at recurring intervals or on system startup
TA0004 – Privilege
Escalation
T1078.002 – Valid Accounts:
Domain Accounts
Compromise domain administrator accounts for broad network access
T1558.003 – Steal or Forge
Kerberos Tickets: Kerberoasting
Kerberoasting to extract password hashes for offline cracking and privilege escalation
TA0005 – Defense Evasion T1036.005 – Masquerading:
Match Legitimate Name or Location
Malicious files impersonating legitimate system files like conhost.exe
T1562.001 – Impair
Defenses: Disable or Modify Tools
Disable EDR on compromised systems
T1070.004 – Indicator
Removal: File Deletion
Delete ransomware binary and other tools after execution to hinder forensic analysis
T1070.001 – Indicator
Removal: Clear Windows Event Logs
Clear Windows Event Logs to erase traces of activity
TA0006 – Credential
Access
T1003 – OS Credential
Dumping
Dump credentials using injected process via an established C2
T1056.001 – Input Capture:
Keylogging
Keylogger (klg.dll) deployed to capture keystrokes, including passwords
T1555.003 – Credentials
from Web Browsers
Infostealers like Lumma and Berserk to extract stored credentials
TA0007 –
Discovery
T1082 – System Information
Discovery
systeminfo to gather details about host operating system and hardware
T1033 – System Owner/User
Discovery
whoami to identify the current user and their privilege level
T1007 – System Service
Discovery
tasklist /svc and Get-Service to enumerate running services, often to identify security tools
T1016 – System Network
Configuration Discovery
arp -a to discover other hosts on the local network segment
T1083 – File and Directory
Discovery
Get-PSDrive to map available drives and shares
TA0008 –Lateral
Movement
T1021.001 – Remote
Services: Remote Desktop Protocol
RDP with stolen credentials
T1219 – Remote Access
Software
Legitimate tools like AnyDesk and PuTTY to facilitate persistent access and lateral movement
TA0011 – Command and Control T1105 – Ingress Tool
Transfer
Tools like RATs, stealers, encryptor from C2 servers
TA0010 – Exfiltration T1567.002 – Exfiltration to
Cloud Storage
AzCopy to exfiltrate stolen data
TA0040 – Impact T1486 – Data Encrypted for
Impact
Ransomware payload deployed to encrypt files, with a focus on virtual machines

 

TTP/Attack Lifecycle Analysis

TA0001 – Initial Access

Interlock uses two main initial compromise methods to ensure a continuous flow of new victims: social engineering and credentials acquired via initial access brokers (IABs).

Social Engineering

The threat actor usually delivers a similar PowerShell backdoor – sometimes with hardcoded decryption passwords – via two social engineering techniques:

  • Compromised websites. In Phases 1 and 2, starting in September 2024, they used a TDS targeting websites of local news, small businesses and community forums to serve malicious JavaScript that triggered fake update prompts or application error messages for Chrome, Teams and other business software. By February 2025, at the beginning of Phase 3, they also impersonated remote connectivity software such as FortiClient VPN and Cisco AnyConnect.
  • ClickFix and FileFix. This vector is an recent trend among several threat actors and it was added to Interlock’s tradecraft by March, already in Phase 3. In ClickFix attacks, victims encounter fake CAPTCHA prompts or messages asking to “fix a browser error” by opening the Run dialog then pasting and executing a provided command. The command executes PowerShell to download and run a backdoor. In the FileFix variant, users are asked to paste commands into the File Explorer address bar, with the same effect.

The delivered backdoor is the custom “Interlock RAT” detailed in the next section. In one Interlock intrusion via ClickFix detailed publicly in May 2025, the commodity loader SocGholish was reportedly installed. We have not observed this first-hand. Details are in the “connections to other cybercriminal groups” section below.

Credentials Acquired via IABs

Credentials acquired via IABs often provide Interlock operators with immediate privileged access to targets, bypassing the need for privilege escalation, reducing dwell time, and enabling operation through legitimate access methods. Time between credential purchase and encryption deployment averages two to three weeks on observed incidents.

Intrusion patterns suggest that Interlock purchases administrative VPN credentials, RDP access to domain-joined systems, Microsoft 365 credentials with global administrator or privileged roles, and privileged service accounts with Kerberos authentication.

Following successful access via this method, the threat actor deploys commodity C2 frameworks such as Cobalt Strike beacons configured with standard malleable C2 profiles, SystemBC proxy malware enabling additional C2 channels, keyloggers, and custom “Interlock RAT” variants.

TA0002 – Execution and TA0003 – Persistence via “Interlock RAT”

Regardless of initial access vector, Interlock operations have consistent execution and persistence via the custom “Interlock RAT” and abuse of Windows native functionality. This suggests centralized post-exploitation even if initial compromise occurs through multiple affiliate or partnership channels.

“Interlock RAT” is a family of functionally-similar but technically-distinct RATs. There are at least four major variants, each in a different language which are likely to evade signature-based detection and adapt to different targets:

  • PowerShell. The primary first-stage implant deployed through social engineering. Upon execution, it downloads an additional PowerShell script and profiles the system via systeminfo, lists running processes (tasklist), services, installed software, desktop files, drives, ARP cache entries, RDP connection records (event ID 1149), network connections (netstat), login/logout events and browser history and bookmarks. All output is stored in JSON in individual .txt files (such as tasklist.txt and arp.txt) inside a timestamped directory C:\Users\$env:username\AppData\Local\Temp\$dirName; $dirName = (Get-Date).ToString( "dd-MM-yyyy_HH-mm-ss" ) for automated processing and exfiltration to C2. The C2 implementation abuses Cloudflare Tunnel service with hardcoded backup IP addresses in BLNWX and Hetzner ranges. For persistence, it creates both startup folder shortcuts and registry Run key entries.
  • Java. Not observed firsthand, but it was reported by the industry as active in January. The choice of Java suggests experimentation with language diversification for evasion, cross-platform targeting (though reported deployments focused on Windows) or use by a different team. Functional capabilities are consistent with other variants.
  • Node.js. This full-featured variant – also known as NodeSnake and reported in June – implements a modular architecture with no identified relation to public codebases, indicating completely custom development. It extends capabilities to include file upload and download, process management with injection and hollowing, credential harvesting via custom and commodity stealers, and screenshot capture. This variant is a second-stage persistent access mechanism. Persistence is achieved via Reg add “HKCU\Software\Microsoft\Windows\CurrentVersion\Run” /v “ChromeUpdater” /t REG_SZ /d “[path_to_script]” /f
  • PHP. First appeared in July 2025. PHP is an uncommon language for client-side malware because it requires the installation of a PHP runtime. Interlock accomplishes that by deploying portable PHP binaries with the initial backdoor. Despite language differences, the core functionality mirrors other variants including file system access, command execution, and encrypted communication with C2 infrastructure. Apart from the change in runtime executable, all capabilities are similar to NodeSnake.

All RAT variants automatically inspect the system and scan for lateral movement targets using built-in Windows commands and PowerShell, including:

  • systeminfo for operating system version
  • net group “domain admins” to identify privileged accounts
  • quser to enumerate active user sessions
  • sc query sense to check for Microsoft Defender ATP sensor status.
  • Get-PSDrive to identify available file shares
  • Get-NetNeighbor to discover other network hosts
  • tasklist with service enumeration to identify security software and business applications

This output may be automatically analyzed to identify high-value targets, including: domain controllers through AD role enumeration, backup systems through service and share enumeration, database servers through named instance discovery, and virtualization infrastructure through VMware service detection.

One additional PowerShell script we observed ran as a background job to inventory all local groups, enumerate all members of each local group using Active Directory Service Interfaces (ADSI WinNT:// paths). For each group member, it identifies a username or computer name, unique SID (Security Identifier), Local, ActiveDirectory, or EntraID, and several other properties.

TA0006 – Credential Access

After execution, Interlock deploys both commodity and custom infostealers to escalate privileges and enable lateral movement. Observed tools include:

  • Lumma Stealer configured to extract passwords from Chrome, Edge, and Firefox. The actor harvests passwords for cloud services including Microsoft 365 webmail, VPN portals, cloud service provider consoles, and administrative portals.
  • Berserk Stealer targeting cryptocurrency wallet files and browser extension data. This appears opportunistic, potentially supporting separate financial crime operations or providing additional revenue streams beyond ransomware payments.
  • A custom keylogger loaded via rundll32.exe with filenames like klg.dll that records keystrokes and window titles for manual credential extraction

Two credential access techniques used by the actor deserve special mention:

  • Microsoft 365 session hijacking. Interlock uses infostealers to harvest authentication tokens for Microsoft 365 services from browser memory or stored session files. These tokens for authenticated sessions allow the attacker to impersonate users without knowing passwords or completing MFA challenges (since they were already completed by the user during authentication). The stolen tokens are then validated by enumerating the compromised account’s cloud permissions, including global administrator roles, SharePoint site access, Exchange mailbox delegation, and Teams channel memberships.
  • Active Directory (AD) Credential Theft. Interlock employs AD credential theft techniques focusing on Kerberos exploitation and memory-based credential extraction. Kerberoasting attacks target service principal names associated with domain user accounts, requesting service tickets containing hashes encrypted with the service account’s password. We also observed the actor reactivating Windows Guest accounts – usually disabled in enterprise environments – for persistence. They enable the guest account with a new password, add it to the local administrators’ group, and persist it via the registry. These guest accounts enable lateral movement, are rarely monitored, and their persistence survives deletions of initially compromised domain users.

TA0008 – Lateral Movement

Armed with credentials, Interlock targets high-value systems, including domain controllers providing AD access, group policy deployment capabilities, file servers, backup systems, and VMware ESXi hosts with dozens of virtual machines.

The threat actor moves across the network using Windows-native tools and administrative protocols, as well as abused legitimate tools:

  • Remote Desktop Protocol (RDP) is a primary mechanism for lateral movement and tool deployment on target systems. Used via mstsc /v: x.x.x.x
  • Windows Remote Management (WinRM) and PowerShell Remoting (PSRemoting) enable command execution for reconnaissance and automated exploitation
  • PsExec facilitates file transfer and remote service creation along with RDP
  • Advanced-port-scanner is downloaded from advanced-port-scanner[.]com/es/ into a SMB share accessible by the actor and used for lateral movement
  • Putty and Posh-SSH are downloaded on Windows hosts and used for lateral movement to non-Windows hosts, such as ESXi servers, via puttyportable.exe -ssh [email protected] -pw 'xxx' – where xxx is a unique password used to target ESXi systems and is consistent across intrusions.

TA0010 – Exfiltration

Exfiltration usually occurs between 72 and 96 hours before ransomware deployment to minimize detection opportunities. More recent intrusions use a ‘smash-and-grab’ approach with full-speed exfiltration and no throttling or filtering which suggests they are either affiliates with lower skills or face time pressure to avoid  detection.

Interlock abuses legitimate cloud utilities to exfiltrate data and evade network monitoring, which is usually limited to file transfer protocols:

  • AzCopy – the official Azure Storage data transfer utility – is used to transfer in bulk sensitive files to Azure Storage accounts. This has several advantages for the attacker, including a legitimate Microsoft signature bypassing application whitelisting, encrypted HTTPS transfer blending with normal cloud service traffic, high-speed parallel transfer, and Azure infrastructure providing reliable storage.
  • Azure Storage Explorer provides a GUI alternative to AzCopy for manual data selection and transfer, especially while identifying high-value targets before bulk exfiltration.
  • Cloudflare tunnel domains are used for exfiltration of smaller datasets and real-time reconnaissance output. The same trycloudflare.com infrastructure used for C2 doubles as an exfiltration channel for RAT-collected data including system profiles, credentials, and screenshots.

TA0005 – Defense Evasion

Prior to ransomware deployment, Interlock operators:

  • Disable EDR solutions using vulnerable drivers (BYOVD)
  • Uninstall or modify other security controls to disable features such as real-time protection, cloud connectivity, and automated remediation

TA0040 – Impact

Interlock typically disrupts business operations while maintaining the victim’s ability to pay the ransom and recover systems. The actor leverages enterprise administrative tools and infrastructure for rapid domain-wide encryption:

  • Create new Group Policy Objects (GPOs) or modify existing ones to deploy scheduled tasks and execute the Interlock encryptor across hundreds or thousands of domain-joined systems simultaneously
  • Use PsExec to encrypt systems without domain-wide GPO creation, since that might trigger security alerts
  • Use Windows Management Instrumentation (WMI) to encrypt systems where PsExec fails or administrators disable remote service creation

Encryptor deployment follows a sequence. First, operators destroy backup systems and volume shadow copies using vssadmin delete shadows. Second, they use putty or plink.exe (PuTTY Link) to connect to ESXi hosts via SSH, authenticate using credentials stolen earlier and deploy the Linux variant of the encryptor to encrypt virtual machines at the hypervisor level. Third, domain-wide GPO deployment encrypts workstations and servers simultaneously. Fourth, domain controllers are encrypted last, so there will be operational disruption while maintaining sufficient infrastructure for ransom negotiation and potential delivery of the decryption key.

The Interlock encryptor uses a custom packer with in-memory code patching to evade static analysis and signature-based detection. It also integrates the OpenSSL library to bypass Windows CryptoAPI calls that may be monitored.

Cross-platform compilation produces native executables for Windows, Linux, ESXi, and FreeBSD. The latter is becoming more common with ransomware families. Interlock’s BSD encryptor generates an RSA key pair when it first executes using function rsa_make_key_bn_e with CBC mode and spawns multiple threads for parallel encryption. These threads enumerate files ( opendir(/proc)), encrypt all files except the ones in checkExceptDir and create lock files (.interlock).

After encryption, the binary drops a ransom note.

Ransom note

Interlock ransom notes contain standard double-extortion messaging including Tor-based communication channels for anonymity, unique victim identifiers for negotiations, data theft confirmation with sample file listings, and escalation threats including public data release and notification of customers or regulatory bodies. The communication tone is characteristic of business-focused ransomware operations with emphasis on this being a “security alert” rather than a disruption, though messages emphasize consequences of nonpayment including legal liability for customer data exposure and regulatory penalties under GDPR, HIPAA, or other frameworks.

 

Connections to Other Cybercriminal Groups

Both our first-hand observations and other industry reporting suggest Interlock’s connections with other cybercriminal groups:

  • The use of the commodity loader SocGhlolish in at least one incident suggests that Interlock’s operators might have partnered with or have an affiliate who normally uses SocGholish instead of “Interlock RAT”. In that incident, attackers used NetSupportRAT as an intermediate staging platform between SocGholish and Interlock RAT. NetSupportRAT provides several operational advantages: the tool is legitimately signed, it is trusted by many security solutions, it implements automatic startup mechanisms and it enables clean handoff between SocGholish operators and Interlock teams.
  • Interlock and Rhysida ransomware variants use nearly identical exclusion lists, including identical ordering of hardcoded directory paths and file extensions. Interlock could represent a direct Rhysida rebrand, a splinter group formed by former Rhysida operators, or acquisition of Rhysida toolsets by new operators.
  • Some reports cluster the Supper RAT with Interlock RAT. Supper is associated with the threat actor Vanilla Tempest (responsible for the Vice Society ransomware). While there is no direct evidence of Interlock using Supper, both Interlock and Vice Society have been associated with Rhysida at different times, suggesting possible overlaps in the broader cybercriminal ecosystem.

 

Detection and Hunting Recommendations

The analysis above shows that Interlock has become a sophisticated threat that requires targeted organizations to ensure their threat detection and hunting capabilities can prevent and respond to potential attacks.

The table below presents again Interlock’s common TTPs, now highlighting the detection and hunting opportunities available due to their actions during intrusions. Those detections require a combination of network and endpoint signals, especially PowerShell and Windows event logging to detect malicious scripts. Advanced threat detection and response tools, such as eyeAlert, can correlate this type of information to find true threats and enable response.

Tactic Technique Detection/hunting opportunities
TA0001 – Initial
Access
T1189 – Drive-by Compromise · Connections to newly registered domains
· Unexpected child processes spawned from browsers
· Processes downloading secondary payloads to unusual locations
· File creation by browser processes
T1204.004 – User Execution:
Malicious Copy and Paste
· Windows Run dialog executions with encoded/obfuscated PowerShell or commands containing
certutil.exe and mshta.exe
T1078 – Valid Accounts · Activity inconsistent with login patterns (IP locations, times, user agents) including data and
application access
TA0002 –
Execution
T1059.001 – Command and
Scripting Interpreter: PowerShell
· PowerShell processes with recurring outbound connections and suspicious parent processes

· PowerShell domain enumeration cmdlets (get-netdomaintrust, get-adgroupmember), system discovery
commands (Get-WmiObject Win32_ComputerSystem) and download cradles (IEX (New-Object
Net.WebClient).DownloadString(), Invoke-WebRequest)

· Execution from temporary directories

T1218.011 – System Binary
Proxy Execution: Rundll32
· rundll32.exe executing DllRegisterServer functions from temporary locations or deleting files
TA0003 – Persistence
T1547.001 – Boot or Logon
Autostart Execution: Registry Run Keys / Startup Folder
· Registry Run key modifications creating entries with legitimate software names that do not match
actual paths or signatures

· New autostart entries pointing to temporary directories or unsigned executables

T1053.005 – Scheduled
Task/Job: Scheduled Task
· Scheduled task creation with triggers for logon or recurring intervals, especially from temporary
or user directories
TA0004 – Privilege
Escalation
T1078.002 – Valid Accounts:
Domain Accounts
· Domain accounts (including administrators) accessing systems inconsistent with typical role

· Domain accounts accessing multiple systems rapidly

T1558.003 – Steal or Forge
Kerberos Tickets: Kerberoasting
· Excessive TGS requests (Event ID 4769), especially  for accounts the user does not normally access
TA0005 – Defense
Evasion
T1036.005 – Masquerading:
Match Legitimate Name or Location
· Files named after system binaries (conhost.exe, svchost.exe) in non-system directories.

· Abnormal executions of LOLBINs

T1562.001 – Impair
Defenses: Disable or Modify Tools
Service stop commands, process terminations, or registry modifications targeting EDR
T1070.001 – Indicator
Removal: Clear Windows Event Logs
wevtutil.exe or PowerShell Clear-EventLog cmdlet.
TA0006 – Credential
Access
T1003 – OS Credential
Dumping
Process injection into LSASS followed by network communications to external IPs
T1056.001 – Input Capture:
Keylogging
rundll32.exe loading atypical DLL names or DLLs with SetWindowsHookEx API calls
T1555.003 – Credentials
from Web Browsers
Access to browser credential stores (Login Data files) by non-browser processes
TA0007 –
Discovery
T1082 – System Information
Discovery
Executions of systeminfo and other commands gathering system details (hostname, OS version, hardware
specs)
T1033 – System Owner/User
Discovery
Executions of commands identifying current user privilege  (whoami /all, net user), especially by
processes with network connections
T1007 – System Service
Discovery
Service enumeration commands (tasklist /svc and Get-Service multiple services) followed by attempts
to disable or modify security tools
T1016 – System Network
Configuration Discovery
Network configuration commands (ipconfig, netstat, arp -a), especially when executed by
non-administrative users.
T1083 – File and Directory
Discovery
Directory, drive and share enumeration with dir, ls, Get-PSDrive or PowerShell cmdlets with
recursive flags
TA0008 –Lateral
Movement
T1021.001 – Remote
Services: Remote Desktop Protocol
Abnormal RDP sessions between internal and external systems
T1219 – Remote Access
Software
· Installation or execution of remote access tools like AnyDesk and PuTTY

· Any of these tools connecting to external networks from abnormal locations

TA0011 – Command and Control T1105 – Ingress Tool
Transfer
· Traffic to Cloudflare from unknown or newly downloaded executables

· Abnormal executable download and execution

TA0010 – Exfiltration T1567.002 – Exfiltration to
Cloud Storage
AzCopy transferring large volumes of data

 

One technique we described above that is particularly difficult to detect is Microsoft 365 session hijacking. This requires behavioral analysis rather than authentication failure monitoring. Key indicators include anomalous logins from geographic regions inconsistent with user’s normal patterns, logins without corresponding MFA events in logs, token refresh patterns showing timing or frequency inconsistent with human behavior, administrative actions performed from accounts lacking administrative role assignments, and concurrent sessions from impossible travel locations where time elapsed between logins prevents physical travel between locations.

Due to the difficulty in preventing these hijacking attacks, we recommend that organizations deploy risk-based conditional access policies.

Beyond the individual TTPs shown on the table, we can expand on threat hunting hypotheses for the following composite behaviors:

  • Initial access via social engineering. We expect to see PowerShell logs showing encoded commands with explorer.exe or cmd.exe as parent processes, registry Run key creation for ChromeUpdater or similar names, and immediate outbound connections to trycloudflare.com. Hunt for these in: PowerShell logs, process creation, registry modifications, DNS query logs, and web proxy logs for JavaScript loading patterns from trusted sites.
  • Initial access via VPN/RDP credentials. We expect to see Azure AD sign-in logs showing successful authentications without corresponding MFA events, impossible travel patterns in authentication logs, rapid deployment of remote access tools within 24 hours of successful login, and potential bypass of MFA enforcement through legacy authentication protocols or application passwords that are not covered by conditional access policies. Hunt for these in: Azure AD sign-in logs, VPN authentication logs, Logon RDP,  process creation, and Azure AD legacy authentication reports.
  • C2 via Cloudflare tunnel. We anticipate DNS queries to trycloudflare.com, sustained HTTPS connections to these domains from PowerShell, node.exe, or php.exe, and fallback connections to BLNWX or Hetzner IPs if Cloudflare tunnels fail. Hunt for these in: DNS logs, firewall connection logs, network connections, and proxy logs by distinguishing tunnel domains from CDN traffic.
  • Custom RAT deployment. We expect to see node.exe executing with encoded command-line arguments containing systeminfo and reconnaissance scripts, php.exe in AppData\Local\Temp directories, rundll32.exe loading suspicious DLLs with “start” parameter from C:\ or temporary locations, and potential abuse of legitimate environments where Node.js, PHP, and Java executions are common. Hunt for these in: process creation with full command lines, file creation events in Temp/AppData directories, and user context analysis (developer vs. non-developer systems).
  • PowerShell reconnaissance and ADSI enumeration. We anticipate seeing PowerShell logs containing reconnaissance commands: systeminfo, net group "domain admins", quser, sc query sense, ADSI enumeration via WinNT:// provider to extract local group memberships, creation of timestamped files in %TEMP% like tasklist.txt and services.txt. Hunt for these in: PowerShell logs, file creation in Temp directories, process creation logs for net.exe commands, with focus on  execution patterns and correlation with users’ typical behavior baseline.
  • Microsoft 365 session hijacking. We expect to see infostealer process execution or network connections to known infostealer C2 infrastructure, file access to browser credential stores (Login Data, cookies, Local State files) by non-browser processes, followed by Azure AD sign-in logs showing administrative actions from accounts without admin roles, impossible travel scenarios where token usage occurs from geographically distant locations, and token replay attacks. Hunt for these in: file access monitoring, Azure AD sign-in logs for anomalous token patterns, M365 audit logs, and correlation between browser file access and subsequent Azure AD authentications from unusual locations.
  • Data exfiltration. We anticipate seeing AzCopy.exe execution, command-line arguments containing Azure Storage URLs to external tenants, and high-volume data transfers to Azure Blob Storage endpoints over a 24 to 48 hour period. Hunt for these in: Process creation logs for azcopy.exe with full command lines, network flow data for transfers to *.blob.core.windows.net, with analysis of transfer rates and timing compared to legitimate usage windows.
  • ESXi targeting. We expect to see plink.exe or puttyportable.exe execution with SSH parameters targeting internal ESXi IPs, PowerShell installing Posh-SSH modules outside normal usage, authentication logs showing SSH login attempts, potential file transfers of FreeBSD-compiled encryptors to /tmp directories on ESXi hosts, and SSH connections originating from compromised jump hosts. Hunt for these in: Process creation logs for plink.exe with command-line parameters, PowerShell module installation logs, ESXi logs for SSH authentication, and network flow analysis for SSH connections from unexpected Windows endpoints.
  • AD credential theft and lateral movement. We anticipate seeing Kerberos service ticket requests from non-standard accounts, Guest account reactivation via net user guest /active:yes and addition to Administrators group, lateral movement via RDP or PsExec service creation with random service names. Hunt for these in: security event logs for Kerberos anomalies,  process access logs, account management events, lateral movement authentication patterns, and correlation with service account password age from AD audit data.

 

Detection and Hunting Artifacts

The script excerpts below are taken from intrusions we analyzed and can help to detect or hunt for Interlock activities.

  • ESXi access pattern:
  • Interlock RAT PowerShell code to collect running services and installed software:
  • NodeSnake execution:
  • Execution of conhost.dll via legitimate task name abuse (Microsoft\Windows\Defrag\ScheduledDefrag):

Want to stay on top of the latest threats? Sign up for the Vedere Labs Threat Feed and get the full context of these threats in our monthly newsletter.