Thursday, 27 November 2025
29.7 C
Singapore
21.7 C
Thailand
24.4 C
Indonesia
27.3 C
Philippines

Interlock ransomware targets critical infrastructure with FreeBSD-specific attacks

Interlock ransomware targets FreeBSD servers, highlighting the need for enhanced security measures in critical infrastructure.

A new ransomware group, Interlock, has recently targeted organisations focusing on FreeBSD servers. The operation began in late September 2024 and used a unique encryptor designed for FreeBSD systems, setting it apart from other ransomware attacks.

The Interlock ransomware and its FreeBSD focus

Interlock has already claimed attacks on several organisations, including Wayne County, Michigan, which fell victim to a cyberattack in October 2024. The ransomware’s distinctive feature is its use of an encryptor designed specifically for FreeBSD, an operating system widely used in critical infrastructure.

Cybersecurity experts Simo and MalwareHunterTeam, who analysed samples of the ransomware, uncovered the initial details of the attack. Interlock’s attack method follows a typical ransomware pattern: the attackers breach corporate networks, steal sensitive data, and spread to other devices, encrypting files along the way. They use double-extortion tactics, threatening to leak stolen data unless the victim pays a ransom, which can range from hundreds of thousands to millions of dollars.

Why FreeBSD is a prime target

What makes Interlock particularly unique is its focus on FreeBSD, a choice that highlights the importance of this operating system in critical systems. Unlike other ransomware groups that often target Linux-based VMware ESXi servers, Interlock aims directly at FreeBSD servers, common in web hosting, mail servers, and storage systems. These systems are integral to critical functions, making them lucrative targets for attackers.

While FreeBSD’s popularity in essential services makes it an attractive target, its focus also challenges cybersecurity professionals. The FreeBSD encryptor, explicitly compiled for FreeBSD 10.4, is a 64-bit ELF executable. However, executing in controlled environments on both Linux and FreeBSD virtual machines proved difficult during initial testing. Despite these hurdles, Trend Micro researchers discovered further samples of the encryptor, confirming its functionality and strategic focus.

Advice for organisations to improve security

Interlock’s attack highlights the need for stronger security measures across critical infrastructure. Ilia Sotnikov, a Security Strategist at Netwrix, advises organisations to implement multi-layered security strategies. These should include network and web application firewalls, intrusion detection systems, and phishing defences to prevent initial breaches.

Sotnikov explains, “The FreeBSD operating system is known for its reliability and is commonly used for critical functions. Examples include web hosting, mail servers, and storage systems, all potentially lucrative targets for the attackers. Depending on the configuration, the server may or may not be directly connected to the Internet.”

Sotnikov recommends investing in defence-in-depth strategies to disrupt attacks early and complicate the attacker’s actions. He also stresses the importance of monitoring tools to detect harmful activity quickly. A key recommendation is to implement the zero-trust principle, which ensures that users only have the minimum necessary permissions to perform their tasks, minimising the risk of internal breaches.

The Interlock ransomware group’s attacks are a stark reminder of the vulnerabilities within critical infrastructure. Its use of a FreeBSD-specific encryptor marks a troubling development in ransomware tactics, underscoring the need for robust security measures to protect against this growing threat. Organisations should prioritise improved security strategies to mitigate the risk and impact of such cyberattacks.

Hot this week

Kaspersky warns of AI-generated sites distributing remote access software in global campaign

Kaspersky reports a global campaign using AI-generated websites to distribute remote access tools and gain control of victims’ devices.

OnePlus confirms 15R launch date as part of three-device announcement

OnePlus confirms the 17 December launch of the 15R, Watch Lite, and Pad Go 2, with UK pre-order discounts and added perks.

Qualcomm introduces Snapdragon 8 Gen 5 as streamlined alternative to Elite chipset

Qualcomm launches the Snapdragon 8 Gen 5 chipset, offering strong performance, AI features, and expected availability in devices within weeks.

Apple expected to launch low-cost MacBook with iPhone chip in early 2026

Apple is expected to launch a low-cost MacBook with an A18 Pro chip in February 2026, aiming to offer a budget-friendly alternative to its existing models.

Belkin UltraCharge Pro 3-in-1 Magnetic Charging Dock with Qi2 25W review: Fast, quiet and convenient charging

Belkin UltraCharge Pro 3-in-1 Magnetic Charging Dock with Qi2 25W offers fast, quiet and convenient wireless charging for iPhone, Apple Watch and AirPods.

Global mobile gaming ads surge in 2025 as AI and interactivity reshape engagement

Mobile gaming ads grew strongly in 2025 as AI-driven optimisation and interactive formats reshaped global user acquisition strategies.

POCO enters premium smartphone segment with new F8 series

POCO launches the F8 Ultra, F8 Pro, and two new tablets as it enters the premium flagship market with new performance and audio features.

Crunchyroll brings world-first premieres and major anime showcases to AFA Singapore 2025

Crunchyroll brings exclusive premieres, guest panels and a large interactive booth to AFA Singapore 2025.

Kaspersky warns of AI-generated sites distributing remote access software in global campaign

Kaspersky reports a global campaign using AI-generated websites to distribute remote access tools and gain control of victims’ devices.

Related Articles

Popular Categories