{"id":28862,"date":"2025-05-16T21:45:14","date_gmt":"2025-05-16T16:15:14","guid":{"rendered":"https:\/\/www.kaspersky.co.in\/blog\/interlock-ransomware-clickfix-attack\/28862\/"},"modified":"2025-05-16T21:45:39","modified_gmt":"2025-05-16T16:15:39","slug":"interlock-ransomware-clickfix-attack","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.in\/blog\/interlock-ransomware-clickfix-attack\/28862\/","title":{"rendered":"How Interlock attacks IT specialists with fake CAPTCHAs and ClickFix"},"content":{"rendered":"<p>The ransomware group <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/interlock-ransomware-gang-pushes-fake-it-tools-in-clickfix-attacks\/\" target=\"_blank\" rel=\"nofollow noopener\">Interlock has started using the ClickFix technique<\/a> to gain access to its victims\u2019 infrastructure. In a recent post, we discussed the <a href=\"https:\/\/www.kaspersky.com\/blog\/what-is-clickfix\/53348\/\" target=\"_blank\" rel=\"noopener nofollow\">general concept of ClickFix<\/a>. Today we\u2019ll look at a specific case where a ransomware group has put this tactic into action. Cybersecurity researchers have discovered that Interlock is using a fake CAPTCHA imitating a Cloudflare-protected site on a page posing as the website of Advanced IP Scanner \u2014 a popular free network scanning tool. This suggests the attack is aimed at IT professionals working in organizations of potential interest to the group.<\/p>\n<h2>How Interlock is using ClickFix to spread malware<\/h2>\n<p>\nThe Interlock attackers lure victims to a webpage with an URL mimicking that of the official Advanced IP Scanner site. The researchers found multiple instances of this same page hosted at different addresses across the web.<\/p>\n<p>When the user clicks the link, they see a message asking them to complete a CAPTCHA, seemingly provided by Cloudflare. The message states that Cloudflare helps companies \u201cregain control of their technology\u201d. This legitimate-looking marketing text is in fact copied from Cloudflare\u2019s own <a href=\"https:\/\/www.cloudflare.com\/en-gb\/what-is-cloudflare\/\" target=\"_blank\" rel=\"nofollow noopener\">What is Cloudflare?<\/a> webpage. It\u2019s followed by instructions to press <em>Win + R<\/em>, then <em>Ctrl + V<\/em>, and finally <em>Enter<\/em>. Next come two buttons: <em>Fix it<\/em> and <em>Retry<\/em>.<\/p>\n<p>Finally, a message claims that the resource the victim is trying to access needs to verify the connection\u2019s security.<\/p>\n<p>In reality, when the victim clicks <em>Fix it<\/em>, a malicious PowerShell command is copied to the clipboard. The user then unknowingly opens the command console with <em>Win + R<\/em> and pastes the command with <em>Ctrl + V<\/em>. Pressing <em>Enter<\/em> then executes the malicious command.<\/p>\n<p>Executing the command downloads and launches a 36-megabyte fake PyInstaller installer file. And to distract the victim, a browser window with the real Advanced IP Scanner website opens.<\/p>\n<h2>From data collection to extortion: the stages of an Interlock attack<\/h2>\n<p>\nOnce the fake installer is launched, a PowerShell script is activated that collects system information and sends it to a C2 server. In response, the server can either send the <em>ooff<\/em> command to terminate the script, or deliver additional malware. In this case the attackers used Interlock RAT (remote access Trojan) as the payload. The malware is saved in the <em>%AppData%<\/em> folder and runs automatically, allowing the attackers to access confidential data and establish persistence in the system.<\/p>\n<p>After initial access, the Interlock operators try to use previously stolen or leaked credentials and the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Remote_Desktop_Protocol\" target=\"_blank\" rel=\"nofollow noopener\">Remote Desktop Protocol (RDP)<\/a> for lateral movement. Their primary target is the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Domain_controller\" target=\"_blank\" rel=\"nofollow noopener\">domain controller (DC)<\/a> \u2014 gaining access to it allows the attackers to spread malware across the infrastructure.<\/p>\n<p>The final step before launching the ransomware is to steal the victim organization\u2019s valuable data. These files are uploaded to Azure Blob Storage controlled by the attackers. After exfiltrating the sensitive data, the Interlock group publishes it on a new Tor domain. A link to this domain is then provided in a new post on the group\u2019s <em>.onion<\/em> site.<\/p>\n<div id=\"attachment_53415\" style=\"width: 1075px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2025\/05\/16214537\/interlock-ransomware-clickfix-attack-2.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-53415\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2025\/05\/16214537\/interlock-ransomware-clickfix-attack-2.jpg\" alt=\"Ransom note from the Interlock ransomware group\" width=\"1065\" height=\"903\" class=\"size-full wp-image-53415\"><\/a><p id=\"caption-attachment-53415\" class=\"wp-caption-text\">Example of a ransom note sent by the Interlock ransomware group. <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/interlock-ransomware-gang-pushes-fake-it-tools-in-clickfix-attacks\/\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">Source<\/a><\/p><\/div>\n<h2>How to protect against ClickFix attacks<\/h2>\n<p>\nClickFix and other similar techniques rely heavily on social engineering, so the best protection is a systematic approach focused primarily on raising employee awareness. To help with this, we recommend our <a href=\"https:\/\/k-asap.com\/en\/?icid=in_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____kasap___\" target=\"_blank\" rel=\"noopener\">Kaspersky Automated Security Awareness Platform<\/a>, which automates training programs for staff.<\/p>\n<p>In addition, to protect against ransomware attacks, we recommend the following:\n<\/p>\n<ul>\n<li>Installing <a href=\"https:\/\/www.kaspersky.co.in\/small-to-medium-business-security?icid=in_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">reliable protection<\/a> on all corporate devices.<\/li>\n<li>Monitoring for suspicious activity in the corporate network using an <a href=\"https:\/\/www.kaspersky.co.in\/next?icid=in_kdailyplacehold_acq_ona_smm__onl_b2b_kdaily_wpplaceholder_sm-team___knext____ece28c88d9230f31\" target=\"_blank\" rel=\"noopener\">XDR-class solution<\/a>.<\/li>\n<li>If your in-house security team lacks the resources or expertise, using an <a href=\"https:\/\/www.kaspersky.co.in\/enterprise-security\/managed-detection-and-response?icid=in_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">external service for threat hunting and response<\/a>.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kasap\">\n","protected":false},"excerpt":{"rendered":"<p>We explore how cybercriminals are targeting IT specialists searching for a popular network scanner, using the Interlock ransomware attack as an example.<\/p>\n","protected":false},"author":2726,"featured_media":28865,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2036,2609,2610],"tags":[111,1252,1522,3453,2047,1362,3454,443,719,97,495,2812,527],"class_list":{"0":"post-28862","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-enterprise","9":"category-smb","10":"tag-attacks","11":"tag-browsers","12":"tag-captcha","13":"tag-clickfix","14":"tag-cryptomalware","15":"tag-keyloggers","16":"tag-powershell","17":"tag-ransomware","18":"tag-rat","19":"tag-security-2","20":"tag-social-engineering","21":"tag-stealers","22":"tag-threats"},"hreflang":[{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/interlock-ransomware-clickfix-attack\/28862\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/interlock-ransomware-clickfix-attack\/24086\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/interlock-ransomware-clickfix-attack\/28962\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/interlock-ransomware-clickfix-attack\/39521\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/interlock-ransomware-clickfix-attack\/53414\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/interlock-ransomware-clickfix-attack\/29125\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/interlock-ransomware-clickfix-attack\/34902\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.in\/blog\/tag\/ransomware\/","name":"ransomware"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/28862","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/users\/2726"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/comments?post=28862"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/28862\/revisions"}],"predecessor-version":[{"id":28864,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/28862\/revisions\/28864"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/media\/28865"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/media?parent=28862"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/categories?post=28862"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/tags?post=28862"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}