#ESETresearch detected a recent intrusion at a University of Warsaw consistent with #Interlock ransomware gang. Thanks to early warning from our experts and the university's swift cooperation, the attack was disrupted before encryptors could be deployed. https://www.eset.com/pl/about/newsroom/press-releases/news/to-analitycy-eset-zidentyfikowali-atak-na-uniwersytet-warszawski/
According to our investigation, the artifacts and infrastructure overlap with Interlock activity. We observed the use of #NodeSnake RAT and Interlock RAT, both of which are referenced in CISA’s #StopRansomware advisory. https://www.cisa.gov/sites/default/files/2025-07/aa25-203a-stopransomware-interlock-072225.pdf
The intrusion is a continuation of the threat actor’s campaign described in the April 2025 QorumCyber report, using an updated toolset. Our telemetry shows the actor targeted the education vertical in additional regions as well. https://www.quorumcyber.com/wp-content/uploads/2025/04/20250416-Higher-Education-Sector-RAT-MP.pdf
New in this campaign, we saw an updated, more-heavily-obfuscated NodeSnake RAT build. The updated version leverages WebSocket instead of the previously used HTTP. C&C infrastructure remains proxied mostly over Cloudflare’s *.trycloudflare[.]com infrastructure.
NodeSnake RAT was used to deliver its own updates and additional payloads including the legitimate tool AzCopy (for exfiltration), a PowerShell SystemBC proxy and a ConnectWise MSI installer (RMM).
Interlock RAT (adobe.log) is executed via a scheduled task Microsoft\Windows\Defrag\ScheduledDefrg, masquerading as a defragmentation task.
IoCs:
Interlock RAT
CEB69DFDD768AA08B86F1D5628BD3A38C1FE8C1F
Interlock RAT C&Cs:
172.86.68[.]64
23.227.203[.]123
77.42.75[.]119
NodeSnake C&Cs:
deserve-coordinated-fairy-tier.trycloudflare[.]com
survey-tennessee-blind-corners.trycloudflare[.]com
dvd-diagnostic-oakland-signals.trycloudflare[.]com
practitioners-ons-boom-utc.trycloudflare[.]com
donnellykilbakk[.]cc
PowerShell SystemBC C&C:
91.99.97[.]247
ConnectWise C&C:
partyglacierhip[.]top
open.substack.com/pub/thecemir/p/public-hearings-town-halls-on-proposed #DHS #cybersecurity #cyberattack #stopransomware #CISA

🔒La nuova legge italiana dichiara guerra al ransomware: pagare è ora proibito! Lottiamo insieme per internetsicuro! #StopRansomware #CyberSecurity 🇮🇹

🔗 https://www.tomshw.it/business/legge-italiana-contro-il-ransomware-proibito-pagare

Legge italiana contro il ransomware, proibito pagare!

Due proposte bipartisan mirano a vietare i riscatti per le infrastrutture critiche, ma il tessuto produttivo delle piccole imprese resta vulnerabile alle logiche estorsive dell'economia criminale.

Tom's Hardware
Alerte #StopRansomware: avis conjoint CISA/FBI actualisé sur Akira avec nouvelles TTPs/IOCs et menace imminente

Source et contexte: Avis conjoint TLP:CLEAR des agences américaines FBI, CISA, DC3 et HHS, avec la participation d’Europol EC3, de l’Office Anti-Cybercriminalité (France), d’autorités allemandes et du NCSC-NL (Pays-Bas), mis à jour le 13 novembre 2025 dans le cadre de l’initiative #StopRansomware. 🚨 Aperçu de la menace: Les acteurs d’Akira (associés à Storm-1567, Howling Scorpius, Punk Spider, Gold Sahara, et possiblement liés à Conti) ciblent surtout les PME mais aussi de grandes organisations, avec une préférence pour les secteurs de la manufacture, éducation, IT, santé, services financiers et agroalimentaire. Depuis 2023, Akira opère sur Windows et Linux/ESXi; en juin 2025, première attaque sur Nutanix AHV via l’abus de CVE-2024-40766 (SonicWall). Fin septembre 2025, le groupe revendique environ 244,17 M$ de rançons. Des exfiltrations ont été observées en un peu plus de 2 heures après l’accès initial. Le schéma reste double extorsion. Le binaire Megazord serait probablement tombé en désuétude depuis 2024.

CyberVeille

🔒 Il ransomware sta minacciando la sicurezza del nostro sistema digitale. Facciamo squadra per combatterlo! #Cybersecurity #StopRansomware

🔗 https://www.tomshw.it/business/il-ransomware-e-diventato-un-problema-sistemico

Il ransomware è diventato un problema sistemico

Un report 2025 rivela: il 57% delle aziende ha subito un attacco ransomware nel 2024, spesso a causa di difese frammentate e falle nell'email.

Tom's Hardware
13 Nov. CISA: "in collaboration with the Federal Bureau of Investigation, Dept of Defense Cyber Crime Center, Dept of Health & Human Services, & international partners, released an updated joint Cybersecurity Advisory, #StopRansomware: Akira Ransomware" www.cisa.gov/news-events/... #cybersec #tech

CISA and Partners Release Advi...
#StopRansomware Guide (updated): cloud backups, zero trust, response checklist. Worth a quarterly read. — Key point from BMIT: smart strategy > shiny tools. https://zurl.co/2CKRc