Interlock Ransomware Exploits Cisco FMC Zero-Day Vulnerability 36 Days Prior to Public Disclosure

Published:

spot_img

Interlock Ransomware Exploits Cisco FMC Zero-Day Vulnerability 36 Days Prior to Public Disclosure

A recent investigation by Amazon’s threat intelligence teams has unveiled a significant cyber campaign linked to the Interlock ransomware group. This campaign exploits a critical vulnerability in Cisco’s Secure Firewall Management Center (FMC) software, tracked as CVE-2026-20131. Disclosed by Cisco on March 4, this vulnerability allows unauthenticated remote attackers to execute arbitrary Java code with root privileges on affected FMC devices.

Early Exploitation of the Vulnerability

Research conducted through Amazon’s MadPot, a global honeypot network designed to monitor malicious activities, revealed that Interlock had begun exploiting this vulnerability as early as January 26, 2026—36 days before Cisco’s public disclosure. This early exploitation provided the attackers with a zero-day advantage, allowing them to compromise organizations before defenders were even aware of the risk.

Amazon’s findings indicate that the exploitation involved crafted HTTP requests targeting specific paths in vulnerable systems. These requests contained embedded Java code and URLs—one delivering configuration data to facilitate the exploit, while another confirmed successful compromise by triggering an HTTP PUT request from the victim system.

Investigation and Attack Progression

To further investigate the attack, researchers simulated a compromised device by responding to the attacker’s verification mechanism. This action triggered the next phase of the attack, during which Interlock issued commands to download and execute a malicious Linux binary.

The use of Amazon MadPot was crucial in exposing the full scope of the operation. A misconfigured infrastructure server used by the attackers inadvertently revealed their entire toolkit, which included reconnaissance scripts, custom remote access trojans (RATs), and evasion mechanisms. This level of organization reflects a structured and repeatable attack methodology.

Importantly, Amazon confirmed that its own cloud infrastructure and customer workloads were not impacted by this campaign.

Tactics and Attribution of Interlock Ransomware

The malware and artifacts recovered during the investigation were attributed to the Interlock ransomware family based on several consistent indicators. These included a ransom note and a TOR-based negotiation portal that aligned with Interlock’s known branding and operational style. The ransom notes notably referenced multiple data protection regulations, a tactic used by Interlock to pressure victims by threatening not only data encryption but also potential regulatory penalties.

Historically, Interlock has targeted industries where disruption creates maximum leverage. The education sector has been the most affected, followed by engineering, construction, manufacturing, healthcare, and public sector organizations. Temporal analysis of the attack activity suggests that the operators likely function in a UTC+3 time zone, with activity typically beginning around 08:30, peaking between 12:00 and 18:00, and declining overnight.

Post-Exploitation Techniques

Once access is gained through CVE-2026-20131, Interlock deploys a range of tools to expand control within the compromised network. A PowerShell-based reconnaissance script systematically collects detailed system and network information, including installed software, running services, browser data, and active connections. This data is organized into per-host directories on a centralized network share and compressed into ZIP archives for exfiltration, indicating preparation for large-scale ransomware deployment across multiple systems.

Interlock employs multiple RATs to maintain persistent access. One variant, written in JavaScript, suppresses debugging output and gathers system details before establishing encrypted communication with command-and-control servers via WebSockets. Messages are encrypted using RC4 with unique keys for each transmission. A second variant, implemented in Java, provides the same capabilities using different libraries, ensuring continued access even if one version is detected and removed.

To hide their tracks, Interlock employs a Bash script that converts compromised Linux servers into HTTP reverse proxies. These proxies forward traffic to attacker-controlled systems while erasing logs every five minutes, making forensic analysis extremely difficult.

Advanced Techniques and Tools

Among the more advanced components observed in the campaign is a memory-resident webshell, delivered as a Java class. This webshell operates entirely in memory, avoiding disk-based detection, intercepting HTTP requests, and executing encrypted payloads dynamically within the Java Virtual Machine. Additionally, a lightweight TCP server tool was identified, used to verify successful exploitation by confirming connectivity on a specific port.

Interlock also blends malicious activity with legitimate software. The group deployed ConnectWise ScreenConnect, a commercial remote desktop tool, to maintain access while avoiding detection. This redundancy ensures that attackers retain control even if custom malware is removed.

Other tools found in the attack environment include Volatility, typically used for memory forensics, and Certify, an offensive security tool targeting Active Directory Certificate Services. These tools enable credential access, privilege escalation, and persistent footholds within compromised environments.

According to publicly available reporting, the implications of this campaign highlight the urgent need for organizations to enhance their cybersecurity measures, especially in light of the sophisticated tactics employed by the Interlock ransomware group.

Follow the latest cybersecurity developments, threat intelligence and breaking updates from across the Middle East.

spot_img

Related articles

Recent articles

TVB Strengthens Creator Economy with Launch of Artiste-Creator Network (ACN) at MarketingPulse 2026

TVB Strengthens Creator Economy with Launch of Artiste-Creator Network (ACN) at MarketingPulse 2026 HONG KONG SAR - The rapid evolution of the digital landscape has...

i-PRO Advances Security Operations with First Edge Cameras Powered by Generative AI

i-PRO Advances Security Operations with First Edge Cameras Powered by Generative AI At ISC West 2026, i-PRO unveiled a groundbreaking development in security technology: its...

Multiple Threat Actors Exploit Six Vulnerabilities in iOS with DarkSword Kit

Multiple Threat Actors Exploit Six Vulnerabilities in iOS with DarkSword Kit A recent cybersecurity development has unveiled a sophisticated exploit kit named DarkSword, which poses...

Zimbabwe’s Fuel Prices Surge 39.1%, Strangling Economic Stability

Zimbabwe's Fuel Prices Surge 39.1%, Strangling Economic Stability The recent announcement by the Zimbabwe Energy Regulatory Authority regarding fuel prices for March 2026 has raised...