25% off all training courses Offer ends May 29, 2026
View HIPAA Courses
25% off all training courses
View HIPAA Courses
Offer ends May 29, 2026

The HIPAA Journal is the leading provider of HIPAA training, news, regulatory updates, and independent compliance advice.

New Interlock Ransomware Group Targets US Healthcare Organizations

An emerging ransomware group has its sights set on the healthcare industry and has been conducting attacks since at least September 2024, according to Cisco Talos Incident Response. Interlock ransomware is a financially motivated threat group that claims that in addition to conducting attacks for monetary gain, does so to teach organizations a lesson for their poor security practices. Based on the attacks in the first couple of months, Interlock engages in big game hunting, targeting large organizations with the financial means to pay large ransoms.

“We are Interlock, a relentless collective that exposes the recklessness of companies failing to protect their most critical assets: customer data and intellectual property. We exploit the vulnerabilities they leave wide open, delivering a harsh but necessary wake-up call to those who think they can cut corners on security… We don’t just want payment; we want accountability,” explained Interlock on its data leaks blog site. “Your data is only as safe as the effort you put into protecting it… we are here to enforce the standards that they fail to uphold.”

An analysis of one recent Interlock ransomware attack by the Cisco Talos IR team identified several tactics, techniques, and procedures (TTPs) used by the group. While the group says it exploits vulnerabilities, the group gained initial access to the victim’s network by tricking a user into installing a fake Google Chrome browser update via a compromised legitimate news website. The executable file was downloaded from the URL of a legitimate retailer whose site had been compromised. The executable file delivered a remote access tool (RAT), which dropped a Windows shortcut file into the Windows StartUp folder to run the remote access tool each time the user logged in.

The RAT collects information from the device, encrypts that information, establishes a connection with the Interlock command and control (C2) server, and sends the encrypted data to the C2 server. The RAT also delivered a credential sealer and keylogger and disabled the endpoint detection & response (EDR) software and attempted to delete the contents of event logs to avoid detection.

Get The FREE
HIPAA Compliance Checklist

Immediate Delivery of Checklist Link To Your Email Address

Please Enter Correct Email Address

Your Privacy Respected

HIPAA Journal Privacy Policy

Interlock primarily uses remote desktop protocol along with the compromised credential for lateral movement and also uses the remote access tools AnyDesk and LogMeIn for remote connectivity. PuTTY was installed to allow lateral movement to Linux hosts. Data was exfiltrated to a remote Azure storage location using AzCopy, then ransomware was deployed to encrypt files. Interlock took 17 days from the initial compromise to file encryption and demanded a response to the ransom demand within 96 hours.

Victims so far have included U.S. healthcare organizations, technology firms, and the government, with manufacturing firms attacked in Europe. The stolen data is published on the Interlock Worldwide Secrets blog if the ransom is not paid. The Cisco Talos team suggests Interlock may be a breakaway from the Rhysida ransomware group due to overlapping TTPs, but only made that connection with a low level of confidence.

Author: Steve Alder is the editor-in-chief of The HIPAA Journal. Steve is responsible for editorial policy regarding the topics covered in The HIPAA Journal. He is a specialist on healthcare industry legal and regulatory affairs, and has 10 years of experience writing about HIPAA and other related legal topics. Steve has developed a deep understanding of regulatory issues surrounding the use of information technology in the healthcare industry and has written hundreds of articles on HIPAA-related topics. Steve shapes the editorial policy of The HIPAA Journal, ensuring its comprehensive coverage of critical topics. Steve Alder is considered an authority in the healthcare industry on HIPAA. The HIPAA Journal has evolved into the leading independent authority on HIPAA under Steve’s editorial leadership. Steve manages a team of writers and is responsible for the factual and legal accuracy of all content published on The HIPAA Journal. Steve holds a Bachelor’s of Science degree from the University of Liverpool. You can connect with Steve via LinkedIn or email via stevealder(at)hipaajournal.com

x

Is Your Organization HIPAA Compliant?

Find Out With Our Free HIPAA Compliance Checklist

Get Free Checklist