Interlock ransomware gang exploited Cisco firewall zero-day weeks before disclosure: Amazon
好的,我现在需要帮用户总结一篇文章,控制在100字以内。用户已经给出了文章内容,我得先仔细阅读并理解主要内容。 文章主要讲的是Interlock勒索软件团伙利用Cisco防火墙的零日漏洞进行攻击。他们在3月4日公开披露之前就已经开始使用这个漏洞,甚至在1月26日就开始了攻击。亚马逊的安全团队发现了这一情况,并通过一个配置错误的服务器获取了大量信息,包括恶意软件和谈判门户。 此外,Interlock专门攻击关键基础设施,如地方政府和学校,导致严重后果。他们还利用数据保护法规威胁受害者,这使得攻击更具威胁性。 总结时要抓住关键点:零日漏洞、攻击目标、影响以及亚马逊的发现。控制在100字以内,确保信息准确且简洁。 </think> Interlock勒索软件团伙利用Cisco防火墙的零日漏洞进行攻击,在漏洞公开前一周开始行动。亚马逊安全团队通过误配服务器发现其活动,并揭示其针对关键基础设施和学校的攻击模式。 2026-3-19 14:0:55 Author: therecord.media(查看原文) 阅读量:5 收藏

The ransomware gang behind a damaging cyberattack last year on the city of St. Paul recently exploited a vulnerability in a popular line of Cisco firewalls before the bug was disclosed publicly.

CJ Moses, CISO of Amazon Integrated Security, released a report on Wednesday outlining the Interlock ransomware gang’s exploitation of CVE-2026-20131 — a critical vulnerability disclosed on March 4 affecting Cisco Secure Firewall Management Center software.

According to Moses, Interlock began using the vulnerability in attacks on January 26. Cisco did not respond to requests for comment but updated its advisory on Wednesday to confirm that the vulnerability has been exploited. 

“This wasn’t just another vulnerability exploit, Interlock had a zero-day in their hands, giving them a week’s head start to compromise organizations before defenders even knew to look,” Moses said. 

“The real story here isn’t just about one vulnerability or one ransomware group — it’s about the fundamental challenge zero-day exploits pose to every security model. When attackers exploit vulnerabilities before patches exist, even the most diligent patching programs can’t protect you in that critical window.”

Cisco Secure Firewall Management Center is a centralized platform where administrators can manage Cisco firewalls from a single interface. 

Moses said they disclosed their findings to Cisco so guidance can be sent to customers. 

Amazon was able to discover information on exploitation of the bug and Interlock’s operations through a misconfigured infrastructure server that served as a staging area for the ransomware gang. 

The security researchers found a trove of custom malware, reconnaissance scripts, evasion techniques and more. 

They also found the Interlock ransom note and negotiation portal, which is how they attributed exploitation to the gang. 

“The ransom note’s invocation of multiple data protection regulations reflects Interlock’s documented practice of citing regulatory exposure to pressure victims, essentially threatening organizations not just with data encryption, but with regulatory fines and compliance violations,” Moses wrote. 

They noted that Interlock has historically targeted organizations that can ill afford operational downtime, like local governments and schools. 

The government of St. Paul, Minnesota, struggled for weeks to recover from an Interlock ransomware attack and the governor of the state was forced to call in the National Guard to assist in the recovery effort. 

The group’s attacks on the dialysis treatment company DaVita and one of the largest healthcare systems in Ohio caused outrage and exposed the sensitive health information of millions. 

According to Moses, the education sector represents the largest share of their activity. The ransomware gang’s leak site has listed multiple K-12 schools over the last six months, including several that reported cyberattacks or intrusions that caused wide-ranging issues for the educational institutions. 

Amazon researchers noticed that the actors typically operated in UTC+3, the timezone of Moscow and several Middle Eastern countries.  

Moses added that alongside the malicious tools Amazon researchers discovered, they found Interlock using an array of legitimate security tools during attacks, including ConnectWise ScreenConnect, incident response tool Volatility, offensive security product Certify, and more. 

The FBI and other federal agencies said last year that Interlock emerged in September 2024 and has repeatedly targeted critical infrastructure and businesses across North America and Europe. 

The advisory noted that analysts had identified potential links between Interlock and Rhysida — another ransomware operation known for its attacks on governments around the world. 

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

Recorded Future

No previous article

No new articles

Jonathan Greig

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.


文章来源: https://therecord.media/cisco-ransomware-interlock-firewalls
如有侵权请联系:admin#unsafe.sh