Interlock Ransomware Threat Landscape: Insights from the 2025 Kettering Health Attack

著者

In 2025, Interlock has rapidly evolved into a high impact ransomware operator leveraging social engineering lures, multi stage payload delivery, and data leak extortion to pressure victims. Security research highlights their use of techniques such as “ClickFix” style deceptive prompts, compromised websites, and stealer tool deployments during initial access phases. (Sekoia, 2025)

The attack on Kettering Health serves as the year’s defining example, with the group claiming theft of 941 GB of sensitive data and healthcare operations reporting significant service disruptions following the incident (Dayton Daily News,2025)

About Interlock

Interlock conducts coordinated multi stage ransomware campaigns that rely on social engineering for initial access, followed by credential harvesting, data theft, and high impact encryption across a range of operating systems. Public reporting consistently shows the group prioritizing double extortion, stealing large volumes of sensitive data before deploying ransomware to increase pressure on victims. Interlock has been observed targeting organizations in the healthcare and public services sectors. Reported victims include DaVita, Texas Tech University Health Science Center, Drug and Alcohol Treatment Services, Brockton Neighborhood Health Center, and Naper Grove Vision Care, along with their most significant attack of 2025 involving Kettering Health.

Kettering Health Attack Details

Kettering Health is a non-profit healthcare system in western Ohio that operates a large network of hospitals, specialty centers, and outpatient clinics. It includes roughly 14 medical centers and more than 120 care locations, supported by a workforce of thousands of physicians and staff. In May 2025, the organization suffered a ransomware attack in which the Interlock group gained unauthorized access from April 9 to May 20 and accessed or copied sensitive patient data. The attack caused a system wide outage, disrupted operations, and led to the leak of approximately 941 GB of stolen data. Core systems, including Epic and MyChart, were restored in early June, and security enhancements were implemented. The breach was reported to HHS with a placeholder of 501 affected individuals, though the final total is still pending. (HIPAA Journal, 2025)

The following timeline was compiled by The HIPAA Journal:

  • Apr 9, 2025: Interlock gains unauthorized access to Kettering Health’s network.
  • May 20, 2025: Attack is detected; system-wide outage forces staff to revert to manual processes.
  • May 21–30, 2025: Public updates issued; warnings released about scam calls, texts, and emails.
  • Jun 2–3, 2025: Core Epic EHR functionality is restored; emergency departments return to normal operations.
  • Jun 5, 2025: Interlock leaks approximately 941 GB of stolen data on its dark web site. (Figure 2)
  • Jun 9–10, 2025: Surgeries, imaging, pharmacy services, physician visits, and full MyChart access resume.
  • Jun 13, 2025: Normal operations for key services confirmed.
  • Jul 21, 2025: Breach reported to HHS with a placeholder count of 501 individuals.
  • Oct 17, 2025: Review confirms extensive patient information was compromised.

Figure 1 below provides a visual summary of the attack sequence, from the initial compromise through data theft, ransomware deployment, and operational disruption.

Figure 1. Interlock Ransomware attack’s sequence on Kettering Health
Figure 2. Kettering Health Files Exposed in the Worldwide Secrets Blog ( Sourced from RansomLook)

Operational Model

Interlock operates as a privately run ransomware group, not a traditional RaaS program. Research indicates no public affiliate recruitment, and campaigns appear to be conducted by a single, centralized operator rather than a large affiliate ecosystem. The group also maintains a private leak site known as the “Worldwide Secrets Blog”, which is used to publish sensitive data stolen from victims who refuse to pay. The site functions as the group’s public pressure mechanism, listing victim organizations, displaying breach announcements, and hosting links to leaked files. (Figure 2)

              Figure 3. Example view of the Worldwide Secrets Blog interface (Sourced from Sekoia)

Figure 3. Example view of the Worldwide Secrets Blog interface (Sourced from Sekoia)

The group’s operations are further characterized by:

  • Financial motivation, with extortion as the primary objective.
  • Double extortion tactics, stealing sensitive data before encryption to strengthen leverage.
  • Social engineering based initial access, often via fake update prompts or malicious redirects.
  • Credential harvesting using stealer malware or lightweight backdoors to expand access.
  • Lateral movement through legitimate remote services and compromised accounts.
  • Data staging and exfiltration prior to deploying ransomware payloads.
  • Multi platform ransomware deployment, enabling impact across Windows, Linux, BSD, and ESXi.
  • Leak site extortion, where stolen data is published to pressure victims into paying.

Delivery and Attack Chain

Interlock relies on delivery methods that mimic normal software activity, according to Arctic Wolf (ArticWolf, 2025). The group often compromises legitimate websites and turns them into fake update pages that prompt users to run commands or installers that appear routine. This approach blends into expected browser behavior and helps the intrusion bypass traditional endpoint defenses. Interlock has also been observed using the ClickFix social engineering technique, a method that presents users with false security or update prompts and guides them to run a copied PowerShell command. This tactic exploits user trust in familiar system messages and provides a reliable path for delivering the initial payload. (Centripetal, 2025)

Initial Access

  • Users are redirected to a fake browser update or ClickFix page hosted on a compromised site.
  • Victims are instructed to run an installer or paste a command, believing they are correcting an issue or updating their browser.
  • A legitimate Chrome or Edge installer may run as a decoy while a malicious PowerShell script executes silently in the background.
  • The script becomes the initial foothold, gathering basic system information and opening communication with attacker infrastructure.

Execution and Stealth

  • The PowerShell backdoor runs without a visible window and relaunches itself to remain hidden from the user.
  • It regularly contacts remote servers for new instructions or payloads.
  • Obfuscated commands and encoded strings are used to avoid simple signature-based detection.
  • At this stage, Interlock operators may deploy tools such as Interlock RAT or NodeSnake RAT for command execution and remote control.

Persistence and Tooling

  • Some script versions add persistence through registry changes to ensure the backdoor remains active after reboot.
  • The attackers may download a credential stealer or keylogger through PowerShell to collect credentials for lateral movement.
  • Tools such as Azure Storage Explorer and AzCopy have been reported for accessing and uploading data to cloud storage.
  • Data exfiltration can also involve WinSCP or similar file transfer utilities.

Infrastructure and Evasion

  • Early communication often passes through TryCloudflare tunnels, using temporary subdomains that resemble normal Cloudflare use.
  • This helps blend command and control traffic into legitimate patterns and makes it harder to block the attacker’s infrastructure.

Interlock Operational Ecosystem

The group operates within a broader ecosystem that supports its delivery methods and post compromise activity (Sekoia, 2025). The following tables provide a condensed overview of the tooling and techniques observed across Interlock operations:

Tools

CategoryToolsPurposeTTP
StealersLummaC2, BerserkStealerCredential theft and browser data harvestingCredential access, session theft, reconnaissance
Malicious ScriptsObfuscated PowerShell commandsPayload retrieval and executionCommand execution, defense evasion, script-based delivery

Campaign Techniques

TechniqueDescriptionTTP
ClickFix / Fake UpdatesFake update or fix prompts that trick users into running PowerShell commandsSocial engineering, user execution, initial access
ClearFake-style RedirectsRedirect chains leading to fake update or alert pagesDrive-by compromise, malicious redirection
Fake Browser AlertsDeceptive browser messages or reCAPTCHA-style promptsSocial engineering, user execution
Copy, Paste Execution FlowVictims copy and run malicious PowerShell commandsCommand execution through user interaction
Obfuscated Script DeliveryEncoded and obfuscated commands used to evade detectionDefense evasion, obfuscated files/scripts
Rotating Malicious DomainsUse of many short-lived domains tied to the ecosystemInfrastructure rotation, domain fluxing

Centripetal’s Perspective

As Interlock continues conducting ransomware operations across multiple sectors, Centripetal is performing focused analysis on external indicators associated with the group to better understand its infrastructure, delivery methods, and operational patterns. By compiling known indicators linked to Interlock, we can identify the consistent behaviors that define the group’s external operations and campaign activity. This intelligence driven approach provides a clearer picture of how Interlock operates and supports ongoing efforts to track changes in its tactics and external footprint.

Centripetal’s internal analysis of indicators associated with the Interlock ransomware group aligns closely with findings published by several leading security firms. The distribution of observed activity across business sectors within our customer base mirrors what has been documented in external reporting, reinforcing the accuracy of our assessment and confirming that Interlock’s targeting patterns remain consistent across independent intelligence sources.

A notable example comes from Hunter Strategy’s 2025 (Hunter Strategy, 2025) threat assessment on Interlock, which reports results consistent with our own analysis. As shown in Figure 3, more than 59 percent of events matching indicators associated with known Interlock activity were observed within the healthcare sector across Centripetal’s customer base. Hunter Strategy’s insights (Figure 4) reflect the same trend, further validating the accuracy of our attribution and the reliability of the indicators identified within Centripetal’s datasets.

Figure 4. Indicators of Compromise Identified in Centripetal’s Customer Base by Sector
Figure 5. Distribution of Attacks by Sector (Sourced from Hunter Strategy)

The consistency of these findings is further supported when comparing them with the attack timeline shown in Figure 5. Since December 2024, eight healthcare related attacks have been registered and attributed to Interlock, making healthcare the top targeted sector. This observation reinforces Centripetal’s own results, which show that healthcare organizations consistently generate the highest volume of matched indicators and attempted activity linked to Interlock’s infrastructure across our customer environments.

When viewed alongside sector distribution data and external assessments, the updated timeline provides additional confirmation. Interlock’s operational tempo and targeting preferences remain steady, with healthcare serving as its primary point of impact. The alignment between our internal telemetry, Hunter Strategy’s analysis, and publicly documented attack sequences reflects a coherent pattern of behavior that underscores the group’s sustained and deliberate campaign strategy. Interlock continues to prioritize high value environments where operational disruption has immediate and severe consequences.

Figure 6. Attack Timeline By month and Industry Distribution (Sourced from Hunter Strategy)

To contrast these findings with the previous attack timeline, we analyzed indicators in Centripetal’s threat intelligence month by month to align with periods where Interlock demonstrated the highest activity. During April 2025, nine attacks were recorded according to the referenced analysis. To illustrate the pace at which indicators are identified, incorporated, and deployed within Centripetal’s threat intelligence and across our customer environments, the graphs in Figure 6 show the progression of coverage for these indicators of compromise as attacks unfolded throughout the second quarter of 2025.

Figure 7. Indicators of Compromise Coverage ( Sourced from Centripetal)

Because ransomware indicators require verification and are often sourced from ongoing or undisclosed investigations, they are rarely available immediately after an attack. This delay means that the progression of coverage in the previous graphs reflects both the discovery of new indicators and the gradual release of validated intelligence over time.

The spike in attack volume between February and April shown in Hunter Strategy’s timeline (Figure 7) also aligns with the rapid increase in IOC coverage observed within Centripetal’s datasets during the same period. As Interlock intensified its operational activity, a corresponding surge of validated indicators entered our threat intelligence pipeline, resulting in the noticeable rise in coverage depicted in Figure 6. This correlation demonstrates that Centripetal’s IOC expansion closely tracks real world attack tempo, with peaks in adversary activity directly reflected in the pace at which indicators are identified, enriched, and deployed across our defenses.

Figure 8. Interlock Evolution Timeline (Sourced from Hunter Strategy)

Another strong indicator of Interlock’s operational model is the distribution of IOCs by tactic. Centripetal’s threat intelligence not only identifies malicious infrastructure but also classifies indicators based on the role they play within the attack chain. As shown in Figure 8, analysis of 82 domains attributed to Interlock reveals that over half support malware delivery, command and control activity, or phishing operations. These categories align closely with Interlock’s known reliance on staged payload servers, short lived C2 infrastructure, and email based initial access. The remaining domains function as redirectors or auxiliary infrastructure that supports execution and lateral movement. This distribution reinforces broader industry reporting on Interlock’s tactics and validates the accuracy of Centripetal’s indicator attribution.

Figure 9. Percentage of 82 Domain Indicators Associated with a Tactic (Sourced from Centripetal)

Coverage analysis of 85 Interlock attributed domains further validates the strength of Centripetal’s threat intelligence, with 96.5% already incorporated into our detection and shielding capabilities at the time of evaluation. This high level of coverage demonstrates the effectiveness of our intelligence ingestion pipeline and its ability to rapidly absorb and deploy indicators associated with active ransomware campaigns. The small portion of domains not yet covered reflects the typical delay between the moment an IOC first appears in the wild and when it becomes publicly documented or validated by Intelligence sources. Overall, the results reinforce that Centripetal is proactively shielding customers from the vast majority of Interlock’s known malicious infrastructure.

Figure 10. BDN Inclusion Coverage (Sourced from Centripetal)

Overall, the alignment between Centripetal’s telemetry, external reporting, and IOC coverage shows that Interlock remains a focused and consistent ransomware threat, with healthcare continuing to be its primary target. The group’s reliance on social engineering, staged payload delivery, and short lived infrastructure is reflected across both internal and third party datasets, reinforcing confidence in the indicators attributed to its operations. Centripetal’s rapid integration of validated IOCs ensures strong visibility into Interlock’s activity and supports proactive protection for customer environments as the group’s campaigns continue to evolve.

Centripetal is also pleased to offer Penetration Testing and Vulnerability Assessment services to help organizations identify vulnerabilities and reduce risk. If interested, please contact our Professional Services team at profservs@centripetal.ai or reach out to your Centripetal Account Representative.

Public Resources

  • The HIPAA Journal - Kettering Health Confirmed Patient Data Compromised in May 2025 Ransomware Attack
  • Kettering Health - Cybersecurity Incident
  • Dayton Daily News- Ransomware group claims it stole more than 730,000 files from Kettering Health
  • Security Week - Ransomware Gang Leaks Alleged Kettering Health Data
  • Industrial Cyber - Ransomware suspected in Kettering Health cyberattack disrupting patient services, canceling elective procedures
  • CISA - #StopRansomware: Interlock
  • Arctic Wolf - Threat Actor Profile: Interlock Ransomware
  • Picus Security - Interlock Ransomware Analysis, Simulation, and Mitigation - CISA Alert AA25-203A
  • Sekoia - Interlock ransomware evolving under the radar (IOCs extracted)
  • Fortinet - Ransomware Roundup - Interlock
  • SocPrime - Interlock Ransomware Detection: The FBI, CISA, and Partners Issue Joint Alert on Massive Attacks via the ClickFix Social Engineering Technique
  • Forescout - A Year Later, Interlock Ransomware Keeps Leveling Up
  • Talos Intelligence - Unwrapping the emerging Interlock ransomware attack
  • GitHub - IOCs (Cisco-Talos Repo)
  • GutHub - IOCs (ESentire Repo)
  • ThreatFox - Interlock associated IOCs
  • Centripetal - ClickFix and the New Era of Social Engineering
  • Hunter Strategy - The Rise of Interlock Ransomware Group

迫り来る脅威を知る。 次の脅威を止める。

こちらから無料の脅威アラート速報サービスに登録してください。

あなたの組織にふさわしいサイバー犯罪の防壁

当社のセキュリティ チームによるカスタム デモンストレーションにご登録ください。当社が優秀な人材と最も完全な脅威インテリジェンスのコレクションを結集して、驚くべきレベルの安心感を提供する方法を説明します。