Interlock RAT Strikes Now Globally
Interlock RAT strikes now with a new PHP variant since July 2025. Researchers detected this threat targeting multiple industries. For example, it uses FileFix to spread malware widely. This endangers systems worldwide.
How the Attack Begins
Attackers inject hidden scripts into compromised websites. They deploy a traffic distribution system to redirect users. Additionally, fake CAPTCHA pages trick victims into running scripts. Consequently, malware infects devices silently.
Malware Tactics and Impact
The RAT grants attackers full remote control. It steals system data and executes commands remotely. For instance, it moves laterally using RDP. As a result, networks face persistent threats.
Targeting and Evolution
The campaign hits local governments and education sectors. It shifted from Node.js to a PHP variant recently. A report notes activity since May 2025. Therefore, its scope expands over time.
Delivery Mechanism
FileFix evolves from ClickFix to exploit Windows. It uses File Explorer’s address bar for commands. Moreover, it delivers Interlock RAT via PowerShell scripts. This enhances its delivery efficiency.
Nature of the Malware
Interlock RAT acts as a Trojan horse virus. It disguises itself in legit downloads or emails. For example, it creates backdoors and forms botnets. As a result, attackers dominate infected systems.
Broader Cyber Risks
Similar RATs target various industries opportunistically. They use Cloudflare Tunnel for C2 hiding. For instance, hard-coded IPs ensure communication. As a result, detection grows tougher.
Challenges for Detection
The hidden scripts evade site owner notice. Cloudflare subdomains mask C2 locations. Additionally, registry changes hide persistence. This demands advanced tools to track the threat.
Preventing Interlock RAT Attacks
To stop Interlock RAT, avoid clicking unknown links. For example, check website security before visiting. Seek expert penetration testing to find vulnerabilities and boost network safety. Additionally, update software regularly. These steps help shield against remote threats.
Sleep well, we got you covered.

