toad.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Mastodon server operated by David Troy, a tech pioneer and investigative journalist addressing threats to democracy. Thoughtful participation and discussion welcome.

Administered by:

Server stats:

218
active users

#interlock

2 posts2 participants0 posts today
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/CISA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISA</span></a> and <a href="https://mastodon.thenewoil.org/tags/FBI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FBI</span></a> warn of escalating <a href="https://mastodon.thenewoil.org/tags/Interlock" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Interlock</span></a> <a href="https://mastodon.thenewoil.org/tags/ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ransomware</span></a> attacks</p><p><a href="https://www.bleepingcomputer.com/news/security/cisa-and-fbi-warn-of-escalating-interlock-ransomware-attacks/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/cisa-and-fbi-warn-of-escalating-interlock-ransomware-attacks/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a></p>
Geeky Malcölm 🇨🇦<p>Joint Advisory Issued on Protecting Against <a href="https://ioc.exchange/tags/Interlock" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Interlock</span></a> <a href="https://ioc.exchange/tags/Ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ransomware</span></a></p><p><a href="https://www.cisa.gov/news-events/alerts/2025/07/22/joint-advisory-issued-protecting-against-interlock-ransomware" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">cisa.gov/news-events/alerts/20</span><span class="invisible">25/07/22/joint-advisory-issued-protecting-against-interlock-ransomware</span></a></p>
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/Interlock" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Interlock</span></a> <a href="https://mastodon.thenewoil.org/tags/ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ransomware</span></a> adopts <a href="https://mastodon.thenewoil.org/tags/FileFix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FileFix</span></a> method to deliver <a href="https://mastodon.thenewoil.org/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a></p><p><a href="https://www.bleepingcomputer.com/news/security/interlock-ransomware-adopts-filefix-method-to-deliver-malware/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/interlock-ransomware-adopts-filefix-method-to-deliver-malware/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.thenewoil.org/tags/cybercrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybercrime</span></a></p>
securityaffairs<p><a href="https://infosec.exchange/tags/Interlock" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Interlock</span></a> <a href="https://infosec.exchange/tags/ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ransomware</span></a> group deploys new PHP-based <a href="https://infosec.exchange/tags/RAT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RAT</span></a> via FileFix<br><a href="https://securityaffairs.com/179919/cyber-crime/interlock-ransomware-group-deploys-new-php-based-rat-via-filefix.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/179919/cyb</span><span class="invisible">er-crime/interlock-ransomware-group-deploys-new-php-based-rat-via-filefix.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a></p>
securityaffairs<p><a href="https://infosec.exchange/tags/Interlock" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Interlock</span></a> <a href="https://infosec.exchange/tags/ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ransomware</span></a> group deploys new PHP-based <a href="https://infosec.exchange/tags/RAT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RAT</span></a> via FileFix<br><a href="https://securityaffairs.com/179919/cyber-crime/interlock-ransomware-group-deploys-new-php-based-rat-via-filefix.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/179919/cyb</span><span class="invisible">er-crime/interlock-ransomware-group-deploys-new-php-based-rat-via-filefix.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a></p>
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/Interlock" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Interlock</span></a> <a href="https://mastodon.thenewoil.org/tags/ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ransomware</span></a> claims <a href="https://mastodon.thenewoil.org/tags/KetteringHealth" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KetteringHealth</span></a> breach, leaks stolen data</p><p><a href="https://www.bleepingcomputer.com/news/security/interlock-ransomware-claims-kettering-health-breach-leaks-stolen-data/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/interlock-ransomware-claims-kettering-health-breach-leaks-stolen-data/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.thenewoil.org/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.thenewoil.org/tags/DataBreach" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DataBreach</span></a> <a href="https://mastodon.thenewoil.org/tags/healthcare" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>healthcare</span></a></p>
The DFIR Report<p>"The remote endpoints it attempted to contact included several TryCloudflare domains as well as direct IP addresses.</p><p>The logic would rotate through the various servers until an online host was found. The malware in this case took 15 minutes to establish a successful connection to an online endpoint at hxxp://bristol-weed-martin-know[.]trycloudflare[.]com/init1234."</p><p>➡️ The above is from a recent Private Threat Brief: "Interlock-Linked Threat Actor Gains Access via Fake Teams ClickFix Lure"</p><p>➡️➡️Interested in receiving reports like this one? Contact us for a demo or pricing - <a href="https://thedfirreport.com/contact/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">thedfirreport.com/contact/</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/dfir" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dfir</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/cyberthreatintelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyberthreatintelligence</span></a> <a href="https://infosec.exchange/tags/cti" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cti</span></a> <a href="https://infosec.exchange/tags/interlock" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>interlock</span></a> <a href="https://infosec.exchange/tags/ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ransomware</span></a></p>
ITSEC News<p>Interlock ransomware: what you need to know - "We don’t just want payment; we want accountability." The malicious hackers behind the I... <a href="https://www.tripwire.com/state-of-security/interlock-ransomware-what-you-need-know" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">tripwire.com/state-of-security</span><span class="invisible">/interlock-ransomware-what-you-need-know</span></a> <a href="https://schleuss.online/tags/ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ransomware</span></a> <a href="https://schleuss.online/tags/databreach" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>databreach</span></a> <a href="https://schleuss.online/tags/guestblog" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>guestblog</span></a> <a href="https://schleuss.online/tags/interlock" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>interlock</span></a> <a href="https://schleuss.online/tags/clickfix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>clickfix</span></a> <a href="https://schleuss.online/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a></p>
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/Interlock" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Interlock</span></a> <a href="https://mastodon.thenewoil.org/tags/ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ransomware</span></a> gang deploys new <a href="https://mastodon.thenewoil.org/tags/NodeSnake" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NodeSnake</span></a> <a href="https://mastodon.thenewoil.org/tags/RAT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RAT</span></a> on universities</p><p><a href="https://www.bleepingcomputer.com/news/security/interlock-ransomware-gang-deploys-new-nodesnake-rat-on-universities/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/interlock-ransomware-gang-deploys-new-nodesnake-rat-on-universities/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.thenewoil.org/tags/education" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>education</span></a></p>
securityaffairs<p>How <a href="https://infosec.exchange/tags/Interlock" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Interlock</span></a> <a href="https://infosec.exchange/tags/Ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ransomware</span></a> Affects the Defense Industrial Base Supply Chain<br><a href="https://securityaffairs.com/177792/malware/how-interlock-ransomware-affects-the-defense-industrial-base-supply-chain.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/177792/mal</span><span class="invisible">ware/how-interlock-ransomware-affects-the-defense-industrial-base-supply-chain.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a></p>
Dissent Doe :cupofcoffee:<p><span class="h-card" translate="no"><a href="https://infosec.exchange/@amvinfe" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>amvinfe</span></a></span> <span class="h-card" translate="no"><a href="https://infosec.exchange/@douglevin" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>douglevin</span></a></span> <span class="h-card" translate="no"><a href="https://freeradical.zone/@funnymonkey" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>funnymonkey</span></a></span> </p><p>A few weeks ago, <a href="https://infosec.exchange/tags/InterLock" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InterLock</span></a> leaked a lot of data allegedly from Madison School District, which is also in Phoenix, AZ. <br> I wonder if there was some common vendor between Madison and Fowler or some common denominator. </p><p>I didn't spot any statement or <a href="https://infosec.exchange/tags/databreach" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>databreach</span></a> disclosure on Madison's site or Twitter account. </p><p><a href="https://infosec.exchange/tags/ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ransomware</span></a> <a href="https://infosec.exchange/tags/notification" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>notification</span></a> <a href="https://infosec.exchange/tags/transparency" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>transparency</span></a></p>
amvinfe<p>The Fowler Elementary School District, located in Phoenix, Arizona, has reportedly fallen victim to a cyberattack involving what may be a substantial volume of sensitive data. The incident was claimed by the Interlock ransomware group, which published its announcement on May 3, 2025, through a post on its blog hosted within the Tor network. </p><p><a href="https://www.suspectfile.com/data-breach-at-fowler-elementary-school-district-the-interlock-ransomware-groups-attack/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">suspectfile.com/data-breach-at</span><span class="invisible">-fowler-elementary-school-district-the-interlock-ransomware-groups-attack/</span></a></p><p><span class="h-card" translate="no"><a href="https://infosec.exchange/@PogoWasRight" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>PogoWasRight</span></a></span> <span class="h-card" translate="no"><a href="https://infosec.exchange/@douglevin" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>douglevin</span></a></span> @funnymonkey<br><a href="https://infosec.exchange/tags/Interlock" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Interlock</span></a> <a href="https://infosec.exchange/tags/FESD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FESD</span></a> <a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/Data_Breach" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Data_Breach</span></a> <a href="https://infosec.exchange/tags/Ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ransomware</span></a></p>
securityaffairs<p><a href="https://infosec.exchange/tags/Interlock" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Interlock</span></a> <a href="https://infosec.exchange/tags/ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ransomware</span></a> gang started leaking data allegedly stolen from leading kidney dialysis firm DaVita<br><a href="https://securityaffairs.com/176946/cyber-crime/interlock-ransomware-gang-started-leaking-data-allegedly-stolen-from-leading-kidney-dialysis-firm-davita.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/176946/cyb</span><span class="invisible">er-crime/interlock-ransomware-gang-started-leaking-data-allegedly-stolen-from-leading-kidney-dialysis-firm-davita.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a></p>
Dissent Doe :cupofcoffee:<p>Updating an incident: </p><p>The InterLock ransomware gang has claimed responsibility for the DaVita attack. They claim to have exfiltrated &nbsp;1,510 GB of data,&nbsp; 683,104 files, and&nbsp; 75,836 folders, and have leaked the file tree and some folder information.</p><p><a href="https://infosec.exchange/tags/healthsec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>healthsec</span></a> <a href="https://infosec.exchange/tags/ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ransomware</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/DaVita" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DaVita</span></a> <a href="https://infosec.exchange/tags/InterLock" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InterLock</span></a> <a href="https://infosec.exchange/tags/databreach" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>databreach</span></a></p>
Sekoia.io<p>Since the apparition of the <a href="https://infosec.exchange/tags/Interlock" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Interlock</span></a> ransomware, the Sekoia <a href="https://infosec.exchange/tags/TDR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TDR</span></a> team observed its operators evolving, improving their toolset (<a href="https://infosec.exchange/tags/LummaStealer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LummaStealer</span></a> and <a href="https://infosec.exchange/tags/BerserkStealer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BerserkStealer</span></a>), and leveraging new techniques such as <a href="https://infosec.exchange/tags/ClickFix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ClickFix</span></a> to deploy the ransomware payload. </p><p><a href="https://blog.sekoia.io/interlock-ransomware-evolving-under-the-radar/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.sekoia.io/interlock-ranso</span><span class="invisible">mware-evolving-under-the-radar/</span></a></p>
nemo™ 🇺🇦<p><span class="h-card" translate="no"><a href="https://social.tchncs.de/@PC_Fluesterer" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>PC_Fluesterer</span></a></span> (2/2)</p><p>For a deeper understanding of these attacks, further reading is recommended. Please inspect the additional reading links appended here:</p><p><a href="https://www.loginsoft.com/post/the-rise-of-interlock-ransomware" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">loginsoft.com/post/the-rise-of</span><span class="invisible">-interlock-ransomware</span></a></p><p><a href="https://www.moxfive.com/resources/moxfive-threat-actor-spotlight-interlock-ransomware" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">moxfive.com/resources/moxfive-</span><span class="invisible">threat-actor-spotlight-interlock-ransomware</span></a></p><p><a href="https://www.virustotal.com/gui/file/e9ff4d40aeec2ff9d2886c7e7aea7634d8997a14ca3740645fd3101808cc187b/detection" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">virustotal.com/gui/file/e9ff4d</span><span class="invisible">40aeec2ff9d2886c7e7aea7634d8997a14ca3740645fd3101808cc187b/detection</span></a></p><p><a href="https://mas.to/tags/Interlock" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Interlock</span></a> <a href="https://mas.to/tags/ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ransomware</span></a></p>
nemo™ 🇺🇦<p><span class="h-card" translate="no"><a href="https://social.tchncs.de/@PC_Fluesterer" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>PC_Fluesterer</span></a></span> <a href="https://mas.to/tags/Interlock" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Interlock</span></a> <a href="https://mas.to/tags/ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ransomware</span></a> specifically targets VMware's ESXi hypervisors, installed with <a href="https://mas.to/tags/FreeBSD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FreeBSD</span></a> insyde the VMs exploiting vulnerabilities to attack virtual environments. By compromising virtual machines (VMs), it can encrypt critical data and modify root passwords on ESXi hosts, effectively disrupting operations. The malware often leverages malicious DLLs in the tempered scheduler to facilitate its attacks on hypervisors, making recovery challenging. (1/2)</p>
nemo™ 🇺🇦<p>🚨 The recent rise of Interlock ransomware highlights a critical need for enhanced security standards in our infrastructure! 🛡️ Targeting FreeBSD servers, this group has already impacted multiple organizations, emphasizing the importance of multi-layered defenses. 🔐 Organizations must prioritize security to prevent devastating breaches! Read more here: <a href="https://www.techradar.com/pro/security/interlock-ransomware-attacks-highlight-need-for-greater-security-standards-on-critical-infrastructure" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">techradar.com/pro/security/int</span><span class="invisible">erlock-ransomware-attacks-highlight-need-for-greater-security-standards-on-critical-infrastructure</span></a> <a href="https://mas.to/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mas.to/tags/Ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ransomware</span></a> <a href="https://mas.to/tags/Interlock" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Interlock</span></a> <a href="https://mas.to/tags/FreeBSD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FreeBSD</span></a> <a href="https://mas.to/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://mas.to/tags/newz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>newz</span></a></p>
RansomLook<p>New post from <a href="https://social.circl.lu/tags/Interlock" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Interlock</span></a> : Boston Chinatown Neighborhood Center<br>More at : <a href="https://www.ransomlook.io/group/Interlock" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">ransomlook.io/group/Interlock</span><span class="invisible"></span></a> <a href="https://social.circl.lu/tags/Ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ransomware</span></a></p>
Defensorum<p>🔒 <a href="https://mastodon.social/tags/Ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ransomware</span></a> strikes again! <a href="https://mastodon.social/tags/Interlock" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Interlock</span></a> targets healthcare, disrupting patient care &amp; threatening data leaks. Learn how to boost your defenses now. 💉📉 <a href="https://mastodon.social/tags/CyberThreat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberThreat</span></a> <a href="https://mastodon.social/tags/Healthcare" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Healthcare</span></a> <a href="https://www.defensorum.com/us-healthcare-organizations-targeted-by-new-interlock-ransomware-group/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">defensorum.com/us-healthcare-o</span><span class="invisible">rganizations-targeted-by-new-interlock-ransomware-group/</span></a></p>