See every side of every news story
Published loading...Updated

Hackers Are Abusing 'FileFix' Technique to Drop RATs During Ransomware Attacks

JUL 14 – The Interlock ransomware group evolved its remote access trojan to a PHP variant using FileFix, a method abusing Windows UI to trick users, with activity observed since May 2025.

  • Researchers identified that in June 2025, Interlock ransomware attackers began using a new FileFix technique to deploy a PHP-based remote access trojan .
  • This shift followed the group’s initial emergence in September 2024 and signaled a transition from a JavaScript Node.js RAT to a PHP variant for evasion and persistence.
  • Attackers employ compromised websites with injected scripts prompting victims to execute disguised commands in File Explorer, triggering PowerShell scripts that download the PHP RAT from masked Cloudflare Tunnel URLs.
  • The PHP RAT executes extensive system reconnaissance, gathers network details as JSON, supports downloading executables, registry persistence, and commands remote shells, often escalating to Node.js for deeper access.
  • This evolving delivery method suggests growing attacker sophistication, requiring defenders to strengthen monitoring of web-inject threats and adapt to the widespread and opportunistic Interlock ransomware campaigns.
Insights by Ground AI
Does this summary seem wrong?

11 Articles

The Interlock cybercriminal gang is refining its infiltration methods. Known for their ransomware attacks, the hackers are shifting their tactics to combine social engineering and malware. They are the first to exploit a tactic called FileFix.

Think freely.Subscribe and get full access to Ground NewsSubscriptions start at $9.99/yearSubscribe

Bias Distribution

  • 100% of the sources are Center
100% Center

Factuality 

To view factuality data please Upgrade to Premium

Ownership

To view ownership data please Upgrade to Vantage

The DFIR Report broke the news in on Monday, July 14, 2025.
Sources are mostly out of (0)

Similar News Topics