Quorum Cyber, a cybersecurity firm, announced that it has identified two new variants of a Remote Access Trojan (RAT) tracked as NodeSnake.
The Quorum Cyber Threat Intelligence team is tracking this malware, which is highly likely attributed to Interlock ransomware due to infrastructure attribution.
Quorum Cyber’s NodeSnake report
Quorum Cyber’s NodeSnake report contains a detailed technical analysis and recommendations
The team assessed that Interlock has likely recently shifted tactics to target both local government organisations and the higher education sector, based on recent observed activity.
Quorum Cyber’s NodeSnake report contains a detailed technical analysis and recommendations to mitigate the effects of the malware.
Quorum Cyber’s Threat Intelligence
Threat actors can use RATs to gain remote control over infected systems, access files, monitor activities, manipulate system settings, edit, delete or exfiltrate data. They can maintain persistence within an organisation as well as to introduce additional tooling or malware to the environment.
Quorum Cyber’s Threat Intelligence team discovered code commonality within malware deployed against two British higher education institutions within a two-month period.
Interlock ransomware infrastructure
Interlock ransomware infrastructure seen targeting British universities, has now been detected
On analysis, it is probable that both NodeSnake RATs were placed within the universities by the same threat actor. It is also certain that both instances of this malware are from the same family, with the later iteration possessing considerable advancements over the earlier variant.
In a recent development, Interlock ransomware infrastructure seen targeting British universities, has now been detected impacting regional councils in the country.
Use of the NodeSnake variants
“We have observed threat actors increasingly targeting universities this year to exfiltrate valuable intellectual property, including research data, and possibly to test and hone new tactics, techniques, and procedures before potentially applying them in other sectors,” said Paul Caiazzo, Chief Threat Officer at Quorum Cyber.
“Theft of research data suggests an espionage motivation, and as such, our Threat Intelligence team continues to monitor Interlock and its use of the NodeSnake variants so that we can advise organisations across sectors on practical steps they can take to prevent the theft of their own intellectual property.”
Double-extortion tactics
Interlock has targeted large or high-value organisations in a range of industries
First observed in September 2024, Interlock has targeted large or high-value organisations in a range of industries across North America and Europe. It’s known to employ double-extortion tactics by encrypting data and threatening to release it unless a ransom fee is paid.
Unlike many other ransomware groups, Interlock does not operate as a Ransomware-as-a-Service (RaaS) and has no known affiliates.
Relevant ransomware reports
Interlock ransomware could target both Linux and Windows operating systems, providing it with broad targeting capabilities.
Quorum Cyber’s Threat Intelligence Community Group publishes a large collection of relevant ransomware reports, threat actor profiles, and timely threat intelligence bulletins that can all be downloaded for free.
Learn why leading casinos are upgrading to smarter, faster, and more compliant systems
