Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

This startup wants enterprise software to look like prompts

Interlock ransomware exploits Cisco FMC Zero-Day CVE-2026-20131 to gain root access

Sequen wins $16 million to bring TikTok-style personalization technology to consumer businesses

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Interlock ransomware exploits Cisco FMC Zero-Day CVE-2026-20131 to gain root access
Identity

Interlock ransomware exploits Cisco FMC Zero-Day CVE-2026-20131 to gain root access

By March 18, 2026No Comments5 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Ravi LakshmananMarch 18, 2026Network security/ransomware

Amazon Threat Intelligence is warning of an active Interlock ransomware campaign that exploits a recently revealed critical security flaw in Cisco Secure Firewall Management Center (FMC) software.

The vulnerability in question, CVE-2026-20131 (CVSS score: 10.0), is a case of insecure deserialization of a user-supplied Java byte stream, which allows an unauthenticated, remote attacker to bypass authentication and execute arbitrary Java code as root on an affected device.

The security flaw is said to have been exploited as a zero-day since January 26, 2026, more than a month before it was made public by Cisco, according to data collected from the tech giant’s MadPot global sensor network.

“This was more than just a vulnerability exploit. Interlock was in control of the zero-day and was able to get a one-week head start on compromising organizations before defenders knew about it. Upon this discovery, we supported Cisco’s investigation and shared our findings with Cisco to protect our customers,” CJ Moses, Chief Information Security Officer (CISO) at Amazon Integrated Security, told The Hacker News. This is stated in the report shared.

Amazon said the discovery was made possible thanks to an operational security misstep on the part of the attackers that exposed the cybercriminal group’s operational toolkit via misconfigured infrastructure servers, providing insight into its multi-stage attack chain, custom-built remote access Trojans, reconnaissance scripts, and evasion techniques.

This attack chain involves sending a crafted HTTP request to a specific path in the affected software with the intent of executing arbitrary Java code, and then the compromised system issues an HTTP PUT request to an external server to confirm successful exploitation. Once this step is complete, commands are sent to fetch ELF binaries from remote servers hosting other tools linked to Interlock.

The list of tools identified is:

PowerShell reconnaissance script used for systematic Windows environment enumeration. Collects details about the operating system and hardware, running services, installed software, storage configuration, Hyper-V virtual machine inventory, list of user files across desktop, documents, and download directories, browser artifacts from Chrome, Edge, Firefox, Internet Explorer, and 360 browsers, active network connections, and RDP authentication events from the Windows event log. A custom remote access Trojan written in JavaScript and Java for command and control, interactive shell access, arbitrary command execution, bidirectional file transfer, and SOCKS5 proxy functionality. It also supports self-updating and self-removal mechanisms that allow artifacts to be replaced or removed without reinfecting machines or challenging forensic investigation. A Bash script to configure a Linux server as an HTTP reverse proxy and hide the attacker’s true origin. This script provides fail2ban, an open source Linux intrusion prevention tool, and compiles and generates a HAProxy instance that listens on port 80 and forwards all incoming HTTP traffic to a hard-coded target IP address. In addition, the infrastructure laundering script runs a log cleaning routine as a cron job every five minutes, aggressively deleting and purging the contents of *.log files, and unsetting the HISTFILE variable to suppress shell history. A memory-resident web shell for inspecting incoming requests for specially crafted parameters containing encrypted command payloads. It is then decrypted and executed. A lightweight network beacon for making calls to attacker-controlled infrastructure. It could be validating successful code execution after initial exploitation or checking network port reachability. ConnectWise ScreenConnect provides persistent remote access and serves as an alternative route if other scaffolding is detected and removed. Volatility Framework, an open source memory forensics framework

The link to Interlock stems from “intensive” technical and operational indicators, such as an embedded ransom note and the TOR negotiation portal. Evidence indicates that the attacker is likely operating in the UTC+3 time zone.

Given the active exploitation of this flaw, we recommend that users patch as soon as possible, conduct security assessments to identify potential compromises, review ScreenConnect deployments for unauthorized installations, and implement a defense-in-depth strategy.

“The real story here is not just about one vulnerability or one group of ransomware. It’s about the fundamental challenge that zero-day exploits pose to any security model,” said Moses. “If an attacker exploits a vulnerability before a patch exists, even the most diligent patching program will fail to protect users at that critical time.”

“This is exactly why defense in depth is so important. Layered security controls provide protection when a single control fails or is not yet in place. Rapid patching remains fundamental to vulnerability management, but defense in depth helps ensure that organizations are not left vulnerable in the period between exploit and patch.”

The disclosure comes after ransomware attackers revealed that they are changing their tactics in response to lower payout rates, targeting common VPN and firewall vulnerabilities for initial access, and focusing on Windows’ built-in features over external tools.

Multiple threat clusters, both ransomware operators themselves and early access brokers, have also been found to employ malvertising and search engine optimization (SEO) tactics to distribute malware payloads for initial access. Other commonly observed techniques include establishing a foothold using compromised credentials, backdoors, or legitimate remote desktop software, and leveraging built-in or already installed tools for reconnaissance, privilege escalation, and lateral movement.

“We expect ransomware to continue to be one of the world’s most dominant threats, but declining profits may lead some threat actors to seek other monetization methods,” Google said in a statement. “This could manifest as increased data theft, the use of more aggressive extortion tactics, or opportunistic use of access to victims’ environments for secondary monetization mechanisms, such as using compromised infrastructure to send phishing messages.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleSequen wins $16 million to bring TikTok-style personalization technology to consumer businesses
Next Article This startup wants enterprise software to look like prompts

Related Posts

Get your threat model right

March 18, 2026

9 critical IP KVM flaws allow unauthenticated root access across 4 vendors

March 18, 2026

How Mesh CSMA reveals and blocks attack vectors to Crown Jewel

March 18, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

This startup wants enterprise software to look like prompts

Interlock ransomware exploits Cisco FMC Zero-Day CVE-2026-20131 to gain root access

Sequen wins $16 million to bring TikTok-style personalization technology to consumer businesses

Nuclear power plants meet data center energy needs

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.