⚠️ Category: Healthcare & Infrastructure Ransomware Attacks ⚠️
Features: Drive-by Downloads, Credential Theft, ClickFix Social Engineering, Dual-OS Payloads
Delivery Method: Fake Browser Updates, Info-Stealers (Lumma, Berserk), Malvertising
Threat Actor: Interlock Ransomware Group (Possible Rhysida Links)
The Breakdown
A joint cybersecurity advisory issued this week by the FBI, CISA, the Department of Health and Human Services (HHS), and MS-ISAC warns of an increasingly active ransomware threat group known as Interlock, responsible for multiple high-profile attacks across North America and Europe. While the group has notably disrupted healthcare systems, including DaVita and a major provider in Ohio, officials stress that no sector is off-limits—Interlock targets victims based on vulnerability, not industry.
Origins & Tactics: Who is Interlock?
Interlock emerged around September 2024 and has quickly distinguished itself through the use of unorthodox and deceptive intrusion methods. Unlike ransomware crews that rely on phishing alone, Interlock actors are using more covert, drive-by download campaigns. Victims are compromised simply by visiting a malicious website, where code is executed in the background to drop malware onto their systems without their knowledge.
Other initial access vectors include:
- Fake browser updates (Google Chrome & Microsoft Edge clones)
- ClickFix social engineering, where users are duped into installing “fixes” for made-up errors or performance issues
- Malvertising embedded in ad networks that redirect to payload hosts
These tactics point to a sophisticated and adaptable campaign, capable of bypassing traditional awareness training or endpoint detection tools.
Payload Details & Operating System Targeting
Interlock has developed custom encryptors for both Windows and Linux environments, showcasing a broader operational scope than many single-platform ransomware groups. This makes them especially dangerous for hybrid enterprise networks running cross-OS infrastructure—such as medical equipment, legacy systems, and cloud-hosted services.
Ransom notes from Interlock are minimalist, often lacking direct ransom amounts or instructions. Instead, victims are given communication channels to negotiate directly, typically with demands made in Bitcoin. This vague format is a growing trend among newer ransomware actors who wish to avoid hard attribution or early detection by law enforcement monitors.
Possible Links to Rhysida?
Federal analysts have suggested that Interlock may share operational or developmental ties to Rhysida—a ransomware group with a history of government attacks, particularly in Latin America, Europe, and Southeast Asia. While attribution is still underway, similarities in payload structure, language, and deployment tactics have raised red flags.
Impact on Healthcare Systems
What makes Interlock especially dangerous is its direct targeting of healthcare services—a sector already overwhelmed by staffing shortages, outdated tech stacks, and overburdened cybersecurity teams.
In one of the most notable attacks of 2025, Interlock disabled systems at DaVita, a dialysis treatment giant, disrupting patient care nationwide. Another attack in Ohio resulted in the forced shutdown of a major regional hospital network, triggering emergency response coordination between federal agencies and state health officials.
These attacks come as hospitals continue to adopt AI-driven systems for diagnostics and operations—systems that are, ironically, becoming the very vulnerabilities that ransomware groups exploit. The targeting of life-saving infrastructure isn’t just criminal—it’s terroristic by design.
Tools in Their Arsenal: Credential Theft & Info-Stealers
Once initial access is obtained, Interlock actors deploy advanced information-stealing malware, including:
- Lumma Stealer – A widely used stealer designed to extract browser credentials, session cookies, and crypto wallet data
- Berserk Stealer – Known for stealth privilege escalation and lateral movement across enterprise networks
These tools give attackers persistence and flexibility, allowing them to exfiltrate data, disable security controls, and deepen compromise long before deploying encryption.
Federal Response & Mitigation Efforts
The FBI and its partners continue to release targeted ransomware alerts in an attempt to get ahead of live threat campaigns. While many advisories are too late to stop initial breaches, they serve as crucial intelligence for other organizations trying to harden their environments.
On a parallel front, federal law enforcement has been working directly with victims, often developing custom decryptors or pursuing legal actions against infrastructure providers used by these groups.
A recent success story: The Japanese government, in collaboration with the FBI, announced the release of a decryptor for Phobos ransomware just last week—a small win in an otherwise uphill battle.
TRJ Forecast: What Comes Next
30-Day Threat Outlook:
| Vector | Forecast | Confidence |
|---|---|---|
| Healthcare Sector Attacks | 🚨 High Likelihood | 🔒 Confirmed Pattern |
| New Linux Variants | ⚠️ Moderate Likelihood | 📊 Observed Expansion |
| Rhysida Link Confirmation | 🔍 Under Investigation | 🟡 Partial Match |
| U.S. Infrastructure Targeting | 🚨 High Likelihood | 📡 Behavioral Tracking |
| Fake Update Lures | 🔁 Continues to Expand | 🧠 Social Engineering Evolution |
TRJ Final Verdict:
Interlock is not just another ransomware strain—it’s an active digital insurgency against critical life-sustaining systems.
The use of fake browser updates, AI-targeted exploits, and healthcare system takedowns shows a pattern of escalation—not experimentation.
This group operates with strategy, patience, and malice—and in an environment of rising medical automation and lagging cybersecurity, they are finding open doors at every turn.
🔥 NOW AVAILABLE! 🔥
📖 INK & FIRE: BOOK 1 📖
A bold and unapologetic collection of poetry that ignites the soul. Ink & Fire dives deep into raw emotions, truth, and the human experience—unfiltered and untamed.
🔥 Kindle Edition 👉 https://a.co/d/9EoGKzh
🔥 Paperback 👉 https://a.co/d/9EoGKzh
🔥 Hardcover Edition 👉 https://a.co/d/0ITmDIB
🔥 NOW AVAILABLE! 🔥
📖 INK & FIRE: BOOK 2 📖
A bold and unapologetic collection of poetry that ignites the soul. Ink & Fire dives deep into raw emotions, truth, and the human experience—unfiltered and untamed just like the first one.
🔥 Kindle Edition 👉 https://a.co/d/1xlx7J2
🔥 Paperback 👉 https://a.co/d/a7vFHN6
🔥 Hardcover Edition 👉 https://a.co/d/efhu1ON
Get your copy today and experience poetry like never before. #InkAndFire #PoetryUnleashed #FuelTheFire
🚨 NOW AVAILABLE! 🚨
📖 THE INEVITABLE: THE DAWN OF A NEW ERA 📖
A powerful, eye-opening read that challenges the status quo and explores the future unfolding before us. Dive into a journey of truth, change, and the forces shaping our world.
🔥 Kindle Edition 👉 https://a.co/d/0FzX6MH
🔥 Paperback 👉 https://a.co/d/2IsxLof
🔥 Hardcover Edition 👉 https://a.co/d/bz01raP
Get your copy today and be part of the new era. #TheInevitable #TruthUnveiled #NewEra
🚀 NOW AVAILABLE! 🚀
📖 THE FORGOTTEN OUTPOST 📖
The Cold War Moon Base They Swore Never Existed
What if the moon landing was just the cover story?
Dive into the boldest investigation The Realist Juggernaut has ever published—featuring declassified files, ghost missions, whistleblower testimony, and black-budget secrets buried in lunar dust.
🔥 Kindle Edition 👉 https://a.co/d/2Mu03Iu
🛸 Paperback Coming Soon
Discover the base they never wanted you to find. TheForgottenOutpost #RealistJuggernaut #MoonBaseTruth #ColdWarSecrets #Declassified
Support truth, health, and preparedness by shopping the Alex Jones Store through our link. Every purchase helps sustain independent voices and earns us a 10% share to fuel our mission. Shop now and make a difference!
https://thealexjonesstore.com?sca_ref=7730615.EU54Mw6oyLATer7a


As the father of a kidney transplant recipient, what happened at DaVita in inexcusable. I agree with you, John, that “The targeting of life-saving infrastructure isn’t just criminal—it’s terroristic by design.” Because healthcare services are being targeted, those found guilty of such terrorism need to be punished to the full extent of the law. Interlock and those like them need to be stopped and those responsible for health care systems need to beef up their security.
Thank you for this post, John.
Thanks so much for sharing that, Chris — and as a father of a kidney transplant recipient, your perspective carries real weight. What happened at DaVita wasn’t just negligence. It was an assault on the vulnerable. You’re absolutely right — this isn’t just some abstract “cyber event.” It’s the deliberate targeting of life-sustaining infrastructure, and it’s terroristic in both method and consequence.
People depend on those systems to stay alive, and any group that compromises them should be held fully accountable — not just as hackers, but as criminals with intent. We cannot let digital attacks on healthcare become normalized. And yes, the entire industry must level up its security — yesterday.
Thank you again, Chris. Your voice, and your experience, matter.
You’re welcome, John, and thank you for the reply!