Ransomware

Interlock Ransomware Exploited Cisco Firewall CVE for Weeks Before Detection

πŸ“… 2026-03-18
Primary Source β†—

Incident Details

The Interlock ransomware group exploited a maximum-severity vulnerability in Cisco adaptive security appliances (ASA) or Firepower Threat Defense (FTD) firewalls, gaining persistent network access weeks before deploying ransomware payloads. The extended dwell time allowed extensive reconnaissance, lateral movement, and data exfiltration prior to the ransomware deployment event. Cisco issued patches for the vulnerability but organizations with delayed patching were compromised. Interlock has targeted healthcare, manufacturing, and government organizations. The use of a CVSS 10.0 network edge vulnerability as an initial access vector β€” rather than phishing β€” represents a shift in Interlock’s TTPs. Affected organizations were advised to immediately patch Cisco perimeter devices.

Technical Details

Initial Attack Vector
Interlock ransomware group exploited a critical vulnerability (CVSS 10.0) in Cisco ASA/FTD firewalls to gain initial access to victim networks weeks before deploying ransomware

Timeline

  1. 2026-03-18 Breach occurred
  2. 2026-03-18 Publicly disclosed