Ransomware
Interlock Ransomware Exploited Cisco Firewall CVE for Weeks Before Detection
Primary Source βIncident Details
The Interlock ransomware group exploited a maximum-severity vulnerability in Cisco adaptive security
appliances (ASA) or Firepower Threat Defense (FTD) firewalls, gaining persistent network access weeks before
deploying ransomware payloads. The extended dwell time allowed extensive reconnaissance, lateral movement, and
data exfiltration prior to the ransomware deployment event. Cisco issued patches for the vulnerability but
organizations with delayed patching were compromised. Interlock has targeted healthcare, manufacturing, and
government organizations. The use of a CVSS 10.0 network edge vulnerability as an initial access vector β
rather than phishing β represents a shift in Interlock’s TTPs. Affected organizations were advised to
immediately patch Cisco perimeter devices.
Technical Details
- Initial Attack Vector
- Interlock ransomware group exploited a critical vulnerability (CVSS 10.0) in Cisco ASA/FTD firewalls to gain initial access to victim networks weeks before deploying ransomware
Timeline
- 2026-03-18 Breach occurred
- 2026-03-18 Publicly disclosed