Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
Artwork

Content provided by SafeBreach. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by SafeBreach or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Ep. 5: Interlock Ransomware: Don’t Accept Code from Strangers

9:20
 
Share
 

Manage episode 496452964 series 3675440
Content provided by SafeBreach. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by SafeBreach or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

In this episode of the SafeBreach Cyber Resilience Podcast, host Tova Dvorin sits down with Senior Sales Engineer Adrian Culley to dissect one of the most aggressive ransomware threats in circulation today: Interlock.

Backed by a rapidly evolving, financially motivated threat group, Interlock ransomware isn’t just encrypting systems—it’s stealing sensitive data first, then holding victims hostage with a powerful double-extortion model. From major healthcare systems in the U.S. to public schools in Scotland, Interlock is making an outsized impact across sectors.

We unpack:

  • Why Interlock is not just another ransomware variant

  • The social engineering tactics like “ClickFix” that are fooling even savvy users

  • How the dark web’s affiliate model is fueling this operation

  • The chilling tactics used to bypass defenses and disable recovery

  • What every organization must do today to test, validate, and close security gaps

And yes—we’re revisiting that childhood wisdom with a modern twist: don’t accept code from strangers. Whether it’s a fake Captcha or a suspicious command prompt, one careless click can be all it takes.

  continue reading

6 episodes

Artwork
iconShare
 
Manage episode 496452964 series 3675440
Content provided by SafeBreach. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by SafeBreach or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

In this episode of the SafeBreach Cyber Resilience Podcast, host Tova Dvorin sits down with Senior Sales Engineer Adrian Culley to dissect one of the most aggressive ransomware threats in circulation today: Interlock.

Backed by a rapidly evolving, financially motivated threat group, Interlock ransomware isn’t just encrypting systems—it’s stealing sensitive data first, then holding victims hostage with a powerful double-extortion model. From major healthcare systems in the U.S. to public schools in Scotland, Interlock is making an outsized impact across sectors.

We unpack:

  • Why Interlock is not just another ransomware variant

  • The social engineering tactics like “ClickFix” that are fooling even savvy users

  • How the dark web’s affiliate model is fueling this operation

  • The chilling tactics used to bypass defenses and disable recovery

  • What every organization must do today to test, validate, and close security gaps

And yes—we’re revisiting that childhood wisdom with a modern twist: don’t accept code from strangers. Whether it’s a fake Captcha or a suspicious command prompt, one careless click can be all it takes.

  continue reading

6 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play