Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Ransomware Affiliate Exposes Details of ‘The Gentlemen’ Operation

March 19, 2026

FCA Updates Cyber Incident and Third-Party Reporting Rules

March 19, 2026

Microsoft Patches 84 Flaws in March Patch Tuesday, Including Two Public Zero-Days

March 19, 2026
Facebook X (Twitter) Instagram
Thursday, March 19
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»AWS Warns Hackers Have Abused Cisco Firewall Zero-Day Since January
News

AWS Warns Hackers Have Abused Cisco Firewall Zero-Day Since January

Team-CWDBy Team-CWDMarch 19, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A prolific ransomware group has been exploiting a zero-day vulnerability in a Cisco firewall product since January, according to a new analysis from AWS.

AWS CISO, CJ Moses, warned yesterday that the Interlock operation had been using CVE-2026-20131 in attacks since January 26.

CVE-2026-20131 is a remote code execution (RCE) flaw in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software.

Given a maximum CVSS score of 10, it could “allow an unauthenticated, remote attacker to execute arbitrary Java code as root on an affected device,” according to Cisco.

Read more on Interlock: Interlock Ransomware Targets US Healthcare, IT and Government Sectors.

Thanks to a “misconfigured infrastructure server,” the AWS security team was able to gain rare and full visibility in Interlock’s operational toolkit, Moses said.

Following initial access via zero-day exploitation, the group used a PowerShell script to collect details on victims’ networks, as well as two custom remote access trojans (RATs) written in JavaScript and Java for persistent control.

The group also deployed a “persistent memory-resident backdoor” (webshell) that intercepted HTTP requests entirely in memory to evade antivirus detection, and installed ConnectWise ScreenConnect as a backup entry point in case they were discovered.

Recommendations from AWS

According to Moses, organizations should take the following actions to protect against Interlock ransomware operations:

  • Apply Cisco’s security patches
  • Review logs for the IoCs listed in its write up
  • Conduct security assessments to identify compromise
  • Check ScreenConnect deployments for unauthorized installations
  • Monitor for PowerShell scripts staging data to network shares with hostname-based directory structures 
  • Detect Java ServletRequestListener registrations in web application contexts
  • Identify HAProxy installations with aggressive log deletion cron jobs
  • Watch for TCP connections to unusual high-numbered ports (e.g., 45588)

In the long term, defense in depth, continuous threat monitoring/hunting and regular testing of incident response procedures should be combined with updated training for security teams on Interlock TTPs, AWS said.

“The real story here isn’t just about one vulnerability or one ransomware group – it’s about the fundamental challenge zero-day exploits pose to every security model. When attackers exploit vulnerabilities before patches exist, even the most diligent patching programs can’t protect you in that critical window,” concluded Moses.

“This is precisely why defense in depth is essential – layered security controls provide protection when any single control fails or hasn’t yet been deployed. Rapid patching remains foundational in vulnerability management, but defense in depth helps organizations not to be defenseless during the window between exploit and patch.”

According to Cisco, attacks are still ongoing.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleUNC6426 Exploits nx npm Supply-Chain Attack to Gain AWS Admin Access in 72 Hours
Next Article Microsoft Patches 84 Flaws in March Patch Tuesday, Including Two Public Zero-Days
Team-CWD
  • Website

Related Posts

News

FCA Updates Cyber Incident and Third-Party Reporting Rules

March 19, 2026
News

Microsoft Patches 84 Flaws in March Patch Tuesday, Including Two Public Zero-Days

March 19, 2026
News

UNC6426 Exploits nx npm Supply-Chain Attack to Gain AWS Admin Access in 72 Hours

March 19, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views

Near-ultrasonic attacks on voice assistants

September 11, 20256 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views
Our Picks

When ‘hacking’ your game becomes a security risk

October 17, 2025

How chatbots can help spread scams

October 14, 2025

Beware of threats lurking in booby-trapped PDF files

October 7, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.