Category: Intelligence Agencies

  • MIL-OSI Security: CaaStle Founder Charged in $300 Million Fraud Scheme

    Source: US FBI

    United States Attorney for the Southern District of New York, Jay Clayton, and Assistant Director in Charge of the New York Field Office of the Federal Bureau of Investigation (“FBI”), Christopher G. Raia, announced today the unsealing of an Indictment charging CHRISTINE HUNSICKER with wire fraud, securities fraud, money laundering, making false statements to a financial institution, and aggravated identity theft.  The charges in the Indictment arise from an alleged scheme by the defendant to defraud investors in the fashion technology business CaaStle and a related venture out of more than $300 million through false statements, misleading claims, and fabricated documents.  HUNSICKER self-surrendered this morning and will be presented this afternoon before U.S. Magistrate Judge Jennifer E. Willis.  The case has been assigned to U.S. District Judge J. Paul Oetken. 

    “As alleged, Christine Hunsicker defrauded investors of hundreds of millions of dollars through document forgery, fabricated audits, and material misrepresentations about her company’s financial condition,” said U.S. Attorney Jay Clayton.  “The promise of pre-IPO technology companies can be fertile ground for fraudsters who play on investor euphoria.  Investors should be aware of these incentives and that pre-IPO companies are not subject to the rigors of SEC registration.  This Office is committed to protecting investors who place their trust and capital in emerging companies.  We will continue to work closely with our law enforcement partners to investigate, detect, and prosecute those individuals who abuse our markets and our investors”

     “Christine Hunsicker allegedly submitted fraudulent financial statements to swindle investors and banks of more than $300 million,” said FBI Assistant Director in Charge Christopher G. Raia.  “This alleged scheme was stitched together with repeated deception and misinformation, ultimately betraying the trust of the defendant’s clients.  The FBI remains committed to apprehending any business owners who implement unlawful practices to increase their personal wealth.”

    As alleged in the Indictment:[1]

    HUNSICKER, a well-known entrepreneur and successful businessperson in the fashion-tech industry, founded and was the chief executive officer of CaaStle, a clothing technology business.  While promoting CaaStle as a rapidly growing business valued at more than $1.4 billion, HUNSICKER knew that CaaStle was in financial distress with limited cash and significant expenses.  To raise the capital for CaaStle’s operations, HUNSICKER provided investors with falsified income statements, fake audited financial statements, fictitious bank records, and sham corporate documents that grossly overstated CaaStle’s operating profit, revenue, and available cash. She also misrepresented to investors that their funds would be used to purchase discounted shares from existing shareholders who needed liquidity, when in fact she fabricated the existence of those shareholders and used the money as new capital for CaaStle while concealing the company’s cash needs.  In total, HUNSICKER fraudulently induced more than $275 million in investments.

    When confronted by an audit firm in October 2023 about transmitting a fake audit to an investor, HUNSICKER lied, falsely claiming that she had created the fake audit in connection with a lecture she gave at Princeton University, and that sending the audit to the investor had been a one-time error. In reality, HUNSICKER had provided two fake audits to the investor while soliciting an investment. She later repaid that investor to prevent the public disclosure of her fraud. Undeterred, she continued the scheme, providing an investor with fake bank account screenshots showing nearly $200 million in available cash when CaaStle had less than $200,000. One month later, in October 2024, HUNSICKER provided a different investor with a fake draft audit. In 2024, HUNSICKER also falsified the signature of a Board director to make it appear that the Board had authorized the grant of stock options to another investor, raising more than $20 million for CaaStle. Around the same time, HUNSICKER extended her fraudulent activities to a new business venture, P180, using false information about CaaStle’s success to raise approximately $30 million for P180. HUNSICKER also submitted false information about CaaStle to a bank in order to obtain and keep a $20 million personal loan.

    Even after the CaaStle Board removed HUNSICKER as Chair and prohibited her from soliciting investments, she continued her fraudulent activities and attempted to raise new capital. In early 2025, she sold $8 million of her CaaStle shares and more than $5 million in P180 convertible notes without disclosing material information to investors. In February 2025, HUNSICKER attempted to sell an additional $19 million of her CaaStle shares to another investor. HUNSICKER persisted in her deceptive practices even after law enforcement agents seized her electronic devices in March 2025, continuing to meet with the investor about a fake audit without revealing its fraudulent nature, her removal from the Board, or the prohibition against her selling shares. CaaStle filed for Chapter 7 bankruptcy on June 20, 2025.

    *               *                *

    HUNSICKER, 48, of Lafayette, New Jersey, is charged with one count of wire fraud, two counts of securities fraud, and one count of money laundering, each of which carries a maximum sentence of 20 years in prison.  HUNSICKER is also charged with one count of making false statements to a financial institution, which carries a maximum sentence of 30 years in prison, and aggravated identity theft, which carries a mandatory sentence of two years in prison.       

    The maximum potential sentences are prescribed by Congress and provided here for informational purposes only, as any sentencing of the defendant will be determined by the judge. 

    Mr. Clayton praised the outstanding work of the FBI. Mr. Clayton also expressed appreciation for the assistance of the U.S. Securities and Exchange Commission, which separately initiated civil proceedings against the defendant today.

    The case is being handled by the Office’s Securities and Commodities Fraud Task Force.  Assistant U.S. Attorneys Marguerite Colson and Alexandra Rothman are in charge of the prosecution.


    [1] As the introductory phrase signifies, the entirety of the text of the Indictment and the descriptions of the Indictment set forth herein constitute only allegations, and every fact described should be treated as an allegation.

    MIL Security OSI

  • MIL-OSI Security: Former Stoughton Water Department Employee Sentenced for Tampering with Drinking Water

    Source: US FBI

    BOSTON – A former Stoughton Water Department employee was sentenced today in federal court in Boston for tampering with the Stoughton drinking water supply.

    Robert J. Bullock, Sr., 60, of Brockton, was sentenced by U.S. District Court Chief Judge Denise J. Casper to a period of time-served (approximately one day) to be followed by three years of supervised release. The government recommended a sentence of one year and one day in prison. In March 2025, Bullock pleaded guilty to one count of tampering with a water system. Bullock was indicted by a federal grand jury in March 2024.

    Bullock is a former employee of the Water Department in Stoughton. On the evening of Nov. 29, 2022, Bullock went into one of the Water Department’s pumping stations and turned off the pump that introduces chlorine into drinking water. As a result, insufficiently disinfected water was introduced into the drinking water system.

    United States Attorney Leah B. Foley; Ted E. Docks, Special Agent in Charge, Federal Bureau of Investigations, Boston Division; and Kathryn Rivera, Acting Assistant Special Agent in Charge of Environmental Protection Agency, Criminal Investigation Division in Boston made the announcement today. Valuable assistance was provided by the Massachusetts State Police and the Stoughton and Brockton Police Departments. Assistant U.S. Attorney Benjamin Tolkoff of the Criminal Division prosecuted the case.

    MIL Security OSI

  • MIL-OSI Security: California Man Sentenced to 14 Years in Prison for Trafficking Fentanyl and Methamphetamine

    Source: US FBI

    Defendant is known member of the Norteno gang, a Mexican American gang in Northern California, as well as the Bloods gang and the RideZilla prison gang

    BOSTON – A California man was sentenced today in federal court in Boston for trafficking and conspiring to traffic large quantities of methamphetamine and fentanyl.

    Marcos Haro, 40, of Sacramento, Calif., was sentenced by U.S. Senior District Court Judge William G. Young to 14 years in prison, to be followed by five years of supervised release. In March 2025, Marcos Haro pleaded guilty to one count of conspiracy to distribute and to possess with intent to distribute 50 grams or more of methamphetamine and 40 grams or more of fentanyl; two counts of distribution of and possession with intent to distribute 50 grams or more of methamphetamine; aiding and abetting; and one count of distribution of and possession with intent to distribute 40 grams or more of fentanyl; aiding and abetting.  In April 2023, Marcos Haro was indicted along with his brother Noel Haro.

    Noel Haro is a member and influential leader of the “Border Brothers” gang – a large-scale international gang known to be involved in drug, weapon and human trafficking in Southern Arizona with a presence in Nogales, Mexico and the Arizona prison system. Noel Haro is currently serving a life sentence following convictions in Arizona for drug distribution, conspiracy and money laundering. Noel Haro was previously serving his sentence at a facility in Arizona but was transferred to serve his sentence in Massachusetts upon being deemed a security concern due to his alleged influence over other inmates and repeated introduction of cell phones and narcotics into Arizona facilities.

    Beginning in or about April 2019, and investigation began into Noel Haro’s attempts to facilitate the trafficking of narcotics to Massachusetts. Investigators monitoring Noel Haro’s inmate calls learned that he was soliciting friends and family members to transport narcotics from Arizona to Massachusetts on his behalf. In April 2022, recorded inmate calls indicated that Noel Haro worked with his brother, Marcos Haro, to arrange drug deals outside of prison.

    In June 2022, Marcos Haro agreed to supply a cooperating witness with samples of multiple narcotics, including fentanyl and methamphetamine. Marcos Haro later mailed the narcotics concealed in a purple teddy bear inside a postal package. On July 13, 2022, the package was retrieved and found to contain powdered fentanyl, five counterfeit fentanyl pills, methamphetamine and approximately 3 grams of heroin. On July 25, 2022, during a recorded inmate call, Noel Haro and Marcos Haro discussed selling one pound of methamphetamine to the same individual. On July 27, 2022, investigators retrieved the package sent from Marcos Haro which contained approximately 446.6 grams of 99% pure methamphetamine. On Aug. 10, 2022, Noel Haro directed Marcos Haro to arrange the sale of five pounds of methamphetamine to the same individual. Later, on Sept. 12, 2022, investigators retrieved two packages sent from Marcos Haro, which contained approximately 892.3 grams of 86% pure methamphetamine and approximately 1,320.2 grams of 95% pure methamphetamine.

    In October 2022, Marcos and Noel Haro made arrangements to sell an individual 2,000 fentanyl pills. On Nov. 17, 2022, Marcos sent the individual a photograph of a United States Postal Service shipping box, label and receipt. On Nov. 20, 2022, investigators retrieved the package sent by Marcos Haro, which contained approximately 2,000 blue pills, which tested positive for approximately 215.3 grams of fentanyl.

    On April 2, 2023, Marcos Haro was arrested in Sacramento, Calif. following a motor vehicle stop. A 9mm handgun with eight live rounds in the magazine and approximately 2.9 grams of suspected fentanyl that field tested positive for the presence of opiates, were found during a subsequent search of the vehicle. Marcos Haro has a lengthy criminal history that includes 10 prior convictions, including a 2016 conviction for possession of a controlled substance while armed and illegal possession of an assault weapon with a large capacity magazine, for which he was sentenced to seven years in prison. Marcos Haro is a known member of the Norteno gang which is a Mexican American gang located in Northern California, as well as the Bloods gang and the RideZilla prison gang.

    On July 10, 2025, Noel Haro was sentenced to 188 months in prison.

    This case is part of an Organized Crime Drug Enforcement Task Forces (OCDETF) operation. OCDETF identifies, disrupts, and dismantles the highest-level criminal organizations that threaten the United States using a prosecutor-led, intelligence-driven, multi-agency approach. Additional information about the OCDETF Program can be found at https://www.justice.gov/OCDETF.
        
    United States Attorney Leah B. Foley; Ted E. Docks, Special Agent in Charge of the Federal Bureau of Investigation, Boston Division; and Department of Correction’s Commissioner Shawn Jenkins made the announcement today. Valuable assistance was provided by the California Department of Corrections and Rehabilitation, the Sacramento County Sheriff’s Department and the Federal Bureau of Investigation, Sacramento Division. Assistant U.S. Attorneys Alathea E. Porter and Charles Dell’Anno of the Narcotics & Money Laundering Unit prosecuted the case. 

    MIL Security OSI

  • MIL-OSI Security: Tokio, North Dakota, Woman Sentenced to Federal Prison for Involuntary Manslaughter and Child Neglect

    Source: US FBI

    Fargo – Acting United States Attorney Jennifer Klemetsrud Puhl announced today that Tierra Lynn Scott, age 31 from Tokio, ND, was sentenced before Chief Judge Peter D. Welte, United States District Court for the District of North Dakota, to 168 months in federal prison – the statutory maximum of 96 months for Involuntary Manslaughter and 24 months consecutive on each of the three Child Neglect counts in Indian country.  Judge Welte also sentenced Scott to serve three years of supervised release following her incarceration and to pay restitution for funeral-related expenses. 

    On August 17, 2024, law enforcement responded to a residence in Fort Totten, North Dakota, where an adult male was later pronounced dead.  The investigation revealed the man had been struck and run over by a motor vehicle driven by Scott. Scott had no driver’s license and was under the influence of intoxicating liquor and in possession of a controlled substance and drug paraphernalia and Scott was backing and otherwise driving recklessly, and without due care for the rights and safety of others. The investigation further revealed Scott had three minor children in the vehicle with her at the time.

    “In August 2024, a man lost his life due to the negligence of Tierra Scott,” said FBI Minneapolis Special Agent in Charge Alvin M. Winston Sr. “She also placed three minor children at risk, driving with them while under the influence of alcohol and in possession of drugs and drug paraphernalia. The FBI will work together with our law enforcement partners to ensure our community is safe for all, especially for children.”

    “This was an entirely preventable death which was tragically witnessed by others, including children who were in and outside the defendant’s vehicle, all who have no doubt been traumatized,” said Acting US Attorney Jennifer Puhl. “Sadly, in recent years law enforcement has responded to increased incidents of alcohol-impaired driving deaths on the Spirit Lake Reservation. I hope this sentence serves as a reminder of the severe legal consequences for individuals who choose to drive under the influence and will deter that behavior.”

    This case was investigated by the Federal Bureau of Investigation with assistance from the Bureau of Indian Affairs and was prosecuted by Assistant United States Attorney Lori H. Conroy.

    # # #

    MIL Security OSI

  • MIL-OSI Security: St. Louis County Man Sentenced for Hosting Dogfights

    Source: US FBI

    ST. LOUIS – U.S. District Judge Sarah E. Pitlyk on Friday sentenced a man who hosted dogfights and trained dogs to fight to 18 months in prison followed by 3 years of supervised release.

    Terrell Williams, 52, has also agreed to give up the dogs and training equipment seized by law enforcement during the investigation.

    Williams hosted dog fights in the basement of his home in Riverview, Missouri, on two occasions in July and August of 2021. Williams also bred and owned multiple bull terriers or terrier mixes between Sept. 5, 2020, and May 1, 2022, that were used for fights. On June 22, 2022, FBI agents conducted a court-approved search of Williams’ home and seized eight bull terrier mixes and three Yorkshire terriers, as well as equipment used to train and condition dogs. Multiple dogs appeared to be aggressive towards humans and other dogs, anxious or fearful. Dogs also bore scars consistent with dog bites or dog fighting, Williams’ plea agreement says. 

    Williams pleaded guilty in March to a felony charge of dogfighting, which is punishable by up to five years in prison.

    The FBI investigated the case. Assistant U.S. Attorney Jillian Anderson prosecuted the case.

    MIL Security OSI

  • MIL-OSI USA: Engineer pleads guilty to stealing trade secret technology designed for missile launch detection

    Source: US Immigration and Customs Enforcement

    LOS ANGELES — A Santa Clara County man and former engineer at a Southern California company pleaded guilty July 21 to stealing trade secret technologies developed for use by the United States government to detect nuclear missile launches, track ballistic and hypersonic missiles, and to allow U.S. fighter planes to detect and evade heat-seeking missiles.

    Chenguang Gong, 59, of San Jose, pleaded guilty to one count of theft of trade secrets. He remains free on $1.75 million bond.

    According to his plea agreement, Gong — a dual citizen of the United States and China — transferred more than 3,600 files from a Los Angeles-area research and development company where he worked — identified in court documents as the victim company — to personal storage devices during his brief tenure with the company last year.

    The files Gong transferred include blueprints for sophisticated infrared sensors designed for use in space-based systems to detect nuclear missile launches and track ballistic and hypersonic missiles, as well as blueprints for sensors designed to enable U.S. military aircraft to detect incoming heat-seeking missiles and take countermeasures, including by jamming the missiles’ infrared tracking ability. Some of these files were later found on storage devices seized from Gong’s temporary residence in Thousand Oaks.

    In January 2023, the victim company hired Gong as an application-specific integrated circuit design manager responsible for the design, development and verification of its infrared sensors. Beginning on approximately March 30, 2023, and continuing until his termination on April 26, 2023, Gong transferred thousands of files from his work laptop to three personal storage devices, including more than 1,800 files after he had accepted a job at one of the victim company’s main competitors.

    Many of the files Gong transferred contained proprietary and trade secret information related to the development and design of a readout integrated circuit that allows space-based systems to detect missile launches and track ballistic and hypersonic missiles and a readout integrated circuit that allows aircraft to track incoming threats in low visibility environments.

    Gong also transferred files containing trade secrets relating to the development of “next generation” sensors capable of detecting low observable targets while demonstrating increased survivability in space, as well as the blueprints for the mechanical assemblies used to house and cryogenically cool the victim company’s sensors. This information was among the victim company’s most important trade secrets that are worth hundreds of millions of dollars. Many of the files had been marked “[VICTIM COMPANY] PROPRIETARY,” “FOR OFFICIAL USE ONLY,” “PROPRIETARY INFORMATION,” and “EXPORT CONTROLLED.”

    Law enforcement also discovered that, between approximately 2014 and 2022, while employed at several major technology companies in the United States, Gong submitted numerous applications to ‘Talent Programs’ administered by the People’s Republic of China government. The PRC government has established these talent programs as a means to identify individuals who have expert skills, abilities, and knowledge of advanced sciences and technologies in order to access and utilize those skills and knowledge in transforming the PRC’s economy, including its military capabilities.

    In 2014, while employed at a U.S. information technology company headquartered in Dallas, Gong sent a business proposal to a contact at a high-tech research institute in China focused on both military and civilian products. In his proposal, translated from Chinese, Gong described a plan to produce high-performance analog-to-digital converters like those produced by his employer.

    In another Talent Program application from September 2020, Gong proposed to develop “low light/night vision” image sensors for use in military night vision goggles and civilian applications. Gong’s proposal included a video presentation that contained the model number of a sensor developed by an international defense, aerospace, and security company where Gong worked from 2015 to 2019.

    Gong travelled to China several times to seek Talent Program funding in order to develop sophisticated analog-to-digital converters. In his Talent Program applications, Gong underscored that the high-performance analog-to-digital converters he proposed to develop in China had military applications, explaining that they “directly determine the accuracy and range of radar systems” and that “[m]issile navigation systems also often use radar front-end systems.” In a 2019 email, translated from Chinese, Gong remarked that he “took a risk” by traveling to China to participate in the Talent Programs “because [he] worked for…an American military industry company” and thought he could “do something” to contribute to China’s “high-end military integrated circuits.”

    According to his plea agreement, the intended economic loss from Gong’s criminal conduct exceeds $3.5 million.

    United States District Judge John F. Walter scheduled a September 29 sentencing hearing, at which time Gong will face a statutory maximum sentence of 10 years in federal prison.

    The FBI’s Los Angeles Field Office through the Counterintelligence Task Force in partnership with the State Department’s Diplomatic Security Service and U.S. Immigration and Customs Enforcement Homeland Security Investigations is investigating this matter. The FBI’s San Francisco Field Office and the U.S. Attorney’s Office for the Northern District of California also provided substantial assistance.

    Assistant United States Attorneys David C. Lachman of the Terrorism and Export Crimes Section and Nisha Chandran of the Major Frauds Section are prosecuting this case, with valuable assistance from Department of Justice Trial Attorney Brendan P. Geary of the National Security Division’s Counterintelligence and Export Control Section.

    As a member of the FBI Counterintelligence Task Force, HSI contributes to the whole-of-government efforts to defeat hostile intelligence activities targeting the U.S., to include countering the proliferation of sensitive technology to potential adversaries. This case highlights the partnership between HSI, the FBI and DSS, each leveraging their unique capabilities and authorities, to disrupt insider threats at U.S. technology companies and to safeguard sensitive U.S. technology.

    MIL OSI USA News

  • MIL-OSI USA: #StopRansomware: Interlock

    News In Brief – Source: US Computer Emergency Readiness Team

    Summary

    Note: This joint Cybersecurity Advisory is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations protect against ransomware. Visit stopransomware.gov to see all #StopRansomware advisories and to learn more about other ransomware threats and no-cost resources.

    The Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), Department of Health and Human Services (HHS), and Multi-State Information Sharing and Analysis Center (MS-ISAC)—hereafter referred to as “the authoring organizations”—are releasing this joint advisory to disseminate known Interlock ransomware IOCs and TTPs identified through FBI investigations (as recently as June 2025) and trusted third-party reporting.

    The Interlock ransomware variant was first observed in late September 2024, targeting various business, critical infrastructure, and other organizations in North America and Europe. FBI maintains these actors target their victims based on opportunity, and their activity is financially motivated. FBI is aware of Interlock ransomware encryptors designed for both Windows and Linux operating systems; these encryptors have been observed encrypting virtual machines (VMs) across both operating systems. FBI observed actors obtaining initial access via drive-by download from compromised legitimate websites, which is an uncommon method among ransomware groups. Actors were also observed using the ClickFix social engineering technique for initial access, in which victims are tricked into executing a malicious payload under the guise of fixing an issue on the victim’s system. Actors then use various methods for discovery, credential access, and lateral movement to spread to other systems on the network.

    Interlock actors employ a double extortion model in which actors encrypt systems after exfiltrating data, which increases pressure on victims to pay the ransom to both get their data decrypted and prevent it from being leaked. 

    FBI, CISA, HHS, and MS-ISAC encourage organizations to implement the recommendations in the Mitigations section of this advisory to reduce the likelihood and impact of Interlock ransomware incidents.

    Download the PDF version of this report:

    For a downloadable copy of IOCs, see:

    Note: This advisory uses the MITRE ATT&CK® Matrix for Enterprise framework, version 17. See the MITRE ATT&CK Tactics and Techniques section of this advisory for tables mapped to the threat actors’ activity.

    Overview

    Since September 2024, Interlock ransomware actors have impacted a wide range of businesses and critical infrastructure sectors in North America and Europe. These actors are opportunistic and financially motivated in nature and employ tactics to infiltrate and disrupt the victim’s ability to provide their essential services. 

    Interlock actors leverage a double extortion model, in which they both encrypt and exfiltrate victim data. Ransom notes do not include an initial ransom demand or payment instructions; instead, victims are provided with a unique code and are instructed to contact the ransomware group via a .onion URL through the Tor browser. To date, Interlock actors have been observed encrypting VMs, leaving hosts, workstations, and physical servers unaffected; however, this does not mean they will not expand to these systems in the future. To counter Interlock actors’ threat to VMs, enterprise defenders should implement robust endpoint detection and response (EDR) tooling and capabilities.

    The authoring agencies are aware of emerging open-source reporting detailing similarities between the Rhysida and Interlock ransomware variants.1 For additional information on Rhysida ransomware, see the joint advisory, #StopRansomware: Rhysida Ransomware.

    Initial Access

    FBI has observed Interlock actors obtaining initial access [TA0001] via drive-by download [T1189] from compromised legitimate websites, an atypical method for ransomware actors. Interlock ransomware methods for initial access have previously disguised malicious payloads as fake Google Chrome or Microsoft Edge browser updates, though a cybersecurity company recently reported a shift to payload filenames masquerading as updates for common security software (see Table 5 for a list of filenames).2

    In some instances, FBI has observed Interlock actors using the ClickFix social engineering technique, in which unsuspecting users are prompted to execute a malicious payload by clicking a fake Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA) [T1189]. The CAPTCHA contains instructions for users to open the Windows Run window, paste the clipboard contents, and then execute a malicious Base64-encoded PowerShell process [T1204.004].3

    Note: This ClickFix technique has been used in several other malware campaigns, including Lumma Stealer and DarkGate.4

    Execution and Persistence

    Based on FBI investigations, the fake Google Chrome browser executable functions as a remote access trojan (RAT) [T1105] designed to execute a PowerShell script [T1059.001] that drops a file into the Windows Startup folder. From there, the file is designed to run the RAT every time the victim logs in [T1547.001], establishing persistence [TA0003]. 

    FBI also observed instances in which Interlock actors executed a PowerShell command designed to establish persistence via a Windows Registry key modification [T1547.001]. To do so, Interlock actors used a PowerShell command [T1059.001] designed to add a run key value named “Chrome Updater” [T1036.005] that uses a specific log file as an argument upon user login.

    Reconnaissance

    To facilitate reconnaissance, a PowerShell script executes a series of commands [T1059.001] designed to gather information on victim machines (see Table 1).

    Table 1. PowerShell Commands for Reconnaissance
    PowerShell Command Description
    WindowsIdentity.GetCurrent() Returns a WindowsIdentity object that represents the current Windows user [T1033].
    systeminfo Displays detailed configuration information [T1082] about a computer and its operating system, including operating system configuration, security information, product ID, and hardware properties.
    tasklist/svc Lists unabridged service information [T1007] for each process currently running on the local computer.
    Get-Service Gets objects that represent the services [T1007] on a computer, including running and stopped services.
    Get-PSDrive

    Gets the drives [T1082] in the current session, such as:

    • Windows logical drives on the computer, including drives mapped to network shares.
    • Drives exposed by PowerShell providers.
    • Session-specified temporary drives and persistent mapped network drives.
       
    arp -a Displays and modifies entries in the Address Resolution Protocol (ARP) cache table [T1016], which contains entries on the IPv4 and IPv6 addresses on host endpoints.

    Command and Control

    FBI observed Interlock actors using command and control (C2) [TA0011] applications like Cobalt Strike and SystemBC. Interlock actors also used Interlock RAT5 and NodeSnake RAT (as of March 2025)6 for C2 and executing commands.

    Credential Access, Lateral Movement, and Privilege Escalation

    FBI observed that once Interlock actors establish remote control of a compromised system, they use a series of PowerShell commands to download a credential stealer (cht.exe) [TA0006] and keylogger binary (klg.dll) [T1056.001],[T1105]. According to open source reporting, the credential stealer collects login information and associated URLs for victims’ online accounts [T1555.003], while the keylogger dynamic link library (DLL) logs users’ keystrokes in a file named conhost.txt [T1036.005].7 As of February 2025, private cybersecurity analysts also observed Interlock ransomware infections executing different versions of information stealers [TA0006], including Lumma Stealer8 and Berserk Stealer, to harvest credentials for lateral movement and privilege escalation [T1078].9

    Interlock actors leverage compromised credentials and Remote Desktop Protocol (RDP)10 [T1021.001] to move between systems. They also use tools like AnyDesk to enable remote connectivity and PuTTY to assist with lateral movement [T1219].11 In addition to stealing users’ online credentials, Interlock actors have compromised domain administrator accounts (possibly by using a Kerberoasting attack [T1558.003])12 to gain additional privileges [T1078.002]. 

    Collection and Exfiltration

    Interlock actors leverage Azure Storage Explorer (StorageExplorer.exe) to navigate victims’ Microsoft Azure Storage accounts [T1530] prior to exfiltrating data. According to open source reporting, Interlock actors execute AzCopy to exfiltrate data by uploading it to the Azure storage blob [T1567.002].13 Interlock actors also exfiltrate data over file transfer tools, including WinSCP [T1048].

    Impact

    Following data exfiltration, Interlock actors deploy the encryption binary as a 64-bit executable named conhost.exe [T1486],[T1036.005]. FBI has observed Interlock ransomware encryptors for both Windows and Linux operating systems. Encryptors are designed to encrypt files using a combined Advanced Encryption Standard (AES) and Rivest-Shamir-Adleman (RSA) algorithm. In addition, cybersecurity researchers have identified Interlock ransomware samples using a FreeBSD ELF encryptor [T1486], a departure from usual Linux encryptors designed for VMware ESXi servers and VMs.14

    A cybersecurity company identified a DLL binary named tmp41.wasd—executed after encryption using rundll32.exe [T1218.011]—which uses the remove() function to delete the encryption binary [T1070.004];15 on Linux machines, the encryptor uses a similar technique to execute the removeme function. 

    Encrypted files are appended with either a .interlock or .1nt3rlock file extension, alongside a ransom note titled !__README__!.txt delivered via group policy object (GPO). Interlock actors use a double-extortion model [T1657], encrypting systems after exfiltrating data. The ransom note provides each victim with a unique code and instructions to contact the ransomware actors via a .onion URL. 

    Interlock actors do not leave an initial ransom demand or payment instructions on compromised networks, and do not relay this information until contacted by the victim. The actors instruct victims to make ransom payments in Bitcoin to cryptocurrency wallet addresses provided by the actors. The actors threaten to publish the victim’s exfiltrated data to their leak site on the Tor network unless the victim pays the ransom demand; the actors have previously followed through on this threat.16

    See Table 2 for publicly available tools and applications used by Interlock ransomware actors. This includes legitimate tools repurposed for their operations.

    Disclaimer: Use of these tools and applications should not be attributed as malicious without analytical evidence to support threat actor use and/or control.

    Table 2. Tools Used by Interlock Ransomware Actors
    Tool Name Description
    AnyDesk A common legitimate remote monitoring and management (RMM) tool maliciously used by Interlock actors to obtain remote access and maintain persistence. AnyDesk also supports remote file transfer.
    Cobalt Strike A penetration testing tool used by security professionals to test the security of networks and systems.
    PowerShell A cross-platform task automation solution made up of a command-line shell, a scripting language, and a configuration management framework, which runs on Windows, Linux, and macOS.
    PSExec A tool designed to run programs and execute commands on remote systems.
    PuTTY.exe An open source file transfer application commonly used to remotely connect to systems via Secure Shell (SSH). PuTTY also supports file transfer protocols like Secure File Transfer Protocol (SFTP) and Secure Copy Protocol (SCP).
    ScreenConnect A remote support, access, and meeting software that allows users to control devices remotely over the internet. CISA observed Interlock actors using a cracked version of this software in at least one incident. These versions may be standalone versions not connecting to ScreenConnect’s official cloud domains (domains available upon request from ConnectWise).
    SystemBC Enables Interlock actors to compromise systems, run commands, download malicious payloads, and act as a proxy tool to the actors’ C2 servers.
    Windows Console Host Windows Console Host (conhost.exe) manages the user interface for command-line applications in Windows, including Command Prompt and PowerShell. 
    WinSCP A free and open source SSH File Transfer Protocol (FTP), WebDAV, Amazon S3, and secure copy protocol client.

    See Table 3 and Table 4 for files used by Interlock ransomware actors. These were obtained from FBI investigations as recently as June 2025.

    Disclaimer: Some of the hashes are for legitimate tools and applications and should not be attributed as malicious without analytical evidence to support threat actor use and/or control. The authoring agencies recommend organizations investigate or vet these hashes prior to taking action, such as blocking.

    Table 3. Files Used by Interlock Ransomware Actors (SHA-256)
    File Name Hash
    1.ps1 fba4883bf4f73aa48a957d894051d78e0085ecc3170b1ff50e61ccec6aeee2cd 
    advanced_port_scanner.exe 4b036cc9930bb42454172f888b8fde1087797fc0c9d31ab546748bd2496bd3e5
    Aisa.exe 18a507bf1c533aad8e6f2a2b023fbbcac02a477e8f05b095ee29b52b90d47421
    AnyDesk.exe 1a70f4eef11fbecb721b9bab1c9ff43a8c4cd7b2cafef08c033c77070c6fe069
    autoservice.dll a4069aa29628e64ea63b4fb3e29d16dcc368c5add304358a47097eedafbbb565
    Autostart.exe d535bdc9970a3c6f7ebf0b229c695082a73eaeaf35a63cd8a0e7e6e3ceb22795
    cht FAFCD5404A992850FFCFFEE46221F9B2FF716006AECB637B80E5CD5AA112D79C
    cht.exe C20BABA26EBB596DE14B403B9F78DDC3C13CE9870EEA332476AC2C1DD582AA07
    cleanup.dll (SystemBC) 1845a910dcde8c6e45ad2e0c48439e5ab8bbbeb731f2af11a1b7bbab3bfe0127
    conhost 44887125aa2df864226421ee694d51e5535d8c6f70e327e9bcb366e43fd892c1
    conhost.dll a70af759e38219ca3a7f7645f3e103b13c9fb1db6d13b68f3d468b7987540ddf
    conhost.dll 96babe53d6569ee3b4d8fc09c2a6557e49ebc2ed1b965abda0f7f51378557eb1
    difxepi.dll (SystemBC) 1845a910dcde8c6e45ad2e0c48439e5ab8bbbeb731f2af11a1b7bbab3bfe0127
    iexplore.exe d0c1662ce239e4d288048c0e3324ec52962f6ddda77da0cb7af9c1d9c2f1e2eb
    klg.dll A4F0B68052E8DA9A80B70407A92400C6A5DEF19717E0240AC608612476E1137E
    !!!OPEN_ME!!!.txt 68A49D5A097E3850F3BB572BAF2B75A8E158DADB70BADDC205C2628A9B660E7A
    processhacker-2.39-bin.zip 88f26f3721076f74996f8518469d98bf9be0eaee5b9eccc72867ebfc25ea4e83
    PsExec.exe 078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b
    putty.exe 7a43789216ce242524e321d2222fa50820a532e29175e0a2e685459a19e09069
    puttyportable.exe 97931d2e2e449ac3691eb526f6f60e2f828de89074bdac07bd7dbdfd51af9fa0
    PuTTYPortable.zip ff7ad2376ae01e4b3f1e1d7ae630f87b8262b5c11bc5d953e1ac34ffe81401b5
    qrpce91.exe.asd 64a0ab00d90682b1807c5d7da1a4ae67cde4c5757fc7d995d8f126f0ec8ae983
    ScreenConnect.ClientService.exe 2814b33ce81d2d2e528bb1ed4290d665569f112c9be54e65abca50c41314d462
    SophosendpointAgent.exe f51b3d054995803d04a754ea3ff7d31823fab654393e8054b227092580be43db
    SophosScaner.exe dfb5ba578b81f05593c047f2c822eeb03785aecffb1504dcb7f8357e898b5024
    Starship.exe 94bf0aba5f9f32b9c35e8dfc70afd8a35621ed6ef084453dc1b10719ae72f8e2
    start 28c3c50d115d2b8ffc7ba0a8de9572fbe307907aaae3a486aabd8c0266e9426f
    start.exe 70bb799557da5ac4f18093decc60c96c13359e30f246683815a512d7f9824c8f
    StorageExplorer.exe 73a9a1e38ff40908bcc15df2954246883dadfb991f3c74f6c514b4cffdabde66
    Sysmon.sys 1d04e33009bcd017898b9e1387e40b5c04279c02ebc110f12e4a724ccdb9e4fb
    upd_2327991.exe 7b9e12e3561285181634ab32015eb653ab5e5cfa157dd16cdd327104b258c332
    webujgd.lnk 70EE22D394E107FBB807D86D187C216AD66B8537EDC67931559A8AEF18F6B5B3
    WinSCP-6.3.5-Setup.exe 8eb7e3e8f3ee31d382359a8a232c984bdaa130584cad11683749026e5df1fdc3
    Proxy Tool e4d6fe517cdf3790dfa51c62457f5acd8cb961ab1f083de37b15fd2fddeb9b8f
    Encryptor e86bb8361c436be94b0901e5b39db9b6666134f23cce1e5581421c2981405cb1
    Encryptor c733d85f445004c9d6918f7c09a1e0d38a8f3b37ad825cd544b865dba36a1ba6
    Encryptor 28c3c50d115d2b8ffc7ba0a8de9572fbe307907aaae3a486aabd8c0266e9426f
    Table 4. Files Used by Interlock Ransomware Actors (SHA-1)
    File Name Hash
    autorun.log 514946a8fc248de1ccf0dbeee2108a3b4d75b5f6
    jar.jar b625cc9e4024d09084e80a4a42ab7ccaa6afb61d
    pack.jar 3703374c9622f74edc9c8e3a47a5d53007f7721e

    See Table 5 through Table 16 for all referenced threat actor tactics and techniques in this advisory. For assistance with mapping malicious cyber activity to the MITRE ATT&CK framework, see CISA and MITRE ATT&CK’s Best Practices for MITRE ATT&CK Mapping and CISA’s Decider Tool.

    Table 5. Initial Access
    Technique Title ID Use
    Drive-By Compromise T1189

    Interlock actors obtain initial access by compromising a legitimate website that network users visit, or by disguising malicious payloads as fake browser updates or common security software, including the following:17

    • FortiClient.exe
    • Ivanti-Secure-Access-Client.exe
    • GlobalProtect.exe
    • Webex.exe
    • AnyConnectVPN.exe
    • Cisco-Secure-Client.exe
    • zyzoom_antimalware.exe

    Interlock actors also gain access via the ClickFix social engineering technique, in which users are tricked into executing a malicious payload by clicking on a fake CAPTCHA that prompts users to execute a malicious PowerShell script. 
     

    Table 6. Execution
    Technique Title ID Use
    Command and Scripting Interpreter: PowerShell T1059.001 

    Interlock actors implement PowerShell scripts to drop a malicious file into the Windows Startup folder.

    Interlock actors execute a PowerShell command for registry key modification.

    Interlock actors use a PowerShell script to execute a series of commands to facilitate reconnaissance.

    User Execution: Malicious Copy and Paste T1204.004 Via the ClickFix social engineering technique, users are tricked into clicking a fake CAPTCHA and prompted into executing a malicious Base64-encoded PowerShell process by following instructions to open a Windows Run window (Windows Button + R), pasting clipboard contents (“CTRL + V”), and then executing the malicious script (“Enter”).
    Table 7. Persistence
    Technique Title ID Use
    Boot or Logon Autostart Execution: Registry Run Keys/Startup Folder T1547.001

    Interlock actors establish persistence by adding a file into a Windows StartUp folder that executes a RAT every time a user logs in.

    Interlock actors also implement registry key modification by using a PowerShell command to add a run key value (named “Chrome Updater”) that uses a log file as an argument every time a user logs in.
     

    Table 8. Privilege Escalation
    Technique Title ID Use
    Valid Accounts: Domain Accounts T1078.002 Interlock actors compromise domain administrator accounts to gain additional privileges. 
    Table 9. Defense Escalation
    Technique Title ID Use
    Defense Evasion TA0005 Interlock actors execute the removeme function on Linux systems to delete the encryption binary for defense evasion. 
    Masquerading: Match Legitimate Resource Name or Location T1036.005

    Interlock actors disguise a malicious run key value by naming it “Chrome Updater”; the run key value uses a specific log file as an argument upon user login.

    Interlock actors disguise files of keystrokes logged by one of their credential stealers with a legitimate Windows filename: conhost.txt.

    Interlock actors disguise an encryption binary, a 64-bit executable, by giving it the same name as the legitimate Console Windows Host executable: conhost.exe

    System Binary Proxy Execution: Rundll32 T1218.011 Interlock actors use rundll32.exe to proxy execution of a malicious DLL binary tmp41.wasd
    Indicator Removal: File Deletion T1070.004 Interlock actors execute a DLL binary tmp41.wasd that uses the remove() function to delete their encryption binary for defense evasion. 
    Table 10. Credential Access
    Technique Title ID Use
    Credential Access TA0006 Interlock actors download credential stealer cht.exe and execute other versions information stealers (including Lumma Stealer and Berserk Stealer) to harvest credentials.
    Credentials from Password Stores: Credentials from Web Browsers T1555.003 Interlock actors download a credential stealer that collects login information and associated URLs for victims’ online accounts.
    Input Capture T1056 Interlock actors execute Lumma Stealer and Berserk Stealer information stealers on victim systems.
    Input Capture: Keylogging T1056.001 Interlock actors download klg.dll, a keylogger binary, onto compromised systems, where it logs users’ keystrokes in a file named conhost.txt
    Steal or Forge Kerberos Tickets: Kerberoasting T1558.003 Interlock actors possibly use a Kerberoasting attack to compromise domain administrator accounts. 
    Table 11. Discovery
    Technique Title ID Use
    System Owner/User Discovery T1033 Interlock actors execute a PowerShell command WindowsIdentity.GetCurrent() on victim systems to retrieve a WindowsIdentity object that represents the current Windows user.
    System Information Discovery T1082

    Interlock actors execute a PowerShell command systeminfo on victim systems to access detailed configuration information about the system, including OS configuration, security information, product ID, and hardware properties.

    Interlock actors execute a PowerShell command Get-PSDrive on victim systems to discover the drives in the current session, such as: 

    • Windows logical drives on the computer, including drives mapped to network shares.
    • Drives exposed by PowerShell providers.
    • Session-specified temporary drives and persistent mapped network drives.
    System Service Discovery T1007

    Interlock actors execute a PowerShell command tasklist /svc on victim systems that lists service information for each process currently running on the system. 

    Actors also execute a PowerShell command Get-Service on victim systems that retrieves objects that represent the services (including running and stopped services) on the system.

    System Network Configuration Discovery T1016 Interlock actors execute a PowerShell command arp -a on victim systems that displays and modifies entries in the Address Resolution Protocol (ARP) cache table (which contains entries on the IPv4 and IPv6 addresses on host endpoints).
    Table 12. Lateral Movement
    Technique Title ID Use
    Valid Accounts T1078 Interlock actors harvest and abuse valid credentials for lateral movement and privilege escalation.
    Remote Services: Remote Desktop Protocol T1021.001 Interlock actors use RDP and valid credentials to move laterally between systems.
    Table 13. Collection
    Technique Title ID Use
    Data from Cloud Storage T1530 Interlock actors use StorageExplorer.exe, the cloud storage solution Azure Storage Explorer, to explore Microsoft Azure Storage accounts. 
    Table 14. Command and Control
    Technique Title ID Use
    Command and Control TA0011 Interlock actors use applications Cobalt Strike and SystemBC for C2. 
    Ingress Tool Transfer T1105

    Interlock actors use a fake Google Chrome or Microsoft Edge browser update to cause users to execute a RAT on the victimized system.

    Interlock actors download credential stealers (cht.exe) and keylogger binaries (klg.dll) once actors establish remote control of a compromised system. 

    Remote Access Tools T1219 Interlock actors use legitimate remote access tools such as AnyDesk to enable remote connectivity and PuTTY to assist with lateral movement.
    Table 15. Exfiltration
    Technique Title  ID Use
    Exfiltration Over Web Service: Exfiltration to Cloud Storage T1567.002 Interlock actors exfiltrate data to cloud storage by executing AzCopy to upload data to the Azure storage blob.
    Exfiltration Over Alternative Protocol T1048 Interlock actors use file transfer tools like WinSCP to exfiltrate data.
    Table 16. Impact
    Technique Title  ID Use
    Data Encrypted for Impact T1486

    Interlock actors encrypt victim data using a combined AES and RSA algorithm on compromised systems to interrupt availability to system and network resources. Actors code encryptors using C/C++. Interlock actors use encryptors for both Windows and Linux operating systems. 

    Interlock actors also use a FreeBSD ELF encryptor to encrypt victim data. 

    Financial Theft   T1657 Interlock actors deliver a ransom note titled !__README__!.txt via a GPO which provides victims with instructions to use a .onion URL to contact the actors over the Tor network. Actors use a double-extortion model, both encrypting victim data and threatening release of victim data on their Tor network leak site if the ransom is not paid.

    The authoring agencies recommend organizations implement the mitigations below to improve your organization’s cybersecurity posture on the basis of the Interlock ransomware actors’ activity. These mitigations align with the Cross-Sector Cybersecurity Performance Goals (CPGs) developed by CISA and the National Institute of Standards and Technology (NIST). The CPGs provide a minimum set of practices and protections that CISA and NIST recommend all organizations implement. CISA and NIST based the CPGs on existing cybersecurity frameworks and guidance to protect against the most common and impactful threats and TTPs. Visit CISA’s CPGs webpage for more information on the CPGs, including additional recommended baseline protections.

    In addition to the below mitigations, Healthcare and Public Health (HPH) organizations should use HPH Sector CPGs to implement cybersecurity protections to address the most common threats and TTPs used against this sector.

    At-risk organizations should implement the following mitigations:

    • Prevent Interlock ransomware actors from obtaining initial access:
      • Implement domain name system (DNS) filtering to block users from accessing malicious sites and applications.
      • Implement web access firewalls to mitigate and prevent unknown commands or process injection from malicious domains or websites.
      • Train users [CPG 2.I] to identify, avoid, and report social engineering attempts.
    • Implement a recovery plan [CPG 5.A] to maintain and retain multiple copies of sensitive or proprietary data and servers in a physically separate, segmented, and secure location (e.g., hard drive, storage device, the cloud) [CPG 2.R].
    • Require all accounts with password logins (e.g., service accounts, admin accounts, and domain admin accounts) to comply with NIST password standards.
      • Require employees to use long passwords [CPG 2.B] and consider not requiring recurring password changes, as these can weaken security.
    • Require MFA [CPG 2.H] for all services to the extent possible, particularly for webmail, virtual private networks (VPNs), and accounts that access critical systems.
      • Implement ICAM policies across the organization as a precursor to MFA.
    • Keep all operating systems, software, and firmware up to date; prioritize patching known exploited vulnerabilities in internet-facing systems [CPG 1.E].
      • Timely patching is efficient and cost effective for minimizing an organization’s exposure to cybersecurity threats.
    • Implement robust EDR capabilities on VMs, systems, and networks.
    • Segment networks [CPG 2.F] to prevent the spread of ransomware.
      • Network segmentation can help prevent the spread of ransomware by controlling traffic flows between—and access to—various subnetworks and by restricting adversary lateral movement.
    • Identify, detect, and investigate abnormal activity and potential traversal of the indicated ransomware [CPG 3.A] with a networking monitoring tool [CPG 2.T].
      • To aid in detecting ransomware, implement a tool that logs and reports all network traffic, including lateral movement activity on a network.
      • Implement EDR tools; these are useful for detecting lateral connections as they provide insight into common and uncommon network connections for each host.
    • Filter network traffic by preventing unknown or untrusted origins from accessing remote services on internal systems.
      • This prevents threat actors from directly connecting to remote access services that they have established for persistence.
    • Install, regularly update, and enable real time detection for antivirus software on all hosts.
    • Review domain controllers, servers, workstations, and active directories for new and/or unrecognized accounts.
    • Audit user accounts with administrative privileges and configure access controls according to the principle of least privilege [CPG 2.E].
    • Disable unused ports.
    • Consider adding an email banner to emails received from outside of your organization [CPG 2.M].
    • Disable hyperlinks in received emails.
    • Implement time-based access for accounts set at the admin level and higher; for example, the just-in-time (JIT) access method provisions privileged access when needed and can support enforcement of the principle of least privilege (as well as the Zero Trust model):
      • This is a process where a network-wide policy is set in place to automatically disable admin accounts at the Active Directory level when the account is not in direct need.
      • Individual users may submit their requests through an automated process that grants them access to a specified system for a set timeframe when they need to support the completion of a certain task.
    • Disable command line and scripting activities and permissions [CPG 2.N].
      • Disabling software utilities that run from the command line makes it more difficult for threat actors to escalate privileges and move laterally.
    • Maintain offline backups of data and regularly maintain backups and restorations [CPG 2.R]; this avoids severe service interruption and irretrievable data in the event of a compromise.
    • Ensure all backup data is encrypted, immutable (i.e., cannot be altered or deleted), and covers the entire organization’s data infrastructure [CPG 2.R].

    In addition to applying mitigations, the authoring agencies recommend exercising, testing, and validating your organization’s security program against the threat behaviors mapped to the MITRE ATT&CK for Enterprise framework in this advisory. The authoring agencies recommend testing your existing security controls inventory to assess how they perform against the ATT&CK techniques described in this advisory.

    To get started:

    1. Select an ATT&CK technique described in this advisory (see Table 5 through Table 16).
    2. Align your security technologies against the technique.
    3. Test your technologies against the technique.
    4. Analyze your detection and prevention technologies’ performance.
    5. Repeat the process for all security technologies to obtain a set of comprehensive performance data.
    6. Tune your security program, including people, processes, and technologies, based on the data generated by this process.

    The authoring agencies recommend continually testing your security program, at scale, in a production environment to ensure optimal performance against the MITRE ATT&CK techniques identified in this advisory.

    Your organization has no obligation to respond or provide information back to FBI in response to this joint advisory. If, after reviewing the information provided, your organization decides to provide information to FBI, reporting must be consistent with applicable state and federal laws.

    FBI is interested in any information that can be shared, to include boundary logs showing communication to and from foreign IP addresses, a sample ransom note, communications with threat actors, Bitcoin wallet information, decryptor files, and/or a benign sample of an encrypted file.

    Additional details of interest include a targeted company point of contact, status and scope of infection, estimated loss, operational impact, transaction IDs, date of infection, date detected, initial attack vector, and host- and network-based indicators.

    The authoring agencies do not encourage paying ransom as payment does not guarantee victim files will be recovered. Furthermore, payment may also embolden adversaries to target additional organizations, encourage other criminal actors to engage in the distribution of ransomware, and/or fund illicit activities. Regardless of whether you or your organization have decided to pay the ransom, FBI and CISA urge you to promptly report ransomware incidents to FBI’s Internet Crime Complain Center (IC3), a local FBI Field Office, or CISA via the agency’s Incident Reporting System or its 24/7 Operations Center (contact@mail.cisa.dhs.gov) or by calling 1-844-Say-CISA (1-844-729-2472).

    State, local, tribal, and territorial governments should report incidents to the MS-ISAC (SOC@cisecurity.org or 866-787-4722).

    HPH Sector organizations should report incidents to FBI or CISA but also can reach out to HHS at HHScyber@hhs.gov for cyber incident support focused on mitigating adverse patient impacts.

    The information in this report is being provided “as is” for informational purposes only. The authoring agencies do not endorse any commercial entity, product, company, or service, including any entities, products, or services linked within this document. Any reference to specific commercial entities, products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favor by the authoring agencies. 

    Cisco Talos contributed to this advisory.

    July 22, 2025: Initial version.

    1 Elio Biasiotto, et. al., “Unwrapping the Emerging Interlock Ransomware Attack,” Talos Intelligence (blog), Cisco Talos, last modified November 7, 2024, https://blog.talosintelligence.com/emerging-interlock-ransomware/.

    2 Sekoia Threat Detection and Research team, “Interlock Ransomware Evolving Under the Radar,” Sekoia (blog), Sekoia, last modified April 16, 2025, https://blog.sekoia.io/interlock-ransomware-evolving-under-the-radar/.

    3 Yashvi Shah and Vignesh Dhatchanamoorthy, “ClickFix Deception: A Social Engineering Tactic to Deploy Malware,” McAfee Labs (blog), McAfee,last modified June 11, 2024, https://www.mcafee.com/blogs/other-blogs/mcafee-labs/clickfix-deception-a-social-engineering-tactic-to-deploy-malware/ and “HC3 Sector Alert: ClickFix Attacks,” Health Sector Cybersecurity Coordination Center, Department of Health and Human Services, last modified October 29, 2024, https://www.hhs.gov/sites/default/files/clickfix-attacks-sector-alert-tlpclear.pdf.

    4 Shah, “ClickFix Deception: A Social Engineering Tactic to Deploy Malware.”

    5 Sekoia Threat Detection and Research team, “Interlock Ransomware Evolving Under the Radar.”

    6 Bill Toulas, “Interlock Ransomware Gang Deploys New NodeSnake RAT on Universities,“ Bleeping Computer, May 28, 2025, https://www.bleepingcomputer.com/news/security/interlock-ransomware-gang-deploys-new-nodesnake-rat-on-universities/.

    7 Biasiotto, “Unwrapping the Emerging Interlock Ransomware Attack.”

    8 International law-enforcement and Microsoft took down the Lumma Stealer malware in May 2025 by seizing internet domains the actors used to distribute the malware to actors and taking down domains that hosted the malware’s infrastructure. For more information, see Tara Seals, “Lumma Stealer Takedown Reveals Sprawling Operation,” Dark Reading, May 21, 2025, https://www.darkreading.com/cybersecurity-operations/lumma-stealer-takedown-sprawling-operation, and Steven Masada, “Disrupting Lumma Stealer: Microsoft Leads Global Action Against Favored Cybercrime Tool,” Microsoft On the Issues (blog), Microsoft, last modified May 21, 2025, https://blogs.microsoft.com/on-the-issues/2025/05/21/microsoft-leads-global-action-against-favored-cybercrime-tool/.

    9 Sekoia Threat Detection and Research team, “Interlock Ransomware Evolving Under the Radar.”

    10 Biasiotto, “Unwrapping the Emerging Interlock Ransomware Attack.”

    11 Biasiotto, “Unwrapping the Emerging Interlock Ransomware Attack.”

    12 Biasiotto, “Unwrapping the Emerging Interlock Ransomware Attack.”

    13 Biasiotto, “Unwrapping the Emerging Interlock Ransomware Attack.”

    14 Lawrence Abrams, “Meet Interlock — The New Ransomware Targeting FreeBSD Servers,” Bleeping Computer, November 3, 2024, https://www.bleepingcomputer.com/news/security/meet-interlock-the-new-ransomware-targeting-freebsd-servers/.

    15 Biasiotto, “Unwrapping the Emerging Interlock Ransomware Attack.”

    16 Graham Cluley, “Interlock Ransomware: What You Need to Know,” Fortra (blog), Fortra, last modified May 30, 2025, https://www.tripwire.com/state-of-security/interlock-ransomware-what-you-need-know.

    17 Sekoia Threat Detection and Research team, “Interlock Ransomware Evolving Under the Radar.”

    MIL OSI USA News

  • MIL-OSI Security: Across-the-Board Convictions in Final Highs RICO Trial of 2025

    Source: Office of United States Attorneys

    MINNEAPOLIS – Following an eight-day jury trial, a federal jury convicted two defendants of all charged counts for their involvement in the Highs street gang, announced Acting U.S. Attorney Joseph H. Thompson.

    Defendants Cortez Davon Blakemore, 35, and Robert Lesure, 23, were convicted by a jury of federal RICO conspiracy and conspiracy to distribute controlled substances. A sentencing hearing will be set at a later date. According to court documents and evidence presented at trial, Blakemore and Lesure were long-standing and prolific drug traffickers for the Highs criminal street gang.  They sold fentanyl at the intersection of Broadway and Lyndale in North Minneapolis, which the Highs had taken control of and turned into an open-air drug market. As the jury heard at trial, the Highs is a violent criminal street gang that has long wreaked havoc on North Minneapolis, selling fentanyl and other deadly drugs and enforcing its terorrity through violence, kidnapping, and murder, including the murders of innocent civlians caught in the crossfire. Forty members of the Highs gang were charged in this large RICO indictment. Blakemore and Lesure are the 37th and 38th defendants to be convicted in this case. A final RICO defendant is set to be tried in 2026.

    “These convictions bring justice not just to the victims of the Highs gang, but to an entire community that has endured years of violence, fear, and loss,” said Acting U.S. Attorney Joseph H. Thompson. “For too long, this gang terrorized Minneapolis, maintaining control through chaos. Today, the people of this city get something they’ve long been denied: peace. This case is the result of a relentless federal coalition—the U.S. Attorney’s Office side-by-side with our federal, state, and local law enforcement partners.  Our message is clear: if you endanger our communities, we are coming for you.  And we won’t stop until every neighborhood in this city is free from fear.”

    “This isn’t just another trial; it’s a continuation of our full-court press to dismantle the Highs street gang and hold every last member accountable,” said Travis Riddle, ATF Special Agent in Charge of the St. Paul Field Division. “We’re proud to stand alongside our prosecution and investigative partners who’ve shown unmatched determination, trial after trial, to bring justice to the communities harmed by this violence.”

    “As the summer progresses, Minneapolis is continuing to see a drop in violent crime, especially gun violence throughout the city,” said Minneapolis Police Chief Brian O’Hara.  “The outstanding work of MPD officers and our partnership with the U.S. Attorney’s Office have been instrumental in targeting the small number of individuals committing a disproportionate amount of violence in the city. This conviction is the latest result of efforts that can not only be seen in the reduction of crime, but also felt by the community as we work to rebuild trust.”

    “Our focus isn’t just on the money—it’s on the damage that money fuels,” said Jason Bushey, IRS Acting Special Agent in Charge of the Chicago Field Office. “When violent gangs push drugs and fear into our communities, our agents work relentlessly to expose the money behind the violence. This conviction is the result of that effort and a clear reminder that those who profit from chaos and pain will be held accountable.”

    “In the wake of the guilty verdicts in the Highs gang RICO trial, it becomes abundantly clear that the efficacy of our justice system hinges not merely on the application of law, but on the transformative power of collaborative law enforcement partnerships,” stated FBI Minneapolis Special Agent in Charge Alvin M. Winston, Sr. “These alliances are essential, for they weave a fabric of shared intelligence and resources that fortify our collective resolve against violent crime, ensuring that justice is not merely an ideal, but a tangible reality for our communities.”

    This case is the result of an investigation conducted by the ATF, FBI, Minneapolis Police Department, IRS Criminal Investigation, U.S. Postal Inspection Service, Hennepin County Sheriff’s Office, Minnesota Bureau of Criminal Apprehension, and Minnesota Department of Corrections with the assistance of the U.S. Marshals Service, DEA, Homeland Security Investigation, and the Hennepin County Attorney’s Office. The Ramsey County Sheriff’s Office, Dakota County Sheriff’s Office, St. Paul Police Department, and numerous other law enforcement agencies contributed to the investigation.

    The U.S. Attorney’s Office also is deeply grateful to the Justice Department’s Violent Crime & Racketeering Section (VCRS) for their continued partnership and expertise on this and other ongoing RICO cases. This partnership has been critical to the success of these gang prosecutions.

    Assistant U.S. Attorneys Thomas Calhoun-Lopez, Albania Concepcion, and Carla Baumel tried this case.  They are prosecuting the case along with Attorney Brian Lynch of the Justice Department’s Violent Crime & Racketeering Section. 

    MIL Security OSI

  • MIL-OSI Security: Repeat Domestic Violence Offender from Ganado Sentenced to 96 Months in Prison

    Source: Office of United States Attorneys

    PHOENIX, Ariz. – Brian Jason Gishie, 46, of Ganado, Arizona, was sentenced on July 16, by Senior United States District Judge David G. Campbell to 96 months in prison, followed by three years of supervised release. Gishie, an enrolled member of the Navajo Nation, previously pleaded guilty to assault with a dangerous weapon and assault of an intimate partner by strangling.

    On or about June 20, 2024, Gishie brutally assaulted an intimate partner at his home in Greasewood, Arizona, within the Navajo Nation community. Using a baseball bat, Gishie hit the victim several times on her head and body. He then strangled her with both hands for several seconds. The victim was medically treated for injuries related to the assault. Gishie had previously been convicted of multiple domestic violence related offenses, including Aggravated Domestic Violence in Maricopa County in 2004, and Assault by Strangling in the District of Arizona in 2019.

    The FBI Phoenix Division’s Flagstaff office and the Navajo Nation Police Department conducted the investigation in this case. The United States Attorney’s Office, District of Arizona, Phoenix, handled the prosecution.

    CASE NUMBER:           CR-24-08120-PCT-DGC
    RELEASE NUMBER:    2025-123_Gishie

    # # #

    For more information on the U.S. Attorney’s Office, District of Arizona, visit http://www.justice.gov/usao/az/
    Follow the U.S. Attorney’s Office, District of Arizona, on Twitter @USAO_AZ for the latest news.

    MIL Security OSI

  • MIL-OSI Security: Amherst Businessman Sentenced for COVID Fraud

    Source: US FBI

    BUFFALO, N.Y. – U.S. Attorney Michael DiGiacomo announced today Hormoz Mansouri, 71, of Amherst, NY, who was convicted of conspiracy to commit wire fraud and bank fraud, and bank fraud, was sentenced to time served and five years’ supervised release, to include one year of home detention. He was also ordered to pay restitution totaling $3,197,562 and to forfeit $1,888,603.

    Assistant U.S. Attorney Paul E. Bonanno, who handled the case, stated that Mansouri filed fraudulent loan applications under both the Paycheck Protection Program (PPP) and Economic Injury Disaster Loan (EIDL) program.  The loans available for these programs were designed to provide emergency financial assistance pursuant to the Coronavirus Aid, Relief, and Economic Security (CARES Act). Mansouri controlled the following business entities which applied for loans:

    • HLM Holding LLC,
    • El Team Inc.,
    • NPTS Inc.,
    • 2060 Sheridan Drive LLC,
    • 212 Holden Avenue LLC,
    • 350 Old Niagara Falls Boulevard LLC,
    • 47 East Amherst LLC, and
    • 3600 Harlem Road LLC.

    The PPP loans that the Mansouri-controlled entities obtained, either inflated or completely fabricated the average monthly payroll and six of the eight entities had no actual employees or payroll expenses at all. The total amount of money received from the fraudulent PPP loans totaled approximately $3,000,000. The Mansouri controlled entities also received approximately $450,600 in Economic Injury Disaster Loans (EIDL). These loan applications falsely represented revenues and cost of goods sold. On May 28, 2021, the United States Attorney’s Office seized approximately $1,923,603 of the fraudulently obtained money.

    Mansouri also moved the fraudulent PPP and EIDL funds between various bank accounts; commingling the proceeds with legitimate business revenues; and funding certain accounts, including a campaign account (in the name of “Mansouri for County Comptroller”). 

    The sentencing is the result of an investigation by the Federal Bureau of Investigation, under the direction of Acting Special Agent-in-Charge Mark Grimm, and the Internal Revenue Service, Criminal Investigation Division, under the direction of Special Agent-in-Charge Harry Chavis.

    # # # #

     

     

    MIL Security OSI

  • MIL-OSI Security: Federal Grand Jury Indicts Louisville Woman for Defrauding Pool Business Customers

    Source: US FBI

    Louisville, KY – A federal grand jury in Louisville returned an indictment on July 16, 2025, charging a Louisville woman with engaging in a scheme to defraud customers of her pool installation business, Davenport Extreme Pools and Spas Inc.

    U.S. Attorney Kyle G. Bumgarner of the Western District of Kentucky, Acting Special Agent in Charge Olivia Olson of the FBI Louisville Field Office, and Special Agent in Charge Karen Wingerd of the Internal Revenue Service Criminal Investigations, Cincinnati Field Office, made the announcement.

    According to the indictment, Tracy Davenport, 50, was charged with 13 counts of wire fraud, 5 counts of money laundering, and 1 count of bankruptcy fraud. The indictment alleges Tracy Davenport, and others working at her direction, engaged in a scheme to induce customers into signing a contract for a pool installation and paying a large down payment up front. Tracy Davenport then used those funds for purposes other than what was agreed upon.

    The defendant will make her initial court appearance before a U.S. Magistrate Judge of the U.S. District Court for the Western District of Kentucky at a later date. 

    There is no parole in the federal system.

    This case is being investigated by the FBI and IRS-CI, with assistance from the Louisville Metro Police Department, the Jefferson County Commonwealth Attorney’s Office, and the United States Trustee’s Office for the Western District of Kentucky.

    Assistant U.S. Attorney Nicole Elver is prosecuting the case.

    An indictment is merely an allegation. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    ###

    MIL Security OSI

  • MIL-OSI Security: Byrd Gang Member Sentenced for Racketeering, Firearm, and Drug Conspiracies

    Source: US FBI

    NEW ORLEANS, LOUISIANA – SAMUEL MORTON (“MORTON”),a/k/a “Sosa,” age 27, from New Orleans, was sentenced on July 2, 2025, for violations of 18 U.S.C. § 1962(d), conspiracy to violate the Racketeer Influenced and Corrupt Organizations Act, in violation of Title 18, U.S.C. § 1962(d); conspiracy to distribute controlled substances, in violation of Title 21, U.S.C. § 846,; and conspiracy to possess firearms, in violation of Title 18, U.S.C. § 924(o),.

    According to court documents, MORTON was a member of the Byrd Gang, which operated primarily out of the former Magnolia Housing Development in Central City New Orleans. MORTON and other members of this organization and their associates ran a violent drug trafficking ring in and around New Orleans dating back to 2014. Its members daily distributed drugs, including heroin, fentanyl, crack cocaine and marijuana, and always possessed firearms. The gang, and MORTON specifically, committed many acts of violence, often in furtherance of an ongoing feud with its rivals, the Ghost Gang. Numerous individuals have been shot and killed on both sides, and innocent bystanders have also been caught in these retaliatory shootings.

    United States District Judge Milazzo sentenced MORTON to 216 months imprisonment for each count, to be served concurrently, to be followed by 5 years of supervised release. MORTON was also ordered to pay a $300 mandatory special assessment fee.

    This case is part of Project Safe Neighborhoods (PSN), a program bringing together all levels of law enforcement and the communities they serve to reduce violent crime and gun violence, and to make our neighborhoods safer for everyone. On May 26, 2021, the Department launched a violent crime reduction strategy strengthening PSN based on these core principles: fostering trust and legitimacy in our communities, supporting community-based organizations that help prevent violence from occurring in the first place, setting focused and strategic enforcement priorities, and measuring the results. For more information about Project Safe Neighborhoods, please visit Justice.gov/PSN.

    Acting U.S. Attorney Simpson praised the work of the Federal Bureau of Investigation and the New Orleans Police Department. The case is being prosecuted by Assistant United States Attorneys Elizabeth Privitera and Sarah Dawkins of the Violent Crime Unit.

     

    MIL Security OSI

  • MIL-OSI Security: Byrd Gang Member Sentenced for Racketeering, Firearm, and Drug Conspiracies

    Source: US FBI

    NEW ORLEANS, LOUISIANA – SAMUEL MORTON (“MORTON”),a/k/a “Sosa,” age 27, from New Orleans, was sentenced on July 2, 2025, for violations of 18 U.S.C. § 1962(d), conspiracy to violate the Racketeer Influenced and Corrupt Organizations Act, in violation of Title 18, U.S.C. § 1962(d); conspiracy to distribute controlled substances, in violation of Title 21, U.S.C. § 846,; and conspiracy to possess firearms, in violation of Title 18, U.S.C. § 924(o),.

    According to court documents, MORTON was a member of the Byrd Gang, which operated primarily out of the former Magnolia Housing Development in Central City New Orleans. MORTON and other members of this organization and their associates ran a violent drug trafficking ring in and around New Orleans dating back to 2014. Its members daily distributed drugs, including heroin, fentanyl, crack cocaine and marijuana, and always possessed firearms. The gang, and MORTON specifically, committed many acts of violence, often in furtherance of an ongoing feud with its rivals, the Ghost Gang. Numerous individuals have been shot and killed on both sides, and innocent bystanders have also been caught in these retaliatory shootings.

    United States District Judge Milazzo sentenced MORTON to 216 months imprisonment for each count, to be served concurrently, to be followed by 5 years of supervised release. MORTON was also ordered to pay a $300 mandatory special assessment fee.

    This case is part of Project Safe Neighborhoods (PSN), a program bringing together all levels of law enforcement and the communities they serve to reduce violent crime and gun violence, and to make our neighborhoods safer for everyone. On May 26, 2021, the Department launched a violent crime reduction strategy strengthening PSN based on these core principles: fostering trust and legitimacy in our communities, supporting community-based organizations that help prevent violence from occurring in the first place, setting focused and strategic enforcement priorities, and measuring the results. For more information about Project Safe Neighborhoods, please visit Justice.gov/PSN.

    Acting U.S. Attorney Simpson praised the work of the Federal Bureau of Investigation and the New Orleans Police Department. The case is being prosecuted by Assistant United States Attorneys Elizabeth Privitera and Sarah Dawkins of the Violent Crime Unit.

     

    MIL Security OSI

  • MIL-OSI Security: Illinois Man Sentenced to 97 Months in Prison for Trying to Arrange Florida Murder

    Source: Office of United States Attorneys

    CAPE GIRARDEAU – U.S. District Sarah E. Pitlyk on Tuesday sentenced an Illinois man to 97 months in prison for trying to have a business associate in Florida murdered.

    At an initial meeting in Missouri in January of 2024, Ben Patrick Mullavey asked a former employee to kill Mullavey’s business partner in Florida. That employee contacted authorities. In subsequent conversations, many of which were recorded by the FBI, Mullavey told the employee that he had been planning the murder for months and had conducted surveillance of the victim and had stolen a Florida license plate. Mullavey suggested the best time and place to commit the murder, how to avoid being identified on surveillance cameras and several ways of disposing of the victim’s body.

    On Jan. 13, 2024, the employee left Mullavey’s home with orders to kill the victim, a crossbow, arrows, the stolen Florida license plate, handwritten directions to a restaurant located next door to the victim’s business and $2,100 in cash.

    In a victim impact letter, Mullavey’s target said that since being informed that he was the target of a murder-for-hire scheme, he has lived in a “state of constant fear.” Forced to abandon his business out of concern over the risk of being in a public place every day, he also lost his financial security, his apartment and everything inside it. “This is not just something that happened once. It is something that will affect me every day for the rest of my life,” he wrote.

    Mullavey, 66, of Mechanicsburg, in Sangamon County, pleaded guilty in April in U.S. District Court in Cape Girardeau to one felony count of use of interstate commerce facilities in the commission of attempted murder-for-hire.

    The FBI investigated the case. Assistant U.S. Attorney Christopher Shelton prosecuted the case. 

    MIL Security OSI

  • MIL-OSI Security: Illinois Man Sentenced to 97 Months in Prison for Trying to Arrange Florida Murder

    Source: Office of United States Attorneys

    CAPE GIRARDEAU – U.S. District Sarah E. Pitlyk on Tuesday sentenced an Illinois man to 97 months in prison for trying to have a business associate in Florida murdered.

    At an initial meeting in Missouri in January of 2024, Ben Patrick Mullavey asked a former employee to kill Mullavey’s business partner in Florida. That employee contacted authorities. In subsequent conversations, many of which were recorded by the FBI, Mullavey told the employee that he had been planning the murder for months and had conducted surveillance of the victim and had stolen a Florida license plate. Mullavey suggested the best time and place to commit the murder, how to avoid being identified on surveillance cameras and several ways of disposing of the victim’s body.

    On Jan. 13, 2024, the employee left Mullavey’s home with orders to kill the victim, a crossbow, arrows, the stolen Florida license plate, handwritten directions to a restaurant located next door to the victim’s business and $2,100 in cash.

    In a victim impact letter, Mullavey’s target said that since being informed that he was the target of a murder-for-hire scheme, he has lived in a “state of constant fear.” Forced to abandon his business out of concern over the risk of being in a public place every day, he also lost his financial security, his apartment and everything inside it. “This is not just something that happened once. It is something that will affect me every day for the rest of my life,” he wrote.

    Mullavey, 66, of Mechanicsburg, in Sangamon County, pleaded guilty in April in U.S. District Court in Cape Girardeau to one felony count of use of interstate commerce facilities in the commission of attempted murder-for-hire.

    The FBI investigated the case. Assistant U.S. Attorney Christopher Shelton prosecuted the case. 

    MIL Security OSI

  • MIL-OSI Security: Forty-Eighth Conviction in Feeding Our Future Fraud Scheme

    Source: Office of United States Attorneys

    MINNEAPOLIS – Asad Mohamed Abshir has pleaded guilty to one count of money laundering for his role in the Feeding Our Future fraud scheme, announced Acting U.S. Attorney Joseph H. Thomspon.  He is the 48th defendant to be convicted in this massive fraud scheme.

    “This guilty plea is another step in exposing the staggering levels of fraud that have been hiding in plain sight across Minnesota,” said Acting U.S. Attorney Joseph H. Thompson. “This defendant laundered money meant to feed children and funneled it into a web of shell companies and luxury spending. As FBI Director Kah Patel recently said, this case stands as one of the most egregious abuses of public trust in recent memory. The people of Minnesota deserve better.”

    In fall of 2020, the defendant, Asad Mohamed Abshir, 34, assisted his brother and co-defendant, Abdinasir Abshir, in the operations of non-profit called Stigma Free International. Under the sponsorship of Feeding Our Future, the Abshir brothers claimed to operate, through Stigma Free, a food distribution site in Mankato, Minneosta. At the same time, Abdinasir Abshir claimed to provide food for the Mankato site through an entity he controlled called Horseed Management LLC. But the Abshirs did not provide the food they claimed to, and they were not entitled to the taxpayer dollars they received for their claims.

    Over the course of 2020 to 2021, the Abshirs fraudulently claimed to have provided 1.6 million meals to children. For his role in the scheme, Abdinasir personally received about $750,000. The defendant used $77,353 in fraud proceeds to purchase a 2022 GMC Sierra 1500 Denali truck, which has been seized and will be forfeited to the United States. In addition, the Unites States seized $424,762.51 from the bank account for the defedant’s shell company, Santana LLC, all of which will be forfeited.

    “Asad Abshir’s guilty plea underscores a troubling intersection of deception and exploitation within federal assistance programs designed to nourish vulnerable populations,” said FBI Minneapolis Special Agent in Charge Alvin M. Winston Sr. “Abshir not only undermined the integrity of the Federal Child Nutrition Program, but also abused the resources intended for the nation’s most at-risk children. This case serves as a stark reminder of the critical need for stringent oversight and accountability in the administration of taxpayer dollars.”

    This case is the result of an investigation conducted by the FBI, IRS – Criminal Investigations, and the U.S. Postal Inspection Service

    Abshir pleaded guilty yesterday in U.S. District Court before Judge Nancy E. Brasel. A sentencing hearing will be scheduled at a later date.

    Acting U.S. Attorney Joseph H. Thompson and Assistant U.S. Attorneys Matthew S. Ebert, Harry M. Jacobs, and Daniel W. Bobier are prosecuting the case. Assistant U.S. Attorney Craig Baune is handling the seizure and forfeiture of assets.

    MIL Security OSI

  • MIL-OSI Security: Forty-Eighth Conviction in Feeding Our Future Fraud Scheme

    Source: Office of United States Attorneys

    MINNEAPOLIS – Asad Mohamed Abshir has pleaded guilty to one count of money laundering for his role in the Feeding Our Future fraud scheme, announced Acting U.S. Attorney Joseph H. Thomspon.  He is the 48th defendant to be convicted in this massive fraud scheme.

    “This guilty plea is another step in exposing the staggering levels of fraud that have been hiding in plain sight across Minnesota,” said Acting U.S. Attorney Joseph H. Thompson. “This defendant laundered money meant to feed children and funneled it into a web of shell companies and luxury spending. As FBI Director Kah Patel recently said, this case stands as one of the most egregious abuses of public trust in recent memory. The people of Minnesota deserve better.”

    In fall of 2020, the defendant, Asad Mohamed Abshir, 34, assisted his brother and co-defendant, Abdinasir Abshir, in the operations of non-profit called Stigma Free International. Under the sponsorship of Feeding Our Future, the Abshir brothers claimed to operate, through Stigma Free, a food distribution site in Mankato, Minneosta. At the same time, Abdinasir Abshir claimed to provide food for the Mankato site through an entity he controlled called Horseed Management LLC. But the Abshirs did not provide the food they claimed to, and they were not entitled to the taxpayer dollars they received for their claims.

    Over the course of 2020 to 2021, the Abshirs fraudulently claimed to have provided 1.6 million meals to children. For his role in the scheme, Abdinasir personally received about $750,000. The defendant used $77,353 in fraud proceeds to purchase a 2022 GMC Sierra 1500 Denali truck, which has been seized and will be forfeited to the United States. In addition, the Unites States seized $424,762.51 from the bank account for the defedant’s shell company, Santana LLC, all of which will be forfeited.

    “Asad Abshir’s guilty plea underscores a troubling intersection of deception and exploitation within federal assistance programs designed to nourish vulnerable populations,” said FBI Minneapolis Special Agent in Charge Alvin M. Winston Sr. “Abshir not only undermined the integrity of the Federal Child Nutrition Program, but also abused the resources intended for the nation’s most at-risk children. This case serves as a stark reminder of the critical need for stringent oversight and accountability in the administration of taxpayer dollars.”

    This case is the result of an investigation conducted by the FBI, IRS – Criminal Investigations, and the U.S. Postal Inspection Service

    Abshir pleaded guilty yesterday in U.S. District Court before Judge Nancy E. Brasel. A sentencing hearing will be scheduled at a later date.

    Acting U.S. Attorney Joseph H. Thompson and Assistant U.S. Attorneys Matthew S. Ebert, Harry M. Jacobs, and Daniel W. Bobier are prosecuting the case. Assistant U.S. Attorney Craig Baune is handling the seizure and forfeiture of assets.

    MIL Security OSI

  • MIL-OSI Security: FBI Columbia Warns of Government Impersonation Scams Using Spoofed FBI Phone Number

    Source: US FBI

    The FBI is warning the public about a rise in government impersonation scams reported across South Carolina. In these schemes, scammers spoof phone numbers associated with the FBI— including the main number for the FBI’s Columbia Field Office— to appear legitimate.
    These scams typically involve criminals posing as government officials who threaten arrest or prosecution unless the victim provides money or personal information.

    Recent reports to the FBI detail a common tactic: victims receive a call informing them they have missed federal jury duty or that there is a warrant for their arrest. They are told to expect a follow-up call from an FBI agent and, when called, the number on the caller ID shows the FBI Columbia number. During that second call, the impersonator instructs victims to withdraw large sums of cash and convert it into digital currency at designated kiosks to avoid fines and penalties. In some cases, victims receive fraudulent documents via text message featuring official-looking government seals and letterhead.

    Victims have reported losing thousands of dollars before realizing they were being scammed.

    While this type of fraud is not new, it is one of many variations that exploit fear and urgency by invoking law enforcement authority.

    Important reminders:

    Anyone who believes they may have been targeted or victimized should report the incident to the FBI at 1-800-CALL-FBI or submit a tip online at tips.fbi.gov.

    MIL Security OSI

  • MIL-OSI Security: Bapchule Man Sentenced to 20 Years in Prison for Stabbing Death

    Source: Office of United States Attorneys

    PHOENIX, Ariz. – Daryl Patrick Johns, 46, of Bapchule, Arizona, a member of the Gila River Indian Community, was sentenced on July 17 by U.S. District Judge Douglas L. Rayes to 20 years in prison, followed by five years of supervised release.

    On February 15, 2023, Johns stabbed and killed the victim on the Gila River Indian Community. Johns pleaded guilty on November 1, 2024, to Second Degree Murder.     

    The Gila River Police Department and the FBI Phoenix Indian Country squad conducted the investigation in this case. Assistant U.S. Attorney Raynette Logan, District of Arizona, Phoenix, handled the prosecution.

    CASE NUMBER:           CR-23-1639-PHX-DLR
    RELEASE NUMBER:    2025-122_Johns

    # # #

    For more information on the U.S. Attorney’s Office, District of Arizona, visit http://www.justice.gov/usao/az/
    Follow the U.S. Attorney’s Office, District of Arizona, on Twitter @USAO_AZ for the latest news.

    MIL Security OSI

  • MIL-OSI Security: Bapchule Man Sentenced to 20 Years in Prison for Stabbing Death

    Source: Office of United States Attorneys

    PHOENIX, Ariz. – Daryl Patrick Johns, 46, of Bapchule, Arizona, a member of the Gila River Indian Community, was sentenced on July 17 by U.S. District Judge Douglas L. Rayes to 20 years in prison, followed by five years of supervised release.

    On February 15, 2023, Johns stabbed and killed the victim on the Gila River Indian Community. Johns pleaded guilty on November 1, 2024, to Second Degree Murder.     

    The Gila River Police Department and the FBI Phoenix Indian Country squad conducted the investigation in this case. Assistant U.S. Attorney Raynette Logan, District of Arizona, Phoenix, handled the prosecution.

    CASE NUMBER:           CR-23-1639-PHX-DLR
    RELEASE NUMBER:    2025-122_Johns

    # # #

    For more information on the U.S. Attorney’s Office, District of Arizona, visit http://www.justice.gov/usao/az/
    Follow the U.S. Attorney’s Office, District of Arizona, on Twitter @USAO_AZ for the latest news.

    MIL Security OSI

  • MIL-OSI Security: Laredo man sentenced to 63 months for smuggling over 100 illegal aliens in locked trailer

    Source: Office of United States Attorneys

    LAREDO, Texas – A 49-year-old resident of Laredo has been ordered to federal prison for his role in a conspiracy to transport illegal aliens, announced U.S. Attorney Nicholas J. Ganjei.

    Juan Manuel Aguirre pleaded guilty Feb. 6.

    U.S. District Judge Keith P. Ellison has now ordered Aguirre to serve 63 months in federal prison to be immediately followed by three years of supervised release. At the hearing, the court considered Aguirre’s history of smuggling aliens on multiple occasions and the danger he posed by transporting them in a sealed, locked, dark and unventilated trailer that required authorities to open with a bolt cutter. 

    “Human smuggling is an incredibly dangerous enterprise, and it requires the trafficker to care absolutely nothing about the lives and safety of those they transport,” said Ganjei. “Fortunately, there were no deaths in this case, but the underlying facts indicate that several of those transported had difficulty breathing and feared for their life. The Southern District of Texas will make sure that all human smugglers pay a serious price for their callousness.”

    On Dec. 2, 2024, law enforcement observed several individuals being loading into a white trailer in a warehouse parking lot. Aguirre was the driver of the truck hauling it. After he departed the location, authorities conducted a traffic stop which resulted in the discovery of 101 aliens locked inside the trailer, 13 of whom were children as young as 13 years old.

    Multiple illegal aliens reported they had difficulty breathing and feared for their life due to the conditions in the trailer. They were from the countries of Mexico, Guatemala, Cuba and Honduras.

    Aguirre will remain in custody pending transfer to a Federal Bureau of Prisons facility to be determined in the near future.

    Immigration and Customs Enforcement – Homeland Security Investigations, FBI, Texas Department of Public Safety and Border Patrol conducted the Organized Crime Drug Enforcement Task Forces (OCDETF) operation with the assistance of Customs and Border Protection, Drug Enforcement Administration and Webb County Sheriff’s Office. OCDETF identifies, disrupts and dismantles the highest-level criminal organizations that threaten the United States using a prosecutor-led, intelligence-driven, multi-agency approach. Additional information about the OCDETF Program can be found on the Department of Justice’s OCDETF webpage.

    Assistant U.S. Attorney Brandon Scott Bowling is prosecuting the case.

    MIL Security OSI

  • MIL-OSI Security: United States Unseals Civil Action Filed Against Approximately $2M in Digital Currency Involved in Hamas Fundraising

    Source: United States Attorneys General 7

    The Justice Department and the U.S. Attorney’s Office for the District of Columbia today announced the unsealing of a civil forfeiture action against approximately $2 million dollars in digital currency held by Tether Limited (Tether) and Binance Holdings LTD (Binance) accounts connected with Buy Cash Money and Money Transfer Company (BuyCash), a Gaza-based money transfer business that was involved in financially supporting Hamas – a designated Foreign Terrorist Organization (FTO) – as well as its agents and collaborators.

    “Terrorist organizations like Hamas and their affiliates rely on shadowy financial networks to fund their deadly operations,” said Attorney General Pamela Bondi. “By seizing millions in cryptocurrency, the Justice Department is aggressively dismantling the financial infrastructure of terrorism and refusing to allow our digital currency platforms to become safe havens for terrorist financing.”

    “The forfeiture action executed today is an example of how diligently our office works to prevent any actions from taking place that support foreign terrorist organizations,” said U.S. Attorney Jeanine Ferris Pirro for the District of Colombia. “Our partnership with other law enforcement agencies strengthens us to uphold the safety of the American people from entities that threaten the security of our citizens.”

    “The forfeiture action unsealed today demonstrates that no matter what lengths terrorism financers take to obscure their illegal transactions, the FBI will aggressively disrupt the transmission of illicit proceeds intended to support designated terrorist organizations like Hamas,” said Assistant Director in Charge Steven J. Jensen of the FBI Washington Field Office.

    BuyCash, and one of its owners, Ahmed M. M. Alaqad, have been suspected of supporting various terrorist organizations including Hamas, ISIS, Al-Qaida affiliates and others. After the October 2023 attacks on Israel, BuyCash and Alaqad were designated as having materially supported Hamas under Executive Order 13224 by the U.S. Department of Treasury Office of Foreign Asset Control (OFAC). Since 2017, BuyCash and Alaqad have supported several foreign terrorist organizations. In 2017, BuyCash was used for the procurement of large quantities of online infrastructure on behalf of ISIS. In September 2019, BuyCash was used to receive funds from a known Al-Qaida affiliate. In 2019, law enforcement identified various instances where BuyCash, with the direct support of Alaqad, directly aided in the transfer of fiat currency to known individuals and entities in support of Hamas. In June 2021, Israel’s National Bureau for Counter Terrorist Financing seized various digital currency accounts connected to Hamas and the Izz-al-Din Qassam Brigades, including one involving BuyCash.

    The complaint describes a detailed scheme whereby users utilized BuyCash to fund accounts held by Tether and Binance to obfuscate their financial support of international terrorist organizations, including Hamas. Before and after the October 2023 attacks, one account was reported to have received at least $4 million to support Hamas.

    The government’s forfeiture action targets multiple accounts previously seized from Tether and Binance connected to BuyCash and removed approximately $2 million dollars from streams of funds supporting international terrorism.

    A civil forfeiture complaint contains mere allegations. The burden to prove forfeitability in a civil forfeiture proceeding is upon the government.

    The FBI Washington D.C. Field Office is investigating the case.

    Assistant U.S. Attorneys Rajbir S. Datta and Thomas Saunders for the District of Columbia are prosecuting the case with assistance from Trial Attorney Allison Ickovic of the Criminal Division’s Money Laundering and Asset Recovery Section (MLARS) and Deputy Chief Alicia Cook of the National Security Division. Critical assistance was provided by Paralegal Specialists Brian Rickers, Gina Torres, and the Department of Justice’s Office of International Affairs.  

    MIL Security OSI

  • MIL-OSI Security: #StopRansomware: Interlock

    Source: US Department of Homeland Security

    Summary

    Note: This joint Cybersecurity Advisory is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations protect against ransomware. Visit stopransomware.gov to see all #StopRansomware advisories and to learn more about other ransomware threats and no-cost resources.

    The Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), Department of Health and Human Services (HHS), and Multi-State Information Sharing and Analysis Center (MS-ISAC)—hereafter referred to as “the authoring organizations”—are releasing this joint advisory to disseminate known Interlock ransomware IOCs and TTPs identified through FBI investigations (as recently as June 2025) and trusted third-party reporting.

    The Interlock ransomware variant was first observed in late September 2024, targeting various business, critical infrastructure, and other organizations in North America and Europe. FBI maintains these actors target their victims based on opportunity, and their activity is financially motivated. FBI is aware of Interlock ransomware encryptors designed for both Windows and Linux operating systems; these encryptors have been observed encrypting virtual machines (VMs) across both operating systems. FBI observed actors obtaining initial access via drive-by download from compromised legitimate websites, which is an uncommon method among ransomware groups. Actors were also observed using the ClickFix social engineering technique for initial access, in which victims are tricked into executing a malicious payload under the guise of fixing an issue on the victim’s system. Actors then use various methods for discovery, credential access, and lateral movement to spread to other systems on the network.

    Interlock actors employ a double extortion model in which actors encrypt systems after exfiltrating data, which increases pressure on victims to pay the ransom to both get their data decrypted and prevent it from being leaked. 

    FBI, CISA, HHS, and MS-ISAC encourage organizations to implement the recommendations in the Mitigations section of this advisory to reduce the likelihood and impact of Interlock ransomware incidents.

    Download the PDF version of this report:

    For a downloadable copy of IOCs, see:

    Note: This advisory uses the MITRE ATT&CK® Matrix for Enterprise framework, version 17. See the MITRE ATT&CK Tactics and Techniques section of this advisory for tables mapped to the threat actors’ activity.

    Overview

    Since September 2024, Interlock ransomware actors have impacted a wide range of businesses and critical infrastructure sectors in North America and Europe. These actors are opportunistic and financially motivated in nature and employ tactics to infiltrate and disrupt the victim’s ability to provide their essential services. 

    Interlock actors leverage a double extortion model, in which they both encrypt and exfiltrate victim data. Ransom notes do not include an initial ransom demand or payment instructions; instead, victims are provided with a unique code and are instructed to contact the ransomware group via a .onion URL through the Tor browser. To date, Interlock actors have been observed encrypting VMs, leaving hosts, workstations, and physical servers unaffected; however, this does not mean they will not expand to these systems in the future. To counter Interlock actors’ threat to VMs, enterprise defenders should implement robust endpoint detection and response (EDR) tooling and capabilities.

    The authoring agencies are aware of emerging open-source reporting detailing similarities between the Rhysida and Interlock ransomware variants.1 For additional information on Rhysida ransomware, see the joint advisory, #StopRansomware: Rhysida Ransomware.

    Initial Access

    FBI has observed Interlock actors obtaining initial access [TA0001] via drive-by download [T1189] from compromised legitimate websites, an atypical method for ransomware actors. Interlock ransomware methods for initial access have previously disguised malicious payloads as fake Google Chrome or Microsoft Edge browser updates, though a cybersecurity company recently reported a shift to payload filenames masquerading as updates for common security software (see Table 5 for a list of filenames).2

    In some instances, FBI has observed Interlock actors using the ClickFix social engineering technique, in which unsuspecting users are prompted to execute a malicious payload by clicking a fake Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA) [T1189]. The CAPTCHA contains instructions for users to open the Windows Run window, paste the clipboard contents, and then execute a malicious Base64-encoded PowerShell process [T1204.004].3

    Note: This ClickFix technique has been used in several other malware campaigns, including Lumma Stealer and DarkGate.4

    Execution and Persistence

    Based on FBI investigations, the fake Google Chrome browser executable functions as a remote access trojan (RAT) [T1105] designed to execute a PowerShell script [T1059.001] that drops a file into the Windows Startup folder. From there, the file is designed to run the RAT every time the victim logs in [T1547.001], establishing persistence [TA0003]. 

    FBI also observed instances in which Interlock actors executed a PowerShell command designed to establish persistence via a Windows Registry key modification [T1547.001]. To do so, Interlock actors used a PowerShell command [T1059.001] designed to add a run key value named “Chrome Updater” [T1036.005] that uses a specific log file as an argument upon user login.

    Reconnaissance

    To facilitate reconnaissance, a PowerShell script executes a series of commands [T1059.001] designed to gather information on victim machines (see Table 1).

    Table 1. PowerShell Commands for Reconnaissance
    PowerShell Command Description
    WindowsIdentity.GetCurrent() Returns a WindowsIdentity object that represents the current Windows user [T1033].
    systeminfo Displays detailed configuration information [T1082] about a computer and its operating system, including operating system configuration, security information, product ID, and hardware properties.
    tasklist/svc Lists unabridged service information [T1007] for each process currently running on the local computer.
    Get-Service Gets objects that represent the services [T1007] on a computer, including running and stopped services.
    Get-PSDrive

    Gets the drives [T1082] in the current session, such as:

    • Windows logical drives on the computer, including drives mapped to network shares.
    • Drives exposed by PowerShell providers.
    • Session-specified temporary drives and persistent mapped network drives.
       
    arp -a Displays and modifies entries in the Address Resolution Protocol (ARP) cache table [T1016], which contains entries on the IPv4 and IPv6 addresses on host endpoints.

    Command and Control

    FBI observed Interlock actors using command and control (C2) [TA0011] applications like Cobalt Strike and SystemBC. Interlock actors also used Interlock RAT5 and NodeSnake RAT (as of March 2025)6 for C2 and executing commands.

    Credential Access, Lateral Movement, and Privilege Escalation

    FBI observed that once Interlock actors establish remote control of a compromised system, they use a series of PowerShell commands to download a credential stealer (cht.exe) [TA0006] and keylogger binary (klg.dll) [T1056.001],[T1105]. According to open source reporting, the credential stealer collects login information and associated URLs for victims’ online accounts [T1555.003], while the keylogger dynamic link library (DLL) logs users’ keystrokes in a file named conhost.txt [T1036.005].7 As of February 2025, private cybersecurity analysts also observed Interlock ransomware infections executing different versions of information stealers [TA0006], including Lumma Stealer8 and Berserk Stealer, to harvest credentials for lateral movement and privilege escalation [T1078].9

    Interlock actors leverage compromised credentials and Remote Desktop Protocol (RDP)10 [T1021.001] to move between systems. They also use tools like AnyDesk to enable remote connectivity and PuTTY to assist with lateral movement [T1219].11 In addition to stealing users’ online credentials, Interlock actors have compromised domain administrator accounts (possibly by using a Kerberoasting attack [T1558.003])12 to gain additional privileges [T1078.002]. 

    Collection and Exfiltration

    Interlock actors leverage Azure Storage Explorer (StorageExplorer.exe) to navigate victims’ Microsoft Azure Storage accounts [T1530] prior to exfiltrating data. According to open source reporting, Interlock actors execute AzCopy to exfiltrate data by uploading it to the Azure storage blob [T1567.002].13 Interlock actors also exfiltrate data over file transfer tools, including WinSCP [T1048].

    Impact

    Following data exfiltration, Interlock actors deploy the encryption binary as a 64-bit executable named conhost.exe [T1486],[T1036.005]. FBI has observed Interlock ransomware encryptors for both Windows and Linux operating systems. Encryptors are designed to encrypt files using a combined Advanced Encryption Standard (AES) and Rivest-Shamir-Adleman (RSA) algorithm. In addition, cybersecurity researchers have identified Interlock ransomware samples using a FreeBSD ELF encryptor [T1486], a departure from usual Linux encryptors designed for VMware ESXi servers and VMs.14

    A cybersecurity company identified a DLL binary named tmp41.wasd—executed after encryption using rundll32.exe [T1218.011]—which uses the remove() function to delete the encryption binary [T1070.004];15 on Linux machines, the encryptor uses a similar technique to execute the removeme function. 

    Encrypted files are appended with either a .interlock or .1nt3rlock file extension, alongside a ransom note titled !__README__!.txt delivered via group policy object (GPO). Interlock actors use a double-extortion model [T1657], encrypting systems after exfiltrating data. The ransom note provides each victim with a unique code and instructions to contact the ransomware actors via a .onion URL. 

    Interlock actors do not leave an initial ransom demand or payment instructions on compromised networks, and do not relay this information until contacted by the victim. The actors instruct victims to make ransom payments in Bitcoin to cryptocurrency wallet addresses provided by the actors. The actors threaten to publish the victim’s exfiltrated data to their leak site on the Tor network unless the victim pays the ransom demand; the actors have previously followed through on this threat.16

    See Table 2 for publicly available tools and applications used by Interlock ransomware actors. This includes legitimate tools repurposed for their operations.

    Disclaimer: Use of these tools and applications should not be attributed as malicious without analytical evidence to support threat actor use and/or control.

    Table 2. Tools Used by Interlock Ransomware Actors
    Tool Name Description
    AnyDesk A common legitimate remote monitoring and management (RMM) tool maliciously used by Interlock actors to obtain remote access and maintain persistence. AnyDesk also supports remote file transfer.
    Cobalt Strike A penetration testing tool used by security professionals to test the security of networks and systems.
    PowerShell A cross-platform task automation solution made up of a command-line shell, a scripting language, and a configuration management framework, which runs on Windows, Linux, and macOS.
    PSExec A tool designed to run programs and execute commands on remote systems.
    PuTTY.exe An open source file transfer application commonly used to remotely connect to systems via Secure Shell (SSH). PuTTY also supports file transfer protocols like Secure File Transfer Protocol (SFTP) and Secure Copy Protocol (SCP).
    ScreenConnect A remote support, access, and meeting software that allows users to control devices remotely over the internet. CISA observed Interlock actors using a cracked version of this software in at least one incident. These versions may be standalone versions not connecting to ScreenConnect’s official cloud domains (domains available upon request from ConnectWise).
    SystemBC Enables Interlock actors to compromise systems, run commands, download malicious payloads, and act as a proxy tool to the actors’ C2 servers.
    Windows Console Host Windows Console Host (conhost.exe) manages the user interface for command-line applications in Windows, including Command Prompt and PowerShell. 
    WinSCP A free and open source SSH File Transfer Protocol (FTP), WebDAV, Amazon S3, and secure copy protocol client.

    See Table 3 and Table 4 for files used by Interlock ransomware actors. These were obtained from FBI investigations as recently as June 2025.

    Disclaimer: Some of the hashes are for legitimate tools and applications and should not be attributed as malicious without analytical evidence to support threat actor use and/or control. The authoring agencies recommend organizations investigate or vet these hashes prior to taking action, such as blocking.

    Table 3. Files Used by Interlock Ransomware Actors (SHA-256)
    File Name Hash
    1.ps1 fba4883bf4f73aa48a957d894051d78e0085ecc3170b1ff50e61ccec6aeee2cd 
    advanced_port_scanner.exe 4b036cc9930bb42454172f888b8fde1087797fc0c9d31ab546748bd2496bd3e5
    Aisa.exe 18a507bf1c533aad8e6f2a2b023fbbcac02a477e8f05b095ee29b52b90d47421
    AnyDesk.exe 1a70f4eef11fbecb721b9bab1c9ff43a8c4cd7b2cafef08c033c77070c6fe069
    autoservice.dll a4069aa29628e64ea63b4fb3e29d16dcc368c5add304358a47097eedafbbb565
    Autostart.exe d535bdc9970a3c6f7ebf0b229c695082a73eaeaf35a63cd8a0e7e6e3ceb22795
    cht FAFCD5404A992850FFCFFEE46221F9B2FF716006AECB637B80E5CD5AA112D79C
    cht.exe C20BABA26EBB596DE14B403B9F78DDC3C13CE9870EEA332476AC2C1DD582AA07
    cleanup.dll (SystemBC) 1845a910dcde8c6e45ad2e0c48439e5ab8bbbeb731f2af11a1b7bbab3bfe0127
    conhost 44887125aa2df864226421ee694d51e5535d8c6f70e327e9bcb366e43fd892c1
    conhost.dll a70af759e38219ca3a7f7645f3e103b13c9fb1db6d13b68f3d468b7987540ddf
    conhost.dll 96babe53d6569ee3b4d8fc09c2a6557e49ebc2ed1b965abda0f7f51378557eb1
    difxepi.dll (SystemBC) 1845a910dcde8c6e45ad2e0c48439e5ab8bbbeb731f2af11a1b7bbab3bfe0127
    iexplore.exe d0c1662ce239e4d288048c0e3324ec52962f6ddda77da0cb7af9c1d9c2f1e2eb
    klg.dll A4F0B68052E8DA9A80B70407A92400C6A5DEF19717E0240AC608612476E1137E
    !!!OPEN_ME!!!.txt 68A49D5A097E3850F3BB572BAF2B75A8E158DADB70BADDC205C2628A9B660E7A
    processhacker-2.39-bin.zip 88f26f3721076f74996f8518469d98bf9be0eaee5b9eccc72867ebfc25ea4e83
    PsExec.exe 078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b
    putty.exe 7a43789216ce242524e321d2222fa50820a532e29175e0a2e685459a19e09069
    puttyportable.exe 97931d2e2e449ac3691eb526f6f60e2f828de89074bdac07bd7dbdfd51af9fa0
    PuTTYPortable.zip ff7ad2376ae01e4b3f1e1d7ae630f87b8262b5c11bc5d953e1ac34ffe81401b5
    qrpce91.exe.asd 64a0ab00d90682b1807c5d7da1a4ae67cde4c5757fc7d995d8f126f0ec8ae983
    ScreenConnect.ClientService.exe 2814b33ce81d2d2e528bb1ed4290d665569f112c9be54e65abca50c41314d462
    SophosendpointAgent.exe f51b3d054995803d04a754ea3ff7d31823fab654393e8054b227092580be43db
    SophosScaner.exe dfb5ba578b81f05593c047f2c822eeb03785aecffb1504dcb7f8357e898b5024
    Starship.exe 94bf0aba5f9f32b9c35e8dfc70afd8a35621ed6ef084453dc1b10719ae72f8e2
    start 28c3c50d115d2b8ffc7ba0a8de9572fbe307907aaae3a486aabd8c0266e9426f
    start.exe 70bb799557da5ac4f18093decc60c96c13359e30f246683815a512d7f9824c8f
    StorageExplorer.exe 73a9a1e38ff40908bcc15df2954246883dadfb991f3c74f6c514b4cffdabde66
    Sysmon.sys 1d04e33009bcd017898b9e1387e40b5c04279c02ebc110f12e4a724ccdb9e4fb
    upd_2327991.exe 7b9e12e3561285181634ab32015eb653ab5e5cfa157dd16cdd327104b258c332
    webujgd.lnk 70EE22D394E107FBB807D86D187C216AD66B8537EDC67931559A8AEF18F6B5B3
    WinSCP-6.3.5-Setup.exe 8eb7e3e8f3ee31d382359a8a232c984bdaa130584cad11683749026e5df1fdc3
    Proxy Tool e4d6fe517cdf3790dfa51c62457f5acd8cb961ab1f083de37b15fd2fddeb9b8f
    Encryptor e86bb8361c436be94b0901e5b39db9b6666134f23cce1e5581421c2981405cb1
    Encryptor c733d85f445004c9d6918f7c09a1e0d38a8f3b37ad825cd544b865dba36a1ba6
    Encryptor 28c3c50d115d2b8ffc7ba0a8de9572fbe307907aaae3a486aabd8c0266e9426f
    Table 4. Files Used by Interlock Ransomware Actors (SHA-1)
    File Name Hash
    autorun.log 514946a8fc248de1ccf0dbeee2108a3b4d75b5f6
    jar.jar b625cc9e4024d09084e80a4a42ab7ccaa6afb61d
    pack.jar 3703374c9622f74edc9c8e3a47a5d53007f7721e

    See Table 5 through Table 16 for all referenced threat actor tactics and techniques in this advisory. For assistance with mapping malicious cyber activity to the MITRE ATT&CK framework, see CISA and MITRE ATT&CK’s Best Practices for MITRE ATT&CK Mapping and CISA’s Decider Tool.

    Table 5. Initial Access
    Technique Title ID Use
    Drive-By Compromise T1189

    Interlock actors obtain initial access by compromising a legitimate website that network users visit, or by disguising malicious payloads as fake browser updates or common security software, including the following:17

    • FortiClient.exe
    • Ivanti-Secure-Access-Client.exe
    • GlobalProtect.exe
    • Webex.exe
    • AnyConnectVPN.exe
    • Cisco-Secure-Client.exe
    • zyzoom_antimalware.exe

    Interlock actors also gain access via the ClickFix social engineering technique, in which users are tricked into executing a malicious payload by clicking on a fake CAPTCHA that prompts users to execute a malicious PowerShell script. 
     

    Table 6. Execution
    Technique Title ID Use
    Command and Scripting Interpreter: PowerShell T1059.001 

    Interlock actors implement PowerShell scripts to drop a malicious file into the Windows Startup folder.

    Interlock actors execute a PowerShell command for registry key modification.

    Interlock actors use a PowerShell script to execute a series of commands to facilitate reconnaissance.

    User Execution: Malicious Copy and Paste T1204.004 Via the ClickFix social engineering technique, users are tricked into clicking a fake CAPTCHA and prompted into executing a malicious Base64-encoded PowerShell process by following instructions to open a Windows Run window (Windows Button + R), pasting clipboard contents (“CTRL + V”), and then executing the malicious script (“Enter”).
    Table 7. Persistence
    Technique Title ID Use
    Boot or Logon Autostart Execution: Registry Run Keys/Startup Folder T1547.001

    Interlock actors establish persistence by adding a file into a Windows StartUp folder that executes a RAT every time a user logs in.

    Interlock actors also implement registry key modification by using a PowerShell command to add a run key value (named “Chrome Updater”) that uses a log file as an argument every time a user logs in.
     

    Table 8. Privilege Escalation
    Technique Title ID Use
    Valid Accounts: Domain Accounts T1078.002 Interlock actors compromise domain administrator accounts to gain additional privileges. 
    Table 9. Defense Escalation
    Technique Title ID Use
    Defense Evasion TA0005 Interlock actors execute the removeme function on Linux systems to delete the encryption binary for defense evasion. 
    Masquerading: Match Legitimate Resource Name or Location T1036.005

    Interlock actors disguise a malicious run key value by naming it “Chrome Updater”; the run key value uses a specific log file as an argument upon user login.

    Interlock actors disguise files of keystrokes logged by one of their credential stealers with a legitimate Windows filename: conhost.txt.

    Interlock actors disguise an encryption binary, a 64-bit executable, by giving it the same name as the legitimate Console Windows Host executable: conhost.exe

    System Binary Proxy Execution: Rundll32 T1218.011 Interlock actors use rundll32.exe to proxy execution of a malicious DLL binary tmp41.wasd
    Indicator Removal: File Deletion T1070.004 Interlock actors execute a DLL binary tmp41.wasd that uses the remove() function to delete their encryption binary for defense evasion. 
    Table 10. Credential Access
    Technique Title ID Use
    Credential Access TA0006 Interlock actors download credential stealer cht.exe and execute other versions information stealers (including Lumma Stealer and Berserk Stealer) to harvest credentials.
    Credentials from Password Stores: Credentials from Web Browsers T1555.003 Interlock actors download a credential stealer that collects login information and associated URLs for victims’ online accounts.
    Input Capture T1056 Interlock actors execute Lumma Stealer and Berserk Stealer information stealers on victim systems.
    Input Capture: Keylogging T1056.001 Interlock actors download klg.dll, a keylogger binary, onto compromised systems, where it logs users’ keystrokes in a file named conhost.txt
    Steal or Forge Kerberos Tickets: Kerberoasting T1558.003 Interlock actors possibly use a Kerberoasting attack to compromise domain administrator accounts. 
    Table 11. Discovery
    Technique Title ID Use
    System Owner/User Discovery T1033 Interlock actors execute a PowerShell command WindowsIdentity.GetCurrent() on victim systems to retrieve a WindowsIdentity object that represents the current Windows user.
    System Information Discovery T1082

    Interlock actors execute a PowerShell command systeminfo on victim systems to access detailed configuration information about the system, including OS configuration, security information, product ID, and hardware properties.

    Interlock actors execute a PowerShell command Get-PSDrive on victim systems to discover the drives in the current session, such as: 

    • Windows logical drives on the computer, including drives mapped to network shares.
    • Drives exposed by PowerShell providers.
    • Session-specified temporary drives and persistent mapped network drives.
    System Service Discovery T1007

    Interlock actors execute a PowerShell command tasklist /svc on victim systems that lists service information for each process currently running on the system. 

    Actors also execute a PowerShell command Get-Service on victim systems that retrieves objects that represent the services (including running and stopped services) on the system.

    System Network Configuration Discovery T1016 Interlock actors execute a PowerShell command arp -a on victim systems that displays and modifies entries in the Address Resolution Protocol (ARP) cache table (which contains entries on the IPv4 and IPv6 addresses on host endpoints).
    Table 12. Lateral Movement
    Technique Title ID Use
    Valid Accounts T1078 Interlock actors harvest and abuse valid credentials for lateral movement and privilege escalation.
    Remote Services: Remote Desktop Protocol T1021.001 Interlock actors use RDP and valid credentials to move laterally between systems.
    Table 13. Collection
    Technique Title ID Use
    Data from Cloud Storage T1530 Interlock actors use StorageExplorer.exe, the cloud storage solution Azure Storage Explorer, to explore Microsoft Azure Storage accounts. 
    Table 14. Command and Control
    Technique Title ID Use
    Command and Control TA0011 Interlock actors use applications Cobalt Strike and SystemBC for C2. 
    Ingress Tool Transfer T1105

    Interlock actors use a fake Google Chrome or Microsoft Edge browser update to cause users to execute a RAT on the victimized system.

    Interlock actors download credential stealers (cht.exe) and keylogger binaries (klg.dll) once actors establish remote control of a compromised system. 

    Remote Access Tools T1219 Interlock actors use legitimate remote access tools such as AnyDesk to enable remote connectivity and PuTTY to assist with lateral movement.
    Table 15. Exfiltration
    Technique Title  ID Use
    Exfiltration Over Web Service: Exfiltration to Cloud Storage T1567.002 Interlock actors exfiltrate data to cloud storage by executing AzCopy to upload data to the Azure storage blob.
    Exfiltration Over Alternative Protocol T1048 Interlock actors use file transfer tools like WinSCP to exfiltrate data.
    Table 16. Impact
    Technique Title  ID Use
    Data Encrypted for Impact T1486

    Interlock actors encrypt victim data using a combined AES and RSA algorithm on compromised systems to interrupt availability to system and network resources. Actors code encryptors using C/C++. Interlock actors use encryptors for both Windows and Linux operating systems. 

    Interlock actors also use a FreeBSD ELF encryptor to encrypt victim data. 

    Financial Theft   T1657 Interlock actors deliver a ransom note titled !__README__!.txt via a GPO which provides victims with instructions to use a .onion URL to contact the actors over the Tor network. Actors use a double-extortion model, both encrypting victim data and threatening release of victim data on their Tor network leak site if the ransom is not paid.

    The authoring agencies recommend organizations implement the mitigations below to improve your organization’s cybersecurity posture on the basis of the Interlock ransomware actors’ activity. These mitigations align with the Cross-Sector Cybersecurity Performance Goals (CPGs) developed by CISA and the National Institute of Standards and Technology (NIST). The CPGs provide a minimum set of practices and protections that CISA and NIST recommend all organizations implement. CISA and NIST based the CPGs on existing cybersecurity frameworks and guidance to protect against the most common and impactful threats and TTPs. Visit CISA’s CPGs webpage for more information on the CPGs, including additional recommended baseline protections.

    In addition to the below mitigations, Healthcare and Public Health (HPH) organizations should use HPH Sector CPGs to implement cybersecurity protections to address the most common threats and TTPs used against this sector.

    At-risk organizations should implement the following mitigations:

    • Prevent Interlock ransomware actors from obtaining initial access:
      • Implement domain name system (DNS) filtering to block users from accessing malicious sites and applications.
      • Implement web access firewalls to mitigate and prevent unknown commands or process injection from malicious domains or websites.
      • Train users [CPG 2.I] to identify, avoid, and report social engineering attempts.
    • Implement a recovery plan [CPG 5.A] to maintain and retain multiple copies of sensitive or proprietary data and servers in a physically separate, segmented, and secure location (e.g., hard drive, storage device, the cloud) [CPG 2.R].
    • Require all accounts with password logins (e.g., service accounts, admin accounts, and domain admin accounts) to comply with NIST password standards.
      • Require employees to use long passwords [CPG 2.B] and consider not requiring recurring password changes, as these can weaken security.
    • Require MFA [CPG 2.H] for all services to the extent possible, particularly for webmail, virtual private networks (VPNs), and accounts that access critical systems.
      • Implement ICAM policies across the organization as a precursor to MFA.
    • Keep all operating systems, software, and firmware up to date; prioritize patching known exploited vulnerabilities in internet-facing systems [CPG 1.E].
      • Timely patching is efficient and cost effective for minimizing an organization’s exposure to cybersecurity threats.
    • Implement robust EDR capabilities on VMs, systems, and networks.
    • Segment networks [CPG 2.F] to prevent the spread of ransomware.
      • Network segmentation can help prevent the spread of ransomware by controlling traffic flows between—and access to—various subnetworks and by restricting adversary lateral movement.
    • Identify, detect, and investigate abnormal activity and potential traversal of the indicated ransomware [CPG 3.A] with a networking monitoring tool [CPG 2.T].
      • To aid in detecting ransomware, implement a tool that logs and reports all network traffic, including lateral movement activity on a network.
      • Implement EDR tools; these are useful for detecting lateral connections as they provide insight into common and uncommon network connections for each host.
    • Filter network traffic by preventing unknown or untrusted origins from accessing remote services on internal systems.
      • This prevents threat actors from directly connecting to remote access services that they have established for persistence.
    • Install, regularly update, and enable real time detection for antivirus software on all hosts.
    • Review domain controllers, servers, workstations, and active directories for new and/or unrecognized accounts.
    • Audit user accounts with administrative privileges and configure access controls according to the principle of least privilege [CPG 2.E].
    • Disable unused ports.
    • Consider adding an email banner to emails received from outside of your organization [CPG 2.M].
    • Disable hyperlinks in received emails.
    • Implement time-based access for accounts set at the admin level and higher; for example, the just-in-time (JIT) access method provisions privileged access when needed and can support enforcement of the principle of least privilege (as well as the Zero Trust model):
      • This is a process where a network-wide policy is set in place to automatically disable admin accounts at the Active Directory level when the account is not in direct need.
      • Individual users may submit their requests through an automated process that grants them access to a specified system for a set timeframe when they need to support the completion of a certain task.
    • Disable command line and scripting activities and permissions [CPG 2.N].
      • Disabling software utilities that run from the command line makes it more difficult for threat actors to escalate privileges and move laterally.
    • Maintain offline backups of data and regularly maintain backups and restorations [CPG 2.R]; this avoids severe service interruption and irretrievable data in the event of a compromise.
    • Ensure all backup data is encrypted, immutable (i.e., cannot be altered or deleted), and covers the entire organization’s data infrastructure [CPG 2.R].

    In addition to applying mitigations, the authoring agencies recommend exercising, testing, and validating your organization’s security program against the threat behaviors mapped to the MITRE ATT&CK for Enterprise framework in this advisory. The authoring agencies recommend testing your existing security controls inventory to assess how they perform against the ATT&CK techniques described in this advisory.

    To get started:

    1. Select an ATT&CK technique described in this advisory (see Table 5 through Table 16).
    2. Align your security technologies against the technique.
    3. Test your technologies against the technique.
    4. Analyze your detection and prevention technologies’ performance.
    5. Repeat the process for all security technologies to obtain a set of comprehensive performance data.
    6. Tune your security program, including people, processes, and technologies, based on the data generated by this process.

    The authoring agencies recommend continually testing your security program, at scale, in a production environment to ensure optimal performance against the MITRE ATT&CK techniques identified in this advisory.

    Your organization has no obligation to respond or provide information back to FBI in response to this joint advisory. If, after reviewing the information provided, your organization decides to provide information to FBI, reporting must be consistent with applicable state and federal laws.

    FBI is interested in any information that can be shared, to include boundary logs showing communication to and from foreign IP addresses, a sample ransom note, communications with threat actors, Bitcoin wallet information, decryptor files, and/or a benign sample of an encrypted file.

    Additional details of interest include a targeted company point of contact, status and scope of infection, estimated loss, operational impact, transaction IDs, date of infection, date detected, initial attack vector, and host- and network-based indicators.

    The authoring agencies do not encourage paying ransom as payment does not guarantee victim files will be recovered. Furthermore, payment may also embolden adversaries to target additional organizations, encourage other criminal actors to engage in the distribution of ransomware, and/or fund illicit activities. Regardless of whether you or your organization have decided to pay the ransom, FBI and CISA urge you to promptly report ransomware incidents to FBI’s Internet Crime Complain Center (IC3), a local FBI Field Office, or CISA via the agency’s Incident Reporting System or its 24/7 Operations Center (contact@mail.cisa.dhs.gov) or by calling 1-844-Say-CISA (1-844-729-2472).

    State, local, tribal, and territorial governments should report incidents to the MS-ISAC (SOC@cisecurity.org or 866-787-4722).

    HPH Sector organizations should report incidents to FBI or CISA but also can reach out to HHS at HHScyber@hhs.gov for cyber incident support focused on mitigating adverse patient impacts.

    The information in this report is being provided “as is” for informational purposes only. The authoring agencies do not endorse any commercial entity, product, company, or service, including any entities, products, or services linked within this document. Any reference to specific commercial entities, products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favor by the authoring agencies. 

    Cisco Talos contributed to this advisory.

    July 22, 2025: Initial version.

    1 Elio Biasiotto, et. al., “Unwrapping the Emerging Interlock Ransomware Attack,” Talos Intelligence (blog), Cisco Talos, last modified November 7, 2024, https://blog.talosintelligence.com/emerging-interlock-ransomware/.

    2 Sekoia Threat Detection and Research team, “Interlock Ransomware Evolving Under the Radar,” Sekoia (blog), Sekoia, last modified April 16, 2025, https://blog.sekoia.io/interlock-ransomware-evolving-under-the-radar/.

    3 Yashvi Shah and Vignesh Dhatchanamoorthy, “ClickFix Deception: A Social Engineering Tactic to Deploy Malware,” McAfee Labs (blog), McAfee,last modified June 11, 2024, https://www.mcafee.com/blogs/other-blogs/mcafee-labs/clickfix-deception-a-social-engineering-tactic-to-deploy-malware/ and “HC3 Sector Alert: ClickFix Attacks,” Health Sector Cybersecurity Coordination Center, Department of Health and Human Services, last modified October 29, 2024, https://www.hhs.gov/sites/default/files/clickfix-attacks-sector-alert-tlpclear.pdf.

    4 Shah, “ClickFix Deception: A Social Engineering Tactic to Deploy Malware.”

    5 Sekoia Threat Detection and Research team, “Interlock Ransomware Evolving Under the Radar.

    6 Bill Toulas, “Interlock Ransomware Gang Deploys New NodeSnake RAT on Universities,“ Bleeping Computer, May 28, 2025, https://www.bleepingcomputer.com/news/security/interlock-ransomware-gang-deploys-new-nodesnake-rat-on-universities/.

    7 Biasiotto, “Unwrapping the Emerging Interlock Ransomware Attack.”

    8 International law-enforcement and Microsoft took down the Lumma Stealer malware in May 2025 by seizing internet domains the actors used to distribute the malware to actors and taking down domains that hosted the malware’s infrastructure. For more information, see Tara Seals, “Lumma Stealer Takedown Reveals Sprawling Operation,” Dark Reading, May 21, 2025, https://www.darkreading.com/cybersecurity-operations/lumma-stealer-takedown-sprawling-operation, and Steven Masada, “Disrupting Lumma Stealer: Microsoft Leads Global Action Against Favored Cybercrime Tool,” Microsoft On the Issues (blog), Microsoft, last modified May 21, 2025, https://blogs.microsoft.com/on-the-issues/2025/05/21/microsoft-leads-global-action-against-favored-cybercrime-tool/.

    9 Sekoia Threat Detection and Research team, “Interlock Ransomware Evolving Under the Radar.”

    10 Biasiotto, “Unwrapping the Emerging Interlock Ransomware Attack.”

    11 Biasiotto, “Unwrapping the Emerging Interlock Ransomware Attack.”

    12 Biasiotto, “Unwrapping the Emerging Interlock Ransomware Attack.”

    13 Biasiotto, “Unwrapping the Emerging Interlock Ransomware Attack.”

    14 Lawrence Abrams, “Meet Interlock — The New Ransomware Targeting FreeBSD Servers,” Bleeping Computer, November 3, 2024, https://www.bleepingcomputer.com/news/security/meet-interlock-the-new-ransomware-targeting-freebsd-servers/.

    15 Biasiotto, “Unwrapping the Emerging Interlock Ransomware Attack.”

    16 Graham Cluley, “Interlock Ransomware: What You Need to Know,” Fortra (blog), Fortra, last modified May 30, 2025, https://www.tripwire.com/state-of-security/interlock-ransomware-what-you-need-know.

    17 Sekoia Threat Detection and Research team, “Interlock Ransomware Evolving Under the Radar.”

    MIL Security OSI

  • MIL-OSI USA: ICE and FBI arrest Cincinnati man for terroristic threats against ICE agents

    Source: US Immigration and Customs Enforcement

    CINCINNATI — U.S. Immigration and Customs Enforcement’s Homeland Security Investigations and the FBI arrested a Cincinnati man July 19 after he allegedly made multiple threats online to shoot and kill ICE officers.

    Anthony Marcus Kelly, 38, faces federal charges including threatening to assault, kidnap or murder a United States official, as well as transmitting communications containing threats to kidnap or injure another person.

    Law enforcement became aware of a social media user going by the name of “Slab” after he allegedly made multiple social media posts calling for the killing of ICE officers and detailing his acquisition of firearms to carry out that threat.

    After an investigation, the user making these posts was identified as Kelly, who lives in the Cincinnati area.

    In one of his alleged posts, Kelly wrote “Why even bother with these damn courts anymore. #Gestapedos don’t deserve anything but the smoke coming for them anyway. #RevolutionIsTheSolution #DestroyICE they’re rabid dogs that need to be put down. Including #KristiNoem #DogmeatWalking.”

    In another, he wrote, “You come here for me, you’re getting shot. And I’m not looking to disable […] I’m shooting for the kill. I won’t give a **** about your names, who you are, or anything else”.

    “Let me be crystal clear: Threatening to kill a federal officer is not protest — it’s terrorism,” said acting ICE Director Todd M. Lyons. “Anthony Kelly’s violent threats, while disgusting and completely unhinged, are a symptom of a larger problem: Politicians are trying to turn our law enforcement officials into targets by scaring their constituents and whipping them into a frenzy in a fact-free vacuum. This is what happens when anti-ICE activists don’t realize or care that we’re out there arresting rapists, murderers and child molesters who are in this country illegally. Enough is enough. Anyone who targets ICE personnel will be met with swift, unrelenting justice.”

    “Calling for violence against federal law enforcement is not protected by the First Amendment,” said HSI Detroit acting Special Agent in Charge Jared Murphey. “At great personal risk, ICE agents and officers faithfully enforce laws passed by our representatives in Congress. If members of the public disagree with our nation’s laws, they need to write their representatives, not threaten violence against those charged with carrying out the law.”

    “Making violent threats against federal law enforcement officers will never be tolerated,” said FBI Cincinnati Special Agent in Charge Elena Iatarola. “Advocating for violence is not only wrong; it is also against the law and has serious consequences.”

    Kelly remains in federal custody pending further court proceedings. 

    All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    MIL OSI USA News

  • MIL-OSI Security: Gary Man Sentenced to 480 Months in Prison

    Source: US FBI

    HAMMOND- Yesterday, Taquan Clarke, age 31, of Gary, Indiana, was sentenced by United States District Court Judge Philip P. Simon after a jury found him guilty of conspiring to distribute and possess with intent to distribute cocaine and using a firearm to commit murder, following a 6-day jury trial, announced Acting United States Attorney M. Scott Proctor.

    Clarke was sentenced to 480 months in prison for using a firearm to commit murder.  He was also sentenced to 240 months in prison for conspiring to distribute and possess with intent to distribute cocaine.  He was also sentenced to 3 years of supervised release.  Both sentences are to run concurrently. 

    According to documents in the case, between June 2016 and February 2018, Taquan Clarke and numerous others conspired to possess and possess with intent to distribute cocaine.  On July 28, 2017, Clarke was involved in a plot to rob an individual of cocaine and money.  During this attempted robbery, Clarke shot the victim, K.H., in the head, resulting in K.H.’s death. 

    “Taquan Clarke cut short the life of another man,” said Acting U.S. Attorney Proctor.  “Thanks to the coordinated efforts of law enforcement, he has been brought to justice for that act.  It is an honor to serve with the dedicated agents, officers, and prosecutors who made that happen.”

    This case was investigated by the Federal Bureau of Investigation Gang Response Investigative Team, the Gary Police Department, and the Lake County Sheriff’s Department.  The trial was handled by Assistant United States Attorneys David J. Nozick and Caitlin M. Padula.

    This case is part of Project Safe Neighborhoods (PSN), a program bringing together all levels of law enforcement and the communities they serve to reduce violent crime and gun violence, and to make our neighborhoods safer for everyone. On May 26, 2021, the Department launched a violent crime reduction strategy strengthening PSN based on these core principles: fostering trust and legitimacy in our communities, supporting community-based organizations that help prevent violence from occurring in the first place, setting focused and strategic enforcement priorities, and measuring the results.

    MIL Security OSI

  • MIL-OSI Security: Swedish Man Who Licensed Rights to Late Colombian Drug Lord Pablo Escobar Pleads Guilty to Fraud, Money Laundering Charges

    Source: US FBI

    LOS ANGELES – A Swedish national who licensed the rights of the late Colombian narco-terrorist Pablo Escobar pleaded guilty today to six federal criminal charges for defrauding investors by marketing and selling products – including flamethrowers and cellphones – that he never delivered.

    Olof Kyros Gustafsson, 32, a.k.a. “El Silencio,” pleaded guilty to one count of conspiracy to commit wire fraud and mail fraud, one count of wire fraud, one count of mail fraud, one count of conspiracy to commit money laundering, one count of concealment money laundering, and one count of international concealment money laundering.

    Gustafsson has been in federal custody since March 28, when he was extradited to the United States from Spain, where he was arrested in December 2023. 

    According to his plea agreement, Gustafsson was the CEO of Escobar Inc., a corporation registered in Puerto Rico that held successor-in-interest rights to the persona and legacy of Pablo Escobar, the deceased Colombian narco-terrorist and late head of the Medellín Cartel. Escobar Inc. used Pablo Escobar’s likeness and persona to market and sell purported consumer products to the public.

    From July 2019 to November 2023, Gustafsson identified existing products in the marketplace that were being manufactured and sold to the public. He then used the Escobar persona to market and advertise similar and competing products purportedly being sold by Escobar Inc., advertising them at a price substantially lower than existing counterparts being sold by other companies.

    Gustafsson then purportedly sold the products – including an Escobar Flamethrower, an Escobar Fold Phone, an Escobar Gold 11 Pro Phone, and Escobar Cash (marketed as a “physical cryptocurrency”) – to customers, receiving payments via PayPal, Stripe, Coinbase, among other payment processors, as well as bank and wire transfers.

    Despite receiving customer payments, Gustafsson did not deliver the Escobar Inc. products to paying customers because the products did not exist.

    In furtherance of the scheme, Gustafsson sent crudely made samples of the purported Escobar Inc. products to online technology reviewers and social media influencers to attempt to increase the public’s demand for them. For example, Gustafsson sent Samsung Galaxy Fold Phones wrapped in gold foil and disguised as Escobar Inc. phones to online technology reviewers to attempt to induce victims who watched the online reviews into buying the products that never would be delivered.

    Also, rather than sending paying customers the actual products, Gustafsson mailed them a “Certificate of Ownership,” a book, or other Escobar Inc. promotional materials so there was a record of mailing from the company to the customer. When a paying customer attempted to obtain a refund when the product was never delivered, Gustafsson fraudulently referred the payment processor to the proof of mailing for the Certificate of Ownership or other material as proof that the product itself was shipped and that the customer had received it so the refund requests would be denied.

    Gustafsson also caused bank accounts to be opened under his name and entities he controlled to be used as funnel accounts – bank accounts into which he deposited and withdrew proceeds derived from his criminal activities. The purpose was to conceal and disguise the nature, location, source, ownership, and control of the proceeds. The bank accounts were located in the United States, Sweden, and the United Arab Emirates.

    United States District Judge Fernando L. Aenlle-Rocha scheduled a December 5 sentencing hearing, at which time Gustafsson will face a statutory maximum sentence of 20 years in federal prison for each fraud-related count and up to 10 years in federal prison for each money laundering-related count. 

    As part of his plea agreement, Gustafsson agreed to pay up to $1.3 million in restitution to victims, as well as to forfeiture to funds that were proceeds of the fraud schemes, including money currently held in a bank account in Sweden.

    IRS Criminal Investigation, the FBI, and the Federal Deposit Insurance Corporation-Office of Inspector General are investigating this matter, with assistance from the Department of Justice’s Office of International Affairs, the United States Marshals Service, Eurojust, Spanish authorities, and French judicial authorities.

    Assistant United States Attorney Joshua O. Mausner of the Violent and Organized Crime Section is prosecuting this case.

    MIL Security OSI

  • MIL-OSI Security: Swedish Man Who Licensed Rights to Late Colombian Drug Lord Pablo Escobar Pleads Guilty to Fraud, Money Laundering Charges

    Source: US FBI

    LOS ANGELES – A Swedish national who licensed the rights of the late Colombian narco-terrorist Pablo Escobar pleaded guilty today to six federal criminal charges for defrauding investors by marketing and selling products – including flamethrowers and cellphones – that he never delivered.

    Olof Kyros Gustafsson, 32, a.k.a. “El Silencio,” pleaded guilty to one count of conspiracy to commit wire fraud and mail fraud, one count of wire fraud, one count of mail fraud, one count of conspiracy to commit money laundering, one count of concealment money laundering, and one count of international concealment money laundering.

    Gustafsson has been in federal custody since March 28, when he was extradited to the United States from Spain, where he was arrested in December 2023. 

    According to his plea agreement, Gustafsson was the CEO of Escobar Inc., a corporation registered in Puerto Rico that held successor-in-interest rights to the persona and legacy of Pablo Escobar, the deceased Colombian narco-terrorist and late head of the Medellín Cartel. Escobar Inc. used Pablo Escobar’s likeness and persona to market and sell purported consumer products to the public.

    From July 2019 to November 2023, Gustafsson identified existing products in the marketplace that were being manufactured and sold to the public. He then used the Escobar persona to market and advertise similar and competing products purportedly being sold by Escobar Inc., advertising them at a price substantially lower than existing counterparts being sold by other companies.

    Gustafsson then purportedly sold the products – including an Escobar Flamethrower, an Escobar Fold Phone, an Escobar Gold 11 Pro Phone, and Escobar Cash (marketed as a “physical cryptocurrency”) – to customers, receiving payments via PayPal, Stripe, Coinbase, among other payment processors, as well as bank and wire transfers.

    Despite receiving customer payments, Gustafsson did not deliver the Escobar Inc. products to paying customers because the products did not exist.

    In furtherance of the scheme, Gustafsson sent crudely made samples of the purported Escobar Inc. products to online technology reviewers and social media influencers to attempt to increase the public’s demand for them. For example, Gustafsson sent Samsung Galaxy Fold Phones wrapped in gold foil and disguised as Escobar Inc. phones to online technology reviewers to attempt to induce victims who watched the online reviews into buying the products that never would be delivered.

    Also, rather than sending paying customers the actual products, Gustafsson mailed them a “Certificate of Ownership,” a book, or other Escobar Inc. promotional materials so there was a record of mailing from the company to the customer. When a paying customer attempted to obtain a refund when the product was never delivered, Gustafsson fraudulently referred the payment processor to the proof of mailing for the Certificate of Ownership or other material as proof that the product itself was shipped and that the customer had received it so the refund requests would be denied.

    Gustafsson also caused bank accounts to be opened under his name and entities he controlled to be used as funnel accounts – bank accounts into which he deposited and withdrew proceeds derived from his criminal activities. The purpose was to conceal and disguise the nature, location, source, ownership, and control of the proceeds. The bank accounts were located in the United States, Sweden, and the United Arab Emirates.

    United States District Judge Fernando L. Aenlle-Rocha scheduled a December 5 sentencing hearing, at which time Gustafsson will face a statutory maximum sentence of 20 years in federal prison for each fraud-related count and up to 10 years in federal prison for each money laundering-related count. 

    As part of his plea agreement, Gustafsson agreed to pay up to $1.3 million in restitution to victims, as well as to forfeiture to funds that were proceeds of the fraud schemes, including money currently held in a bank account in Sweden.

    IRS Criminal Investigation, the FBI, and the Federal Deposit Insurance Corporation-Office of Inspector General are investigating this matter, with assistance from the Department of Justice’s Office of International Affairs, the United States Marshals Service, Eurojust, Spanish authorities, and French judicial authorities.

    Assistant United States Attorney Joshua O. Mausner of the Violent and Organized Crime Section is prosecuting this case.

    MIL Security OSI

  • MIL-OSI Security: Illinois Tax Preparer Sentenced for Role in $3.6M Covid-19 Fraud Scheme

    Source: United States Department of Justice Criminal Division

    An Illinois man was sentenced yesterday to 42 months in prison for his role in a scheme to fraudulently obtain over $3.6 million in small business loans under the Coronavirus Aid, Relief, and Economic Security Act Paycheck Protection Program (PPP) and COVID19 Economic Injury Disaster Loan (EIDL) program implemented by the Small Business Administration (SBA). 

    According to court documents, Farooq Khan, 31, of Chicago, owned and operated Hannan Tax Services (Hannan Tax), a tax preparation company located in Chicago. From approximately May 2020 through October 2021, through Hannan Tax, Khan prepared and facilitated the submission of at least 30 fraudulent applications for loans through the PPP and EIDL program. At the time Kahn prepared and submitted the applications, he knew that the companies for which he sought the loans were non-operational and did not qualify. He also knowingly falsified the information contained in the applications, including the number of employees and tax records attributed to the defunct companies. Khan caused approximately $3.6 million to be fraudulently distributed by the SBA and PPP lenders. He also attempted to obtain at least an additional $588,900 in loans through other EIDL applications that were never funded for nonexistent companies. He personally obtained approximately $1.2 million of the fraudulent loan proceeds.     

    Khan pleaded guilty to one count of wire fraud on Feb. 19. At sentencing, he was also ordered to pay $3,645,104 in restitution. 

    Acting Assistant Attorney General Matthew R. Galeotti of the Justice Department’s Criminal Division, Special Agent in Charge Douglas S. DePodesta of the FBI Chicago Field Office, and Special Agent-in-Charge Matthew J. Scarpino of Immigration and Customs Enforcement Homeland Security Investigations (ICE-HSI) Chicago made the announcement.   

    The FBI Chicago Field Office and ICE-HSI are investigating the case. 

    Trial Attorney Claire Sobczak Pacelli of the Criminal Division’s Fraud Section is prosecuting the case. 

    Anyone with information about allegations of attempted fraud involving COVID-19 can report it by calling the Justice Department’s National Center for Disaster Fraud (NCDF) Hotline at 8667205721 or via the NCDF Web Complaint Form at www.justice.gov/disaster-fraud/ncdf-disaster-complaint-form

    MIL Security OSI

  • MIL-OSI Security: Stanislaus County Mother-Son Duo Sentenced to Prison for Inmate Unemployment Insurance Claims Conspiracy

    Source: US FBI

    Jaime Ornelas, 27, formerly of Modesto, was sentenced today by U.S. District Judge Dena Coggins to three years and one month in prison and ordered to pay $150,000 in restitution for conspiracy to commit mail fraud arising from fraudulently submitted unemployment insurance benefits, Acting U.S. Attorney Kimberly A. Sanchez announced.

    On June 6, 2025, Jaime Ornelas’s mother and co-defendant Misty Ornelas, 48, of Turlock, was sentenced to 18 months in prison.

    According to court documents, beginning in June 2020, Jaime Ornelas and Misty Ornelas operated a scheme to submit fraudulent unemployment insurance benefit claims to the California Employment Development Department (EDD). Jaime Ornelas, who was then-incarcerated at the High Desert State Prison in Lassen County, provided Misty Ornelas personally identifiable information of fellow inmates. Misty Ornelas then used that information to submit fraudulent unemployment insurance benefit applications to EDD. The submitted applications misrepresented the eligibility of the inmates, including that they had last worked within the prior few months and had become unemployed because of the COVID-19 pandemic. The fraudulent claims were worth more than $150,000.

    This case was the product of an investigation by Federal Bureau of Investigation and EDD. Assistant U.S. Attorneys Chan Hee Chu and Denise N. Yasinow prosecuted the case.

    This case is part of the California COVID-19 Fraud Enforcement Strike Force, which is one of the interagency COVID-19 fraud strike forces established by the United States Department of Justice. The California Strike Force combines law enforcement and prosecutorial resources in the Eastern and Central Districts of California, and focuses on large-scale, multistate, and egregious pandemic relief fraud. The strike force uses prosecutor-led, and data analyst-driven, teams to identify and bring to justice those who stole pandemic relief money.

    MIL Security OSI

  • MIL-OSI Security: Stanislaus County Mother-Son Duo Sentenced to Prison for Inmate Unemployment Insurance Claims Conspiracy

    Source: US FBI

    Jaime Ornelas, 27, formerly of Modesto, was sentenced today by U.S. District Judge Dena Coggins to three years and one month in prison and ordered to pay $150,000 in restitution for conspiracy to commit mail fraud arising from fraudulently submitted unemployment insurance benefits, Acting U.S. Attorney Kimberly A. Sanchez announced.

    On June 6, 2025, Jaime Ornelas’s mother and co-defendant Misty Ornelas, 48, of Turlock, was sentenced to 18 months in prison.

    According to court documents, beginning in June 2020, Jaime Ornelas and Misty Ornelas operated a scheme to submit fraudulent unemployment insurance benefit claims to the California Employment Development Department (EDD). Jaime Ornelas, who was then-incarcerated at the High Desert State Prison in Lassen County, provided Misty Ornelas personally identifiable information of fellow inmates. Misty Ornelas then used that information to submit fraudulent unemployment insurance benefit applications to EDD. The submitted applications misrepresented the eligibility of the inmates, including that they had last worked within the prior few months and had become unemployed because of the COVID-19 pandemic. The fraudulent claims were worth more than $150,000.

    This case was the product of an investigation by Federal Bureau of Investigation and EDD. Assistant U.S. Attorneys Chan Hee Chu and Denise N. Yasinow prosecuted the case.

    This case is part of the California COVID-19 Fraud Enforcement Strike Force, which is one of the interagency COVID-19 fraud strike forces established by the United States Department of Justice. The California Strike Force combines law enforcement and prosecutorial resources in the Eastern and Central Districts of California, and focuses on large-scale, multistate, and egregious pandemic relief fraud. The strike force uses prosecutor-led, and data analyst-driven, teams to identify and bring to justice those who stole pandemic relief money.

    MIL Security OSI