Interlock ransomware weaponizes Cisco FMC zero-day in pre-patch campaign

1 min read
Source: BleepingComputer
Interlock ransomware weaponizes Cisco FMC zero-day in pre-patch campaign
Photo: BleepingComputer
TL;DR Summary

Interlock has exploited a maximum-severity remote-code-execution zero-day in Cisco Secure Firewall Management Center (CVE-2026-20131) since Jan 26, 2026, gaining unauthenticated root access on unpatched devices; Cisco issued a patch on March 4, and Amazon’s threat intel says the attacks ran about 36 days before disclosure. The group has a history of high-profile attacks (including NodeSnake on UK universities) and researchers note a new Slopoly malware strain associated with the operation.

Share this article

Reading Insights

Total Reads

0

Unique Readers

2

Time Saved

3 min

vs 4 min read

Condensed

90%

70670 words

Want the full story? Read the original article

Read on BleepingComputer