RSS feed source: US Energy Information Administration

In-brief analysis

July 28, 2025

Crude oil production from onshore federal lands has increased in recent years as a result of significant growth in drilling activity and operations. According to data collected by the U.S. Department of the Interior’s Office of Natural Resources Revenue, onshore crude oil production from federal lands reached 1.7 million barrels per day (b/d) in 2024, a record high. Most of this growth was in New Mexico from crude oil produced from federal lands in the Permian Basin.

Increases in crude oil production from federal lands in New Mexico are attributable to multiyear increases in the number of leases, drilling permits approvals, and well bore starts. Based on Bureau of Land Management data for fiscal years 2020 through 2023, activity in New Mexico accounted for the majority of drilling permits approved and well

Click this link to continue reading the article on the source website.

RSS feed source: US Energy Information Administration

Summary

Note: This joint Cybersecurity Advisory is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations protect against ransomware. Visit stopransomware.gov to see all #StopRansomware advisories and to learn more about other ransomware threats and no-cost resources.

The Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), Department of Health and Human Services (HHS), and Multi-State Information Sharing and Analysis Center (MS-ISAC)—hereafter referred to as “the authoring organizations”—are releasing this joint advisory to disseminate known Interlock ransomware IOCs and TTPs identified through FBI investigations (as recently as June 2025) and trusted third-party reporting.

The Interlock ransomware variant was first observed in late September 2024, targeting various business, critical infrastructure, and other organizations in North America and Europe. FBI maintains these actors target their victims based on opportunity, and their activity is financially motivated. FBI is aware of Interlock ransomware encryptors designed for both Windows and Linux operating systems; these encryptors have been observed encrypting virtual machines (VMs) across both operating systems. FBI observed actors obtaining initial access via drive-by download from compromised legitimate websites, which is an uncommon method among ransomware groups. Actors were also observed using

Click this link to continue reading the article on the source website.