Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Fog Ransomware Attacking US Organizations Leveraging Compromised VPN Credentials

Posted on January 9, 2026January 9, 2026 By CWS

A brand new ransomware variant referred to as Fog has emerged as a major risk to instructional and recreation organizations throughout the US.

Beginning in early Might 2024, Arctic Wolf Labs started monitoring its deployment throughout a number of incident response circumstances, with 80 % of affected organizations working within the schooling sector whereas 20 % had been in recreation.

The ransomware exercise has been noticed in a number of circumstances, every displaying comparable assault patterns and procedures. All victims had been situated inside the US, indicating a geographically targeted marketing campaign.

The Fog ransomware operates as a variant reasonably than a definite group, representing a vital distinction between the software program creators and people conducting the precise assaults.

This separation issues as a result of ransomware teams typically seem as single entities after they really comprise a number of impartial affiliate groups.

The organizational construction behind Fog stays unclear at the moment, although proof suggests coordinated exercise amongst risk actors.

The final documented assault exercise in investigated circumstances occurred on Might 23, 2024, offering a transparent timeline for defensive measures.

Arctic Wolf analysts recognized the malware after the second paragraph after they started investigating these circumstances in early Might.

The analysis staff famous that in every investigated case, forensic proof indicated risk actors gained entry to sufferer environments by leveraging compromised VPN credentials via two separate VPN gateway distributors.

This entry technique turned the first entry level for the marketing campaign, highlighting vulnerabilities in distant entry safety postures.

Assault Methodology and An infection Mechanisms

As soon as inside networks, risk actors deployed a multi-stage strategy combining frequent penetration testing ways with ransomware deployment.

Move-the-hash exercise focused administrator accounts, which had been then used to determine RDP connections to Home windows Servers operating Hyper-V and Veeam backup methods. In one other case, credential stuffing facilitated lateral motion all through the atmosphere.

PsExec was deployed throughout a number of hosts, whereas RDP and SMB protocols offered entry to focused methods. Earlier than encryption started, Home windows Defender was disabled on affected servers, eradicating a crucial protection layer.

The ransomware payload displays strategies frequent to different variants, with samples from totally different circumstances containing similar code blocks. When executed, the pattern creates a file referred to as DbgLog.sys within the %AppData% listing to log exercise standing.

The initialization routine references NTDLL.DLL and the NtQuerySystemInformation operate to collect system info for thread allocation.

Command line choices embrace NOMUTEX for concurrent execution, TARGET for particular discovery places, and CONSOLE for output show.

A JSON configuration block controls encryption actions, together with the RSA public key, file extensions (usually .FOG or .FLOCKED), ransom notice names, and repair shutdown procedures.

File discovery makes use of normal Home windows APIs like FindFirstVolume and FindFirstFile, using Unicode variants all through.

The encryption course of makes use of a thread pool scaled to system processors, starting from two to sixteen, implementing CryptImportKey and CryptEncrypt features earlier than renaming information with configured extensions and writing ransom notes.

Lastly, vssadmin.exe executes with delete shadows /all /quiet instructions to take away quantity shadow copies, eliminating backup restoration choices.

Instrument NameDescriptionPsExecEnables risk actors to execute processes on different methods with full interactivity for console functions, used for lateral motion and command executionMetasploitPenetration testing framework detected towards Veeam servers throughout reconnaissanceSoftPerfect Community ScannerNetwork administration device used to find community companies throughout focused environmentsAdvanced Port ScannerFree community and port scanning utility deployed to determine accessible community servicesSharpShares v2.3Open-source device used to enumerate and uncover accessible community sharesVeeam-Get-Creds.ps1PowerShell script designed to extract passwords from Veeam Backup and Replication Credentials Supervisor

Organizations ought to prioritize securing VPN infrastructure, implementing multi-factor authentication, sustaining safe off-site backup methods, and deploying defense-in-depth methods.

The risk actors demonstrated monetary motivation with speedy encryption timelines and no noticed information exfiltration, suggesting quick-payout intentions reasonably than advanced extortion schemes involving public leak websites.

Observe us on Google Information, LinkedIn, and X to Get Extra Immediate Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Attacking, Compromised, Credentials, Fog, Leveraging, Organizations, Ransomware, VPN

Post navigation

Previous Post: In Other News: 8,000 Ransomware Attacks, China Hacked US Gov Emails, IDHS Breach Impacts 700k
Next Post: xRAT Malware Attacking Windows Users Disguised as Adult Game

Related Posts

CISA Warns of Citrix RCE and Privilege Escalation Vulnerabilities Exploited in Attacks Cyber Security News
APT41 Hackers Using Google Calendar for Malware Command-and-Control To Attack Government Entities Cyber Security News
SparkKitty Malware Attacking iOS and Android Users to Steal Gallery Images Cyber Security News
CISA Adds MDaemon Email Server XSS Vulnerability to KEV Catalog Following Exploitation Cyber Security News
SAP Security Update – Patch for Critical Vulnerabilities Allowing Code Execution and Injection Attacks Cyber Security News
Muddled Libra Actors Attacking Organizations Call Centers for Initial Infiltration Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Leveraging OSINT Tools for Enhanced Cybersecurity Threat Intelligence
  • Data Breach at Texas Gas Station Operator Exposes Info of 377,000+ Customers
  • MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors
  • Europol Arrests 34 Black Axe Members in Spain Over €5.9M Fraud and Organized Crime
  • New MacSync Stealer Uses Signed macOS App to Evade Gatekeeper and Steal Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Leveraging OSINT Tools for Enhanced Cybersecurity Threat Intelligence
  • Data Breach at Texas Gas Station Operator Exposes Info of 377,000+ Customers
  • MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors
  • Europol Arrests 34 Black Axe Members in Spain Over €5.9M Fraud and Organized Crime
  • New MacSync Stealer Uses Signed macOS App to Evade Gatekeeper and Steal Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark