Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Fog Ransomware Actors Exploits Pentesting Tools to Exfiltrate Data and Deploy Ransomware

Posted on June 13, 2025June 13, 2025 By CWS

The Fog ransomware group has advanced past standard assault strategies, deploying an unprecedented arsenal of official pentesting instruments in a complicated Could 2025 marketing campaign concentrating on a monetary establishment in Asia.

This newest operation marks a big departure from typical ransomware techniques, incorporating worker monitoring software program and open-source penetration testing frameworks beforehand unseen within the ransomware panorama.

The assault demonstrates how risk actors are more and more blurring the strains between espionage and monetary cybercrime.

The attackers maintained persistent entry to the sufferer’s community for about two weeks earlier than deploying their ransomware payload, using a various toolkit that included the official Syteca worker monitoring software program, GC2 command-and-control framework, Adaptix C2 Agent Beacon, and Stowaway proxy instruments.

Preliminary compromise vectors focused Alternate Servers, although investigators couldn’t definitively set up the exact entry level.

The attackers leveraged these instruments for reconnaissance, lateral motion, and knowledge exfiltration, using discovery instructions reminiscent of whoami, web use, and community enumeration methods to map the goal surroundings.

Symantec analysts recognized the assault as significantly uncommon as a result of deployment of instruments not generally related to ransomware operations.

The GC2 software, which makes use of Google Sheets or Microsoft SharePoint for command execution and file exfiltration, had beforehand been noticed in APT41 operations however represents a novel addition to ransomware arsenals.

The attackers configured GC2 to ballot distant instructions whereas sustaining stealth via official cloud companies, successfully bypassing conventional community monitoring options.

Most notably, the attackers demonstrated distinctive persistence by establishing service-based backdoors a number of days after ransomware deployment, making a service named “SecurityHealthIron” with the outline “Accumulate efficiency details about an utility by utilizing command-line instruments”.

This post-ransomware persistence mechanism suggests potential dual-purpose operations, the place conventional ransomware actions might function cowl for ongoing espionage actions.

Superior Persistence and Twin-Function Operations

The institution of persistence mechanisms following ransomware deployment represents a paradigm shift in risk actor conduct.

The creation of the SecurityHealthIron service utilizing sc create instructions signifies refined planning past rapid monetary achieve.

This system, mixed with course of watchdog applications monitoring GC2 operations, means that Fog operators view ransomware as one element of broader intelligence gathering campaigns reasonably than terminal assault targets.

Automate risk response with ANY.RUN’s TI Feeds—Enrich alerts and block malicious IPs throughout all endpoints -> Request full entry

Cyber Security News Tags:Actors, Data, Deploy, Exfiltrate, Exploits, Fog, Pentesting, Ransomware, Tools

Post navigation

Previous Post: ZeroRISC Raises $10 Million for Open Source Silicon Security Solutions
Next Post: Critical Vulnerabilities Patched in Trend Micro Apex Central, Endpoint Encryption

Related Posts

New BruteForceAI Tool Automatically Detects Login Pages and Executes Smart Brute-Force Attacks Cyber Security News
Burger King Uses DMCA Complaint to Take Down Blog Post Detailing Security Flaws on Drive-Thru Systems Cyber Security News
10 Best Malware Analysis Tools Cyber Security News
Senate Investigates Cisco Over Zero-Day Firewall Vulnerabilities Cyber Security News
Hackers Weaponize PDF Along With a Malicious LNK File to Compromise Windows Systems Cyber Security News
LockBit 5.0 Infrastructure Exposed in New Server, IP and Domain Leak Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • CISO Communities – Cybersecurity’s Secret Weapon
  • Fortinet FortiWeb Vulnerability (CVE-2025-64446) Exploited in the Wild for Full Admin Takeover
  • 700,000 Records Compromised in Askul Ransomware Attack
  • Amazon: Russian Hackers Now Favor Misconfigurations in Critical Infrastructure Attacks
  • Dark Web Omertà Market Shut Downed Following the Leak of Real Server IPs

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • CISO Communities – Cybersecurity’s Secret Weapon
  • Fortinet FortiWeb Vulnerability (CVE-2025-64446) Exploited in the Wild for Full Admin Takeover
  • 700,000 Records Compromised in Askul Ransomware Attack
  • Amazon: Russian Hackers Now Favor Misconfigurations in Critical Infrastructure Attacks
  • Dark Web Omertà Market Shut Downed Following the Leak of Real Server IPs

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark