Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Fog Ransomware Attack Employs Unusual Tools

Fog Ransomware Attack Employs Unusual Tools

Posted on June 13, 2025June 13, 2025 By CWS

A latest Fog ransomware assault stands out attributable to the usage of a sequence of respectable instruments beforehand unseen in ransomware assaults, Symantec studies.

The assault was carried out in Could 2025 in opposition to a monetary establishment in Asia and relied on Syteca (previously Ekran), a respectable worker monitoring software program, and several other open supply pentesting utilities, particularly GC2, Adaptix, and Stowaway.

The attackers compromised the group’s community two weeks earlier than deploying ransomware, and contaminated two Trade servers within the course of. The an infection chain began with the open supply penetration testing instruments.

One of many utilities, GC2, can be utilized to execute instructions utilizing Google Sheets or Microsoft SharePoint Checklist, and to exfiltrate information by way of Google Drive or Microsoft SharePoint paperwork. The device was beforehand utilized by the Chinese language state-sponsored hacking group APT41 in 2023.

The Fog assault additionally concerned the usage of Stowaway, an open supply proxy utility, to deploy Syteca, a respectable worker monitoring utility that helps display recording and keystroke monitoring, amongst others.

“A number of libraries are loaded by this executable, suggesting it was probably used for data stealing or spying, which might be the most definitely purpose the attackers would deploy it given the keylogging and display seize capabilities of the device,” Symantec notes.

The attackers have been additionally seen executing instructions to take away Syteca, and using PsExec and SMBExec, together with Syteca and GC2, for lateral motion. File switch utilities akin to Freefilesync and MegaSync have been used for information exfiltration.

Moreover, the Adaptix C2 Agent Beacon, a part of an open supply post-exploitation and adversarial emulation framework, was deployed. The device, which is like Cobalt Strike, permits command-and-control (C&C) entry.Commercial. Scroll to proceed studying.

The attackers additionally created a service to determine persistence on the contaminated community a number of days earlier than the ransomware was deployed. Impacket was seemingly used to execute Fog.

Based on Symantec, the bizarre set of instruments employed on this assault, together with the try and retain entry to the compromised community, means that the sufferer group might need been focused for espionage, with the ransomware part being both a decoy or an try and earn further cash from the intrusion.

This isn’t the primary ransomware assault to make use of instruments sometimes utilized by China-linked APTs, with earlier occurrences together with a variant of the PlugX backdoor and the Shadowpad modular malware household.

The Fog ransomware emerged in 2024, primarily concentrating on the US schooling sector. As an preliminary entry vector, the group has abused compromised VPN credentials, weak Veeam Backup & Replication (VBR) servers (CVE-2024-40711), and phishing emails.

Associated: FBI Conscious of 900 Organizations Hit by Play Ransomware

Associated: Chinese language Hacking Group APT41 Exploits Google Calendar to Goal Governments

Associated: Delicate Data Stolen in Sensata Ransomware Assault

Security Week News Tags:Attack, Employs, Fog, Ransomware, Tools, Unusual

Post navigation

Previous Post: Critical Vulnerability Exposes Many Mitel MiCollab Instances to Remote Hacking
Next Post: Shifting from Monitoring Alerts to Measuring Risk

Related Posts

Mikko Hypponen Leaves Anti-Malware Industry to Fight Against Drones Mikko Hypponen Leaves Anti-Malware Industry to Fight Against Drones Security Week News
Millions of Cars Exposed to Remote Hacking via PerfektBlue Attack Millions of Cars Exposed to Remote Hacking via PerfektBlue Attack Security Week News
Ransomware Groups May Shift Back to Encryption Strategies Ransomware Groups May Shift Back to Encryption Strategies Security Week News
GitHub Codespaces Vulnerability Exploited for Repository Control GitHub Codespaces Vulnerability Exploited for Repository Control Security Week News
160,000 Impacted by Wayne Memorial Hospital Data Breach 160,000 Impacted by Wayne Memorial Hospital Data Breach Security Week News
Airoha Chip Vulnerabilities Expose Headphones to Takeover Airoha Chip Vulnerabilities Expose Headphones to Takeover Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required
  • Iranian Hackers Compromise FBI Director’s Email, Attack Stryker
  • Stocks in Cybersecurity Dip as Anthropic Tests Cutting-Edge AI

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required
  • Iranian Hackers Compromise FBI Director’s Email, Attack Stryker
  • Stocks in Cybersecurity Dip as Anthropic Tests Cutting-Edge AI

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark