ForensicsS | Private Detective & Digital Forensics Investigation Experts
  • info@forensicss.com

    Send Email

  • 11400 West Olympic Blvd, Los Angeles, CA 90064

  • Home
  • About Us
  • Services
    • Domestic Investigation
      • Los Angeles Private Eye
      • Infidelity Investigations
      • Asset Investigations
      • Private Detective Orange County
      • Child Custody Investigations
      • Missing Person Locates
      • Wire Fraud
      • Corporate Security Investigations
      • Surveillance Operations
      • Financial Fraud Investigations
      • Asset and Hidden Finances Investigations
      • Bug Sweep TSCM Investigation
    • Cyber Security
      • Cyber Bullying Online Investigation
      • Penetration Testing Service
      • Social Media Monitoring
      • Romance Scam Investigator
      • Cyber Stalking Investigation
      • Crypto Scam Investigation
      • Cyber Security Assessment
      • Cyber Harassment Online Investigator
      • Ransomware Attack Investigation
      • Social Media Investigator
      • Extortion Investigation services
      • Background Screening
      • Insurance Fraud Detective
      • Forensic Accounting
      • Online Identity Theft
      • Online Blackmail
      • Cell Phone Forensics
      • Automotive Forensics
      • Audio Video Forensics
      • E-Discovery
      • Computer and Cell Phone Forensics
  • Closed Cases
    • Closed Cases
    • Case Details
  • News
  • Contact
310-270-0598

Confidentiality Guaranteed

310-270-0598

Confidentiality Guaranteed

Logo

Contact Info

  • 11400 West Olympic Blvd, Los Angeles, CA 90064
  • 310-270-0598
  • info@forensicss.com

    Blog Details

      ForensicsS | Private Detective & Digital Forensics Investigation Experts > News > Uncategorized > Fog ransomware assault uses irregular combine of legit and beginning-source instruments
    Fog ransomware assault uses irregular combine of legit and beginning-source instruments
    12
    Jun
    • ForensicsS
    • 0 Comments

    Fog ransomware assault uses irregular combine of legit and beginning-source instruments

    Data breach

    data breach Fog ransomware attack uses unusual mix of legitimate and open-source tools

    Fog ransomware hackers are the spend of an irregular toolset, which entails beginning-source pentesting utilities and a legit employee monitoring software program known as Syteca.

    The Fog ransomware operation became first noticed final Twelve months in Would possibly per chance per chance per chance moreover merely leveraging compromised VPN credentials to construct up valid of entry to victims’ networks.

    Submit-compromise, they frail “pass-the-hash” assaults to electrify admin privileges, disabled Dwelling windows Defender, and encrypted all recordsdata, along side virtual machine storage.

    Later, the chance community became noticed exploiting n-day flaws impacting Veeam Backup & Replication (VBR) servers, along with SonicWall SSL VPN endpoints.

    Data breach Contemporary assault toolset

    Researchers at Symantec and the Carbon Unlit Risk Hunter team realized the irregular assault toolset during an incident response final month on a financial institution in Asia.

    Symantec couldn’t resolve the initial an infection vector however documented the spend of multiple unique instruments which hold not been previously considered in such assaults.

    Essentially the most irregular and enticing of those is Syteca (previously is named Ekran), a legit employee monitoring software program that records camouflage teach and keystrokes.

    The attackers might per chance moreover spend the instrument to gain knowledge like legend credentials workers form in unaware that they are monitored remotely.

    Syteca became stealthily delivered to the gadget by Stowaway, an beginning-source proxy instrument for covert conversation and file transfers, and executed by SMBExec, the PsExec same in the Impacket beginning-source framework frail for lateral movement.

    The assault moreover involved GC2, an beginning-source post-exploitation backdoor that uses Google Sheets or Microsoft SharePoint for dispute-and-management (C2) and knowledge exfiltration.

    GC2 has been infrequently considered in ransomware assaults, previously frail in assaults attributed to the APT41 Chinese language chance community.

    Rather than these instruments, Symantec moreover lists the following as piece of Fog ransomware’s most modern arsenal:

    • Adapt2x C2 – beginning-source various to Cobalt Strike supporting post-exploitation actions
    • Course of Watchdog – gadget monitoring utility that can restart key processes
    • PsExec – Microsoft Sysinternals instrument for far off execution across networked machines
    • Impacket SMB – Python library with low-stage programmatic accumulate valid of entry to to SMB, seemingly frail for deploying the ransomware payload on the victim’s machine.

    To put together data for exfiltration and ship it to their infrastructure, Fog ransomware moreover frail 7-Zip, MegaSync, and FreeFileSync utilities.

    “The toolset deployed by the attackers is highly odd for a ransomware assault,” feedback Symantec in the portray.

    “The Syteca client and GC2 instrument usually are not instruments we hold considered deployed in ransomware assaults sooner than, while the Stowaway proxy instrument and Adap2x C2 Agent Beacon are moreover irregular instruments to stare being frail in a ransomware assault,” the researchers bid.

    Uncommon objects just like the one Symantec seen in the most modern Fog ransomware assault can succor chance actors evade detection. The researchers’ portray provides indicators of compromise that can succor organizations offer protection to in opposition to such incidents.


    data breach Tines Needle

    Data breach Why IT groups are ditching manual patch management

    Patching frail to mean complex scripts, long hours, and unending fireplace drills. No longer anymore.

    On this unique handbook, Tines breaks down how in model IT orgs are leveling up with automation. Patch sooner, decrease overhead, and focal point on strategic work — no complex scripts required.

    Read Extra

    • Tags

    • Attack cybercrime email-fraud forensics|digital-forensics Investigation malware online-scam private-detective scam|fraud private-eye cyber|cybersecurity private-eye phishing|phishing-attack private-investigator private-investigator hacking|hacker ransomware

    Recent Posts

    • FBI, cybersecurity companies yelp a prolific hacking crew is now concentrating on airways and the transportation sector
    • Scattered Spider hackers shift focal point to aviation, transportation companies
    • University of Virginia President Resigns Underneath Stress From Trump Administration
    • Change WinRAR now! This security flaw leaves your PC exposed to malware
    • FBI: Immigration Raid at Alabama Faculty Constructing Assign Nets 37 Arrests

    Recent Comments

    No comments to show.

    Categories

    • cybersecurity
    • Investigations
    • Uncategorized

    Recent Posts

    FBI, cybersecurity companies yelp a prolific hacking crew is now concentrating on airways and the transportation sector
    June 28, 2025
    FBI, cybersecurity companies yelp a prolific hacking crew is now concentrating on airways and the transportation sector
    Scattered Spider hackers shift focal point to aviation, transportation companies
    June 27, 2025
    Scattered Spider hackers shift focal point to aviation, transportation companies
    University of Virginia President Resigns Underneath Stress From Trump Administration
    June 27, 2025
    University of Virginia President Resigns Underneath Stress From Trump Administration

    Popular Tags

    accused administration calls Court Crypto Cyber cybercrime cybercrimefraud cybercrimehacker cybercrimephishing-attack cybersecurity deputy digital-forensics director email-fraud Extortion forensics|digital-forensics fraud government hacker hackers Investigation investigationcybersecurity Korea Korean Launches malware malwarefraud malwarephishing-attack Million North online-scam online-scamphishing-attack orders Patel phishing-attack private-detective scam|fraud private-eye cyber|cybersecurity private-eye phishing|phishing-attack private-investigator private-investigator hacking|hacker probe suspect Trump warns

    Forensics – Trusted Experts in Surveillance, Cyber Security, Background Checks, and Digital Forensics across California.

    • 310-270-0598
    • info@forensicss.com
    • 11400 West Olympic Blvd, Los Angeles, CA 90064

    Explore

    • News
    • About
    • Our Services
    • Find A Person
    • Child Custody
    • Contact Us
    • Los Angeles
    • Orange County
    • San Diego

    Services

    • Cyber Security
    • Online Blackmail
    • Cell Phone Forensics
    • Domestic Investigation
    • Social Media Investigator
    • Crypto Scam Investigation

    Newsletter

    Sign up email to get our daily latest news & updates from us

    © Copyright 2021 by KRIGO