Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Trump closes the online shopping loophole that beat tariffs

    Tapo DL100 review: A Wi-Fi smart lock for a whole lot less

    This Alienware 4K OLED gaming monitor is over $400 off right now

    Facebook X (Twitter) Instagram
    • Artificial Intelligence
    • Business Technology
    • Cryptocurrency
    • Gadgets
    • Gaming
    • Health
    • Software and Apps
    • Technology
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Tech AI Verse
    • Home
    • Artificial Intelligence

      AI models may be accidentally (and secretly) learning each other’s bad behaviors

      July 30, 2025

      Another Chinese AI model is turning heads

      July 15, 2025

      AI chatbot Grok issues apology for antisemitic posts

      July 13, 2025

      Apple sued by shareholders for allegedly overstating AI progress

      June 22, 2025

      How far will AI go to defend its own survival?

      June 2, 2025
    • Business

      Cloudflare open-sources Orange Meets with End-to-End encryption

      June 29, 2025

      Google links massive cloud outage to API management issue

      June 13, 2025

      The EU challenges Google and Cloudflare with its very own DNS resolver that can filter dangerous traffic

      June 11, 2025

      These two Ivanti bugs are allowing hackers to target cloud instances

      May 21, 2025

      How cloud and AI transform and improve customer experiences

      May 10, 2025
    • Crypto

      Shiba Inu Price’s 16% Drop Wipes Half Of July Gains; Is August In Trouble?

      July 30, 2025

      White House Crypto Report Suggests Major Changes to US Crypto Tax

      July 30, 2025

      XRP Whale Outflows Reflect Price Concern | Weekly Whale Watch

      July 30, 2025

      Stellar (XLM) Bull Flag Breakout Shows Cracks as Momentum Fades

      July 30, 2025

      Binance Listing Could Be a ‘Kiss of Death’ for Pi Network and New Tokens

      July 30, 2025
    • Technology

      Trump closes the online shopping loophole that beat tariffs

      July 31, 2025

      Tapo DL100 review: A Wi-Fi smart lock for a whole lot less

      July 31, 2025

      This Alienware 4K OLED gaming monitor is over $400 off right now

      July 31, 2025

      Asus ROG Xbox Ally releases August with high price, according to leaks

      July 31, 2025

      This high-capacity solar power bank is down to its lowest price

      July 31, 2025
    • Others
      • Gadgets
      • Gaming
      • Health
      • Software and Apps
    Check BMI
    Tech AI Verse
    You are at:Home»Technology»Fog ransomware attack uses unusual mix of legitimate and open-source tools
    Technology

    Fog ransomware attack uses unusual mix of legitimate and open-source tools

    TechAiVerseBy TechAiVerseJune 12, 2025No Comments3 Mins Read0 Views
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    Fog ransomware attack uses unusual mix of legitimate and open-source tools
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp Email

    BMI Calculator – Check your Body Mass Index for free!

    Fog ransomware attack uses unusual mix of legitimate and open-source tools

    Fog ransomware hackers are using an uncommon toolset, which includes open-source pentesting utilities and a legitimate employee monitoring software called Syteca.

    The Fog ransomware operation was first observed last year in May leveraging compromised VPN credentials to access victims’ networks.

    Post-compromise, they used “pass-the-hash” attacks to gain admin privileges, disabled Windows Defender, and encrypted all files, including virtual machine storage.

    Later, the threat group was observed exploiting n-day flaws impacting Veeam Backup & Replication (VBR) servers, as well as SonicWall SSL VPN endpoints.

    New attack toolset

    Researchers at Symantec and the Carbon Black Threat Hunter team discovered the unusual attack toolset during an incident response last month on a financial institution in Asia.

    Symantec couldn’t determine the initial infection vector but documented the use of multiple new tools that have not been previously seen in such attacks.

    The most unusual and interesting of those is Syteca (formerly known as Ekran), a legitimate employee monitoring software that records screen activity and keystrokes.

    The attackers could use the tool to collect information like account credentials employees type in unaware that they are monitored remotely.

    Syteca was stealthily delivered to the system by Stowaway, an open-source proxy tool for covert communication and file transfers, and executed by SMBExec, the PsExec equivalent in the Impacket open-source framework used for lateral movement.

    The attack also involved GC2, an open-source post-exploitation backdoor that uses Google Sheets or Microsoft SharePoint for command-and-control (C2) and data exfiltration.

    GC2 has been rarely seen in ransomware attacks, previously used in attacks attributed to the APT41 Chinese threat group.

    Apart from these tools, Symantec also lists the following as part of Fog ransomware’s latest arsenal:

    • Adapt2x C2 – open-source alternative to Cobalt Strike supporting post-exploitation actions
    • Process Watchdog – system monitoring utility that can restart key processes
    • PsExec – Microsoft Sysinternals tool for remote execution across networked machines
    • Impacket SMB – Python library with low-level programmatic access to SMB, likely used for deploying the ransomware payload on the victim’s machine.

    To prepare data for exfiltration and deliver it to their infrastructure, Fog ransomware also used 7-Zip, MegaSync, and FreeFileSync utilities.

    “The toolset deployed by the attackers is quite atypical for a ransomware attack,” comments Symantec in the report.

    “The Syteca client and GC2 tool are not tools we have seen deployed in ransomware attacks before, while the Stowaway proxy tool and Adap2x C2 Agent Beacon are also unusual tools to see being used in a ransomware attack,” the researchers say.

    Unusual sets like the one Symantec spotted in the recent Fog ransomware attack can help threat actors evade detection. The researchers’ report provides indicators of compromise that can help organizations protect against such incidents.

    Why IT teams are ditching manual patch management

    Patching used to mean complex scripts, long hours, and endless fire drills. Not anymore.

    In this new guide, Tines breaks down how modern IT orgs are leveling up with automation. Patch faster, reduce overhead, and focus on strategic work — no complex scripts required.

    BMI Calculator – Check your Body Mass Index for free!

    Share. Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Telegram Email
    Previous ArticleChatGPT o3 API 80% price drop has no impact on performance
    Next Article HBAR Price Downtrend Set To Face Volatility Explosion; Recovery Likely
    TechAiVerse
    • Website

    Jonathan is a tech enthusiast and the mind behind Tech AI Verse. With a passion for artificial intelligence, consumer tech, and emerging innovations, he deliver clear, insightful content to keep readers informed. From cutting-edge gadgets to AI advancements and cryptocurrency trends, Jonathan breaks down complex topics to make technology accessible to all.

    Related Posts

    Trump closes the online shopping loophole that beat tariffs

    July 31, 2025

    Tapo DL100 review: A Wi-Fi smart lock for a whole lot less

    July 31, 2025

    This Alienware 4K OLED gaming monitor is over $400 off right now

    July 31, 2025
    Leave A Reply Cancel Reply

    Top Posts

    6.7 Cummins Lifter Failure: What Years Are Affected (And Possible Fixes)

    April 14, 202532 Views

    Ping, You’ve Got Whale: AI detection system alerts ships of whales in their path

    April 22, 202531 Views

    New Akira ransomware decryptor cracks encryptions keys using GPUs

    March 16, 202529 Views

    OpenAI details ChatGPT-o3, o4-mini, o4-mini-high usage limits

    April 19, 202522 Views
    Don't Miss
    Technology July 31, 2025

    Trump closes the online shopping loophole that beat tariffs

    Trump closes the online shopping loophole that beat tariffs Image: Pixabay An executive order by…

    Tapo DL100 review: A Wi-Fi smart lock for a whole lot less

    This Alienware 4K OLED gaming monitor is over $400 off right now

    Asus ROG Xbox Ally releases August with high price, according to leaks

    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    About Us
    About Us

    Welcome to Tech AI Verse, your go-to destination for everything technology! We bring you the latest news, trends, and insights from the ever-evolving world of tech. Our coverage spans across global technology industry updates, artificial intelligence advancements, machine learning ethics, and automation innovations. Stay connected with us as we explore the limitless possibilities of technology!

    Facebook X (Twitter) Pinterest YouTube WhatsApp
    Our Picks

    Trump closes the online shopping loophole that beat tariffs

    July 31, 20252 Views

    Tapo DL100 review: A Wi-Fi smart lock for a whole lot less

    July 31, 20252 Views

    This Alienware 4K OLED gaming monitor is over $400 off right now

    July 31, 20252 Views
    Most Popular

    Xiaomi 15 Ultra Officially Launched in China, Malaysia launch to follow after global event

    March 12, 20250 Views

    Apple thinks people won’t use MagSafe on iPhone 16e

    March 12, 20250 Views

    French Apex Legends voice cast refuses contracts over “unacceptable” AI clause

    March 12, 20250 Views
    © 2025 TechAiVerse. Designed by Divya Tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions

    Type above and press Enter to search. Press Esc to cancel.