Discovery of Fog Ransomware Affiliate’s Open Directory Highlights Expanded Threat Landscape

Published
Written by:
Lore Apostol
Lore Apostol
Cybersecurity & Streaming Writer

A recent investigation uncovered an open directory in December 2024, tied to an affiliate of the Fog ransomware group. The DFIR Report cybersecurity research team presents a significant breakthrough in understanding the Fog ransomware group’s operations. 

It offers a detailed glimpse into the suite of tools and tactics deployed during their campaigns. This discovery sheds light on the persistent and evolving strategies of modern ransomware actors.

The exposed directory revealed meticulously curated tools for reconnaissance, credential theft, lateral movement, persistence, and command-and-control (C2) operations. 

VisusTotal comment said the server was used as a C2 server
VisusTotal comment said the server was used as a C2 server | Source: The DFIR Report

Among the tools discovered were:

Notable C2 tools such as Sliver components and Proxychains were also hosted.

Proxychains tunneling flow
Proxychains tunneling flow | Source: The DFIR Report

The threat actors employed sophisticated persistence mechanisms. For example, AnyDesk was used for remote monitoring and management, automated via a PowerShell script that pre-configured credentials for seamless remote access. 

Other tools, such as Powercat, expanded the scope of lateral movement and command execution.

The utilization of a diverse toolkit demonstrates the Fog ransomware group affiliate's adaptability to various environments and targets, enhancing their ability to sustain prolonged campaigns.

Victim analysis indicated an extensive and indiscriminate targeting approach. The ransomware group’s victims spanned industries like technology, education, retail, and logistics across Europe, the Americas, and Brazil.

Evidence from the directory linked activity to several high-profile incidents, including compromise attempts targeting well-known organizations. The geographic scope and diversity of industries continue to place a broad spectrum of organizations at risk.


For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: