
A recent investigation uncovered an open directory in December 2024, tied to an affiliate of the Fog ransomware group. The DFIR Report cybersecurity research team presents a significant breakthrough in understanding the Fog ransomware group’s operations.Â
It offers a detailed glimpse into the suite of tools and tactics deployed during their campaigns. This discovery sheds light on the persistent and evolving strategies of modern ransomware actors.
The exposed directory revealed meticulously curated tools for reconnaissance, credential theft, lateral movement, persistence, and command-and-control (C2) operations.Â
Among the tools discovered were:
Notable C2 tools such as Sliver components and Proxychains were also hosted.
The threat actors employed sophisticated persistence mechanisms. For example, AnyDesk was used for remote monitoring and management, automated via a PowerShell script that pre-configured credentials for seamless remote access.Â
Other tools, such as Powercat, expanded the scope of lateral movement and command execution.
The utilization of a diverse toolkit demonstrates the Fog ransomware group affiliate's adaptability to various environments and targets, enhancing their ability to sustain prolonged campaigns.
Victim analysis indicated an extensive and indiscriminate targeting approach. The ransomware group’s victims spanned industries like technology, education, retail, and logistics across Europe, the Americas, and Brazil.
Evidence from the directory linked activity to several high-profile incidents, including compromise attempts targeting well-known organizations. The geographic scope and diversity of industries continue to place a broad spectrum of organizations at risk.