Press ESC to close

Lifting the Fog: Darktrace’s Investigation into Fog Ransomware

CategoryDetails
Threat ActorsFog ransomware group
Campaign OverviewEmerged in May 2024; targets the education sector in the U.S. using compromised VPN credentials.
Target RegionsPrimarily education institutions in the United States.
MethodologyExploits VPN credentials, lateral movement via RDP and SMB, use of tools like AnyDesk, SplashTop, and Nmap for reconnaissance.
Product TargetedVPNs, domain controllers, Windows servers running Hyper-V, internal SMB shares, MEGA for exfiltration.
Malware ReferenceAppends files with .flocked extension; ransom notes named readme.txt.
Tools UsedAnyDesk, SplashTop, Nmap, Responder; utilizes legitimate tools for C2 communication and reconnaissance.
Vulnerabilities ExploitedCompromised VPN credentials, NTLM relay attacks, use of SMB and RDP for lateral movement.
TTPsDouble extortion (encryption and data exfiltration), quick encryption (2 hours), NTLM hash relay attacks, use of admin credentials.
AttributionFog ransomware group, possibly leveraging known techniques used by Akira, LockBit, and BlackBasta.
RecommendationsEnable autonomous response tools, monitor for unusual SMB and RDP activity, secure VPN credentials, block outbound traffic to cloud storage.
SourceDarktrace

Read full article: Lifting the Fog: Darktrace’s Investigation into Fog Ransomware | Darktrace Blog
Disclaimer: The above summary has been generated by an AI language model.

Leave a Reply

Your email address will not be published. Required fields are marked *