Article Details
Scrape Timestamp (UTC): 2024-06-06 18:29:56.603
Original Article Text
Click to Toggle View
New Fog ransomware targets US education sector via breached VPNs. A new ransomware operation named 'Fog' launched in early May 2024, using compromised VPN credentials to breach the networks of educational organizations in the U.S. Fog was discovered by Arctic Wolf Labs, which reported that the ransomware operation has not set up an extortion portal yet and was not observed stealing data. However, BleepingComputer can confirm the ransomware gang steals data for double-extortion attacks, using the data as leverage to scare victims into paying. VPNs for initial access Fog's operators accessed victim environments using compromised VPN credentials from at least two different VPN gateway vendors. "In each of the cases investigated, forensic evidence indicated that threat actors were able to access victim environments by leveraging compromised VPN credentials," explains Artic Wolf Labs. "Notably, the remote access occurred through two separate VPN gateway vendors. The last documented threat activity in our cases occurred on May 23, 2024." Once they gain access to the internal network, the attackers perform "pass-the-hash" attacks on administrator accounts, which are used to establish RDP connections to Windows servers running Hyper-V. Alternatively, credential stuffing is used to hijack valuable accounts, followed by PsExec deployment on multiple hosts. On Windows servers, Fog operators disable Windows Defender to prevent notifications alerting the victim before the execution of the encrypter. When the ransomware is deployed, it performs Windows API calls to gather information about the system, such as the number of available logical processors to allocate threads for a multi-threaded encryption routine. Before starting the encryption, the ransomware terminates a list of processes and services based on a hardcoded list in its configuration. The ransomware encrypts VMDK files in Virtual Machine (VM) storage and deletes backups from object storage in Veeam and Windows volume shadow copies to prevent easy restoration. Encrypted files are appended the '.FOG' or '.FLOCKED' extension, though this can be set from the JSON-based configuration block to anything the operator wants. Finally, a ransom note is created and dropped on impacted directories, providing instructions to the victims on paying for a decryption key that will help them get their files back. From an attack seen by BleepingComputer, the ransom note is named readme.txt and contains a link to a Tor dark website used for negotiation. This site is a basic chat interface allowing the ransomware victim to negotiate a ransom demand with the threat actors and get a list of stolen files. BleepingComputer can also confirm that the Tor negotiation site is the same for both the .FOG and .FLOCKED extensions, with ongoing attacks using either extension. In an attack seen by BleepingComputer, the ransomware gang demanded hundreds of thousands to receive a decryptor and delete the stolen data. However, it is likely more for larger companies. Arctic Wolf Labs says it is currently unclear if Fog operates as an open ransomware-as-a-service (RaaS) that accepts affiliates or if a small private circle of cybercriminals is behind it.
Daily Brief Summary
A new ransomware called 'Fog' specifically targets the U.S. education sector by exploiting compromised VPN credentials.
Discovered by Arctic Wolf Labs in May 2024, Fog's operators infiltrate networks using stolen credentials from various VPN gateways.
The cybercriminals perform sophisticated attacks such as "pass-the-hash" and utilize tools like PsExec to spread within the network and commandeer admin accounts.
Before encrypting data stored in Virtual Machines (VMs), the ransomware terminates specific system processes and deletes backups to hinder recovery.
Encrypted files are appended with '.FOG' or '.FLOCKED', making them inaccessible without a decryption key provided upon ransom payment.
Victims find a ransom note on their systems, directing them to negotiate payment through a Tor-based dark web chat interface.
Despite not initially setting up an extortion portal, BleepingComputer confirms that Fog uses double-extortion tactics, leveraging stolen data to pressure victims into paying.
Arctic Wolf Labs has yet to confirm whether Fog operates under a ransomware-as-a-service model or if it is controlled by a select group of cybercriminals.