Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
North Korean Hackers Weaponize Git Hooks to Deploy Cross-Platform
May 12, 2026
Critical Cline AI Agent Vulnerability Allows RCE Attacks
May 12, 2026
Malicious Chrome MV3 Extension Steals TronLink Crypto
May 12, 2026
Home/Threats/Fog Ransomware Attacks US Orgs Using Compromised VPN Credentials
Threats

Fog Ransomware Attacks US Orgs Using Compromised VPN Credentials

Organizations across the United States, particularly within the education and recreation sectors, are now facing a significant new threat: Fog ransomware. This recently emerged variant poses a...

Emy Elsamnoudy
Emy Elsamnoudy
January 9, 2026 3 Min Read
8 0

Organizations across the United States, particularly within the education and recreation sectors, are now facing a significant new threat: Fog ransomware. This recently emerged variant poses a substantial risk to these critical institutions.

Starting in early May 2024, Arctic Wolf Labs began monitoring its deployment across multiple incident response cases, with 80 percent of affected organizations operating in the education sector while 20 percent were in recreation.

The ransomware activity has been observed in several cases, each showing similar attack patterns and procedures. All victims were located within the United States, indicating a geographically focused campaign.

The Fog ransomware operates as a variant rather than a distinct group, representing a crucial distinction between the software creators and those conducting the actual attacks.

This separation matters because ransomware groups often appear as single entities when they actually comprise multiple independent affiliate teams.

The organizational structure behind Fog remains unclear at this time, though evidence suggests coordinated activity among threat actors.

The last documented attack activity in investigated cases occurred on May 23, 2024, providing a clear timeline for defensive measures.

Arctic Wolf analysts identified the malware after the second paragraph when they began investigating these cases in early May.

The research team noted that in each investigated case, forensic evidence indicated threat actors gained access to victim environments by leveraging Compromised VPN Credentials through two separate VPN gateway vendors.

This access method became the primary entry point for the campaign, highlighting vulnerabilities in remote access security postures.

Attack Methodology and Infection Mechanisms

Once inside networks, threat actors deployed a multi-stage approach combining common penetration testing tactics with ransomware deployment.

Pass-the-hash activity targeted administrator accounts, which were then used to establish RDP connections to Windows Servers running Hyper-V and Veeam backup systems. In another case, credential stuffing facilitated lateral movement throughout the environment.

PsExec was deployed across multiple hosts, while RDP and SMB protocols provided access to targeted systems. Before encryption began, Windows Defender was disabled on affected servers, removing a critical defense layer.

The ransomware payload exhibits techniques common to other variants, with samples from different cases containing identical code blocks. When executed, the sample creates a file called DbgLog.sys in the %AppData% directory to log activity status.

The initialization routine references NTDLL.DLL and the NtQuerySystemInformation function to gather system information for thread allocation.

Command line options include NOMUTEX for concurrent execution, TARGET for specific discovery locations, and CONSOLE for output display.

A JSON configuration block controls encryption activities, including the RSA public key, file extensions (typically .FOG or .FLOCKED), ransom note names, and service shutdown procedures.

File discovery uses standard Windows APIs like FindFirstVolume and FindFirstFile, employing Unicode variants throughout.

The encryption process utilizes a thread pool scaled to system processors, ranging from two to sixteen, implementing CryptImportKey and CryptEncrypt functions before renaming files with configured extensions and writing ransom notes.

Finally, vssadmin.exe executes with delete shadows /all /quiet commands to remove volume shadow copies, eliminating backup recovery options.

Tool Name Description
PsExec Enables threat actors to execute processes on other systems with full interactivity for console applications, used for lateral movement and command execution
Metasploit Penetration testing framework detected against Veeam servers during reconnaissance
SoftPerfect Network Scanner Network administration tool used to discover network services across targeted environments
Advanced Port Scanner Free network and port scanning utility deployed to identify accessible network services
SharpShares v2.3 Open-source tool used to enumerate and discover accessible network shares
Veeam-Get-Creds.ps1 PowerShell script designed to extract passwords from Veeam Backup and Replication Credentials Manager

Organizations should prioritize securing VPN infrastructure, implementing multi-factor authentication, maintaining secure off-site backup systems, and deploying defense-in-depth strategies.

The threat actors demonstrated financial motivation with rapid encryption timelines and no observed data exfiltration, suggesting quick-payout intentions rather than complex extortion schemes involving public leak sites.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackMalwareransomwareSecurityThreat

Share Article

Emy Elsamnoudy

Emy Elsamnoudy

Emy is a cybersecurity analyst and reporter specializing in threat hunting, defense strategies, and industry trends. With expertise in proactive security measures, Emily covers the tools and techniques organizations use to detect and prevent cyber attacks. She is a regular speaker at security conferences and has contributed to industry reports on threat intelligence and security operations. Emily's reporting focuses on helping organizations improve their security posture through practical, actionable insights.

Previous Post

Threat Actors Deploy 240+ Exploits Before Ransom Attacking Systems

Next Post

xRAT Malware Targets Windows Users Disguised as Adult Games

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Critical PHP SOAP Flaws Enable Remote Code Execution Attacks
May 12, 2026
Magecart Hackers Abuse GTM for Credit Card Sk Google Manager
May 12, 2026
TeamPCP Compromises Checkmarx Jenkins Compromised Plugin
May 12, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us