Friday, May 9, 2025
Homecyber securityCybercriminals Deploy FOG Ransomware Disguised as DOGE via Malicious Emails

Cybercriminals Deploy FOG Ransomware Disguised as DOGE via Malicious Emails

Published on

SIEM as a Service

Follow Us on Google News

A new variant of the FOG ransomware has been identified, with attackers exploiting the name of the Department of Government Efficiency (DOGE) to mislead victims.

This operation, which came to light through the analysis of nine malware samples uploaded to VirusTotal between March 27 and April 2, demonstrates a cunning approach to ransomware distribution.

Infiltration Tactics and Initial Compromise

The FOG ransomware campaign begins with a seemingly innocuous email distributing a ZIP file named “Pay Adjustment.zip.”

- Advertisement - Google News

Within this archive lies an LNK file, which is cleverly disguised as a PDF document, misleading users into thinking they are accessing a legitimate government document.

Upon execution, this LNK file triggers a PowerShell script called “stage1.ps1,” initiating a complex chain of malware deployment.

 FOG Ransomware
 The LNK file disguised as a PDF file.

This script not only downloads additional ransomware components but also opens politically themed YouTube videos, potentially to distract or mislead the victim further.

The initial ransomware note dropped on the infected system makes reference to DOGE, an initiative of the US administration, to add a layer of credibility and confusion.

This tactic aligns with recent headlines involving a DOGE member allegedly aiding cyber criminals, a narrative cleverly woven into the malware’s propaganda.

Payload Execution and Persistence

The ransomware payload, once executed, performs a series of checks to avoid detection in sandbox environments.

According to the Report, these checks include hardware and system-level verifications like processor count, RAM, and MAC address.

If these indicators suggest a non-sandboxed environment, the malware deploys its full capabilities.

The payload includes scripts like ‘Lootsubmit.ps1’ which gathers system information, including the IP address, CPU configurations, and uses APIs to determine the system’s geolocation, before exfiltrating this data to a remote server.

 FOG Ransomware
 The log file dbgLog.sys records encryption-related events

A critical part of this ransomware’s arsenal is ‘Ktool.exe’, a tool designed to escalate privileges by exploiting a vulnerability in the Intel Network Adapter Diagnostic Driver, allowing the malware to bypass security measures effortlessly.

FOG ransomware has been active since January this year, with a peak in February, affecting sectors ranging from technology to healthcare.

Its operators boast of having 100 victims, showcasing their reach and the effectiveness of their phishing tactics.

To defend against such sophisticated threats, organizations are recommended to implement robust security measures.

These include maintaining secure, up-to-date backups, employing network segmentation to restrict lateral movement within the network, and ensuring all software is regularly patched to mitigate known vulnerabilities.

Additionally, continuous employee training to identify phishing attempts is crucial, as the initial infection often stems from human error.

The use of FOG ransomware, combined with the strategic abuse of government initiative names like DOGE, underscores the evolving sophistication of cybercriminal tactics.

It highlights the importance of not just reactive measures but a proactive cybersecurity strategy to anticipate and neutralize such multifaceted threats.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Critical Vulnerability in Ubiquiti UniFi Protect Camera Allows Remote Code Execution by Attackers

Critical security vulnerabilities in Ubiquiti’s UniFi Protect surveillance ecosystem-one rated the maximum severity score...

IXON VPN Client Vulnerability Allows Privilege Escalation for Attackers

A critical security vulnerability in IXON’s widely used VPN client has exposed Windows, Linux,...

Cisco IOS Software SISF Vulnerability Could Enable Attackers to Launch DoS Attacks

Cisco has released security updates addressing a critical vulnerability in the Switch Integrated Security...

Seamless AI Communication: Microsoft Azure Adopts Google’s A2A Protocol

Microsoft has announced its support for the Agent2Agent (A2A) protocol, an open standard developed...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Critical Vulnerability in Ubiquiti UniFi Protect Camera Allows Remote Code Execution by Attackers

Critical security vulnerabilities in Ubiquiti’s UniFi Protect surveillance ecosystem-one rated the maximum severity score...

IXON VPN Client Vulnerability Allows Privilege Escalation for Attackers

A critical security vulnerability in IXON’s widely used VPN client has exposed Windows, Linux,...

Cisco IOS Software SISF Vulnerability Could Enable Attackers to Launch DoS Attacks

Cisco has released security updates addressing a critical vulnerability in the Switch Integrated Security...