Cyber Security News

Cybercriminals Deploy FOG Ransomware Disguised as DOGE via Malicious Emails

A new variant of the FOG ransomware has been identified, with attackers exploiting the name of the Department of Government Efficiency (DOGE) to mislead victims.

This operation, which came to light through the analysis of nine malware samples uploaded to VirusTotal between March 27 and April 2, demonstrates a cunning approach to ransomware distribution.

Infiltration Tactics and Initial Compromise

The FOG ransomware campaign begins with a seemingly innocuous email distributing a ZIP file named “Pay Adjustment.zip.”

Within this archive lies an LNK file, which is cleverly disguised as a PDF document, misleading users into thinking they are accessing a legitimate government document.

Upon execution, this LNK file triggers a PowerShell script called “stage1.ps1,” initiating a complex chain of malware deployment.

 FOG Ransomware FOG Ransomware
The LNK file disguised as a PDF file.

This script not only downloads additional ransomware components but also opens politically themed YouTube videos, potentially to distract or mislead the victim further.

The initial ransomware note dropped on the infected system makes reference to DOGE, an initiative of the US administration, to add a layer of credibility and confusion.

This tactic aligns with recent headlines involving a DOGE member allegedly aiding cyber criminals, a narrative cleverly woven into the malware’s propaganda.

Payload Execution and Persistence

The ransomware payload, once executed, performs a series of checks to avoid detection in sandbox environments.

According to the Report, these checks include hardware and system-level verifications like processor count, RAM, and MAC address.

If these indicators suggest a non-sandboxed environment, the malware deploys its full capabilities.

The payload includes scripts like ‘Lootsubmit.ps1’ which gathers system information, including the IP address, CPU configurations, and uses APIs to determine the system’s geolocation, before exfiltrating this data to a remote server.

The log file dbgLog.sys records encryption-related events

A critical part of this ransomware’s arsenal is ‘Ktool.exe’, a tool designed to escalate privileges by exploiting a vulnerability in the Intel Network Adapter Diagnostic Driver, allowing the malware to bypass security measures effortlessly.

FOG ransomware has been active since January this year, with a peak in February, affecting sectors ranging from technology to healthcare.

Its operators boast of having 100 victims, showcasing their reach and the effectiveness of their phishing tactics.

To defend against such sophisticated threats, organizations are recommended to implement robust security measures.

These include maintaining secure, up-to-date backups, employing network segmentation to restrict lateral movement within the network, and ensuring all software is regularly patched to mitigate known vulnerabilities.

Additionally, continuous employee training to identify phishing attempts is crucial, as the initial infection often stems from human error.

The use of FOG ransomware, combined with the strategic abuse of government initiative names like DOGE, underscores the evolving sophistication of cybercriminal tactics.

It highlights the importance of not just reactive measures but a proactive cybersecurity strategy to anticipate and neutralize such multifaceted threats.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Aman Mishra

Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Recent Posts

Azure Storage Utility Vulnerability Allows Privilege Escalation to Root Access

A critical vulnerability discovered by Varonis Threat Labs has exposed users of Microsoft Azure’s AI…

33 minutes ago

Critical Vulnerability in Ubiquiti UniFi Protect Camera Allows Remote Code Execution by Attackers

Critical security vulnerabilities in Ubiquiti’s UniFi Protect surveillance ecosystem-one rated the maximum severity score of…

13 hours ago

IXON VPN Client Vulnerability Allows Privilege Escalation for Attackers

A critical security vulnerability in IXON’s widely used VPN client has exposed Windows, Linux, and…

13 hours ago

Cisco IOS Software SISF Vulnerability Could Enable Attackers to Launch DoS Attacks

Cisco has released security updates addressing a critical vulnerability in the Switch Integrated Security Features…

13 hours ago

Seamless AI Communication: Microsoft Azure Adopts Google’s A2A Protocol

Microsoft has announced its support for the Agent2Agent (A2A) protocol, an open standard developed in…

13 hours ago

Radware Cloud Web App Firewall Flaw Allows Attackers to Bypass Security Filters

Security researchers have uncovered two critical vulnerabilities in Radware’s Cloud Web Application Firewall (WAF) that…

13 hours ago