Fog of Doom: New Ransomware Targets US Schools with Compromised VPNs

Fog ransomware is haunting U.S. educational networks, exploiting compromised VPN credentials for access. Discovered by Arctic Wolf Labs, Fog encrypts files, disables defenses, and demands hefty ransoms. Despite lacking an extortion portal, BleepingComputer confirms Fog uses stolen data for double-extortion tactics. Beware the .FOG and…

Hot Take:

Congratulations, Fog! You’re the new villain in the 2024 cybersecurity soap opera. VPNs are now the red carpets for ransomware, and educational institutions are the latest A-list victims. But using compromised VPN credentials? That’s like breaking into a high-security vault with a stolen library card. Pro tip: VPNs are supposed to keep the bad guys out, not hold the door open for them!

Key Points:

  • Fog ransomware targets U.S. educational organizations using compromised VPN credentials.
  • Initial access is achieved through VPN credentials from two different vendors.
  • Ransomware disables Windows Defender and uses multi-threaded encryption routines.
  • Encrypted files are marked with .FOG or .FLOCKED extensions, with ransom notes providing Tor links for negotiation.
  • Unclear if Fog operates as an open ransomware-as-a-service (RaaS) or is a small private group.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here