Close Menu
Pineapples Update –Pineapples Update –

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    The most durable USB-C cable I’ve tested so far is only $11 this weekend (and I’ll be buying several)

    November 30, 2025

    Finally, an Android tablet that I wouldn’t mind keeping my iPad Pro for (especially at this price)

    November 30, 2025

    How much RAM will your PC really need in 2025? A Windows and Mac expert’s view

    November 30, 2025
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Pineapples Update –Pineapples Update –
    • Home
    • Gaming
    • Gadgets
    • Startups
    • Security
    • How-To
    • AI/ML
    • Apps
    • Web3
    Pineapples Update –Pineapples Update –
    Home»How-To»Fog uses employee surveillance tools to break up the ransomware attack commercial networks
    How-To

    Fog uses employee surveillance tools to break up the ransomware attack commercial networks

    PineapplesUpdateBy PineapplesUpdateJune 13, 2025No Comments2 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Fog uses employee surveillance tools to break up the ransomware attack commercial networks
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Fog uses employee surveillance tools to break up the ransomware attack commercial networks


    • Fog ransomware was seen using a valid employee monitoring equipment Syteca, which was seen to log and grab the password
    • It also used open-source tools for payload dropping and file exfoliation
    • The attack was “Atpical”, the researchers claim

    Fog ransomware operators have expanded their arsenal to include valid and open source tools. This, most likely, to avoid detection before deploying the encrypter.

    Cementac’s security researchers were recently brought to a fog ranges to check the ransomware infection, and a valid employee monitoring equipment during the attack was determined by hackers using Steca.

    The program, which is previously known as Acuran, Record Screen Activity and Kestrux, has not been seen in the earlier attacks.

    You may like

    “Many” accounts compromised

    By logging in keystrokes and tracking PasswordsThe attackers were able to reach the additional system, map the network and then deploy the encrypter successfully.

    To release Syteca, Fog used the stoveway, an open-source, multi-hop proxy tool, designed for safety researchers and paintters, to restrained traffic through several intermediate nodes or root for traffic in internal networks.

    After leaving the payload, the attackers used another open-source post-explain tool SMBEXEC to execute it on the server message block protocol (SMB).

    Finally, Fog used the GC2, which was an open source post-exclusion backdor, which takes advantage of the Google Sheet and Sharepoint for command-end control (C2) and data exfigures. Like Syteca, it is rarely seen in an attacks, though BlappingCopper It is claimed that the Chinese state-provided actor APT41 has sometimes seen using it.

    To get all the top news, opinions, facilities and guidance, sign up on Techradar Pro Newsletter, which your business needs to be successful!

    “The toolset deployed by the attackers is quite uncommon for a ransomware attack.”

    He said, “Syteca client and GC2 tools are not devices we have first deployed in ransomware attacks, while Stowaway Proxy Tools and Adap2x C2 agents beacons are also unusual equipment used in a ransomware attack,” he said.

    Fog ransomware first emerged in April 2024, and its first attacks were seen a month later. Since then, the group made a name for itself, claiming notable victims such as Belgian -based semiconductor company melaxis, European Meteorological Organization Eumetsat, FHNW University (a major Swiss Educational Institute), and Ultra Tune (an Australian Motor Vehicles Service Franchise).

    In initial attacks, the group used VPN credentials to reach the victims’ networks-after which they used “pass-the-hash” attacks to elevate privileges, disable antivirus products and encryp all files.

    Through BlappingCopper

    You might also like

    Attack break commercial employee fog networks Ransomware surveillance Tools
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleThe stellar blade on the PC is a surprisingly solid port, especially on the steam deck
    Next Article Cosori electric glass kettle reviews
    PineapplesUpdate
    • Website

    Related Posts

    Startups

    I’m a Photoshop fanatic, but Canva’s free tools won me over — and saved me money

    November 13, 2025
    Startups

    Fei-Fei Li’s World Labs speeds up the world model race with its first commercial product, Marble

    November 12, 2025
    Startups

    No one pays ransomware demands anymore – so attackers have a new target

    October 28, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Microsoft’s new text editor is a VIM and Nano option

    May 19, 2025797 Views

    The best luxury car for buyers for the first time in 2025

    May 19, 2025724 Views

    Massives Datenleck in Cloud-Spichenn | CSO online

    May 19, 2025650 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    10,000 steps or Japanese walk? We ask experts if you should walk ahead or fast

    June 16, 20250 Views

    FIFA Club World Cup Soccer: Stream Palmirus vs. Porto lives from anywhere

    June 16, 20250 Views

    What do chatbott is careful about punctuation? I tested it with chat, Gemini and Cloud

    June 16, 20250 Views
    Our Picks

    The most durable USB-C cable I’ve tested so far is only $11 this weekend (and I’ll be buying several)

    November 30, 2025

    Finally, an Android tablet that I wouldn’t mind keeping my iPad Pro for (especially at this price)

    November 30, 2025

    How much RAM will your PC really need in 2025? A Windows and Mac expert’s view

    November 30, 2025

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms And Conditions
    • Disclaimer
    © 2025 PineapplesUpdate. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.