Navigating Through The Fog
An open directory linked to a Fog ransomware affiliate was discovered, containing tools for reconnaissance, exploitation, lateral movement, and persistence. Initial access was gained through compromised SonicWall VPN credentials, while other tools facilitated credential theft and exploitation of Active Directory vulnerabilities. Persistence was maintained via AnyDesk, automated by a PowerShell script. Sliver C2 executables were used for command-and-control operations. The victims spanned multiple industries across Europe, North America, and South America, highlighting the affiliate's broad targeting scope. The toolkit included SonicWall Scanner, DonPAPI, Certipy, Zer0dump, and Pachine/noPac for various attack stages.
Pulse ID: 680f0738479d23f04a10d198
Pulse Link: https://otx.alienvault.com/pulse/680f0738479d23f04a10d198
Pulse Author: AlienVault
Created: 2025-04-28 04:42:32
Be advised, this data is unverified and should be considered preliminary. Always do further verification.
