Fog Ransomware: Unusual Toolset Used in Recent Attack

A financial institution in Asia was targeted by Fog ransomware in May 2025, using an atypical toolset including legitimate employee monitoring software and open-source pentesting tools. The attackers deployed Syteca, GC2, Adaptix, and Stowaway, which are uncommon in ransomware attacks. They remained on the network for two weeks before deploying the ransomware and unusually established persistence afterward. The attack involved lateral movement, data theft, and attempts to delete evidence. The use of these tools and the persistence suggest possible espionage motives alongside the ransomware deployment. This incident highlights the importance of guarding against such sophisticated and unusual attack methodologies. Author: AlienVault

Related Tags:
financial institution

employee monitoring software

unusual toolset

asia

fog

FoggyWeb – S0661

cve-2024-40711

Fog Ransomware

T1569.002

Associated Indicators:
982D840DE531E72A098713FB9BD6AA8A4BF3CCAFF365C0F647E8A50100DB806D

FCF1DA46D66CC6A0A34D68FE79A33BC3E8439AFFDEE942ED82F6623586B01DD1

B448321BAAE50220782E345EA629D4874CBD13356F54F2BBEE857A90B5CE81F6

F6CFD936A706BA56C3DCAE562FF5F75A630FF5E25FCB6149FE77345AFD262AAB

90A027F44F7275313B726028EAAED46F6918210D3B96B84E7B1B40D5F51D7E85

44BB7D9856BA97271D8F37896071B72DFBED2D9FB6C70AC1E70247CDDBD54490

4D80C6FCD685961E60BA82FA10D34607D09DACF23D81105DF558434F82D67A5E

F37C62C5B92EECF177E3B7F98AC959E8A67DE5F8721DA275B6541437410FFAE1

181CF6F9B656A946E7D4CA7C7D8A5002D3D407B4E89973ECAD60CEE028AE5AFA