Introduction: A New Era of Ransomware Attacks

Ransomware isn’t what it used to be. Gone are the days when attackers relied solely on phishing emails or brute-force attacks. Today’s cybercriminals are getting creative leveraging legitimate security tools to fly under the radar while wreaking havoc.

The Fog ransomware group has taken this trend to a frightening new level. In a May 2025 attack on an Asian financial institution, they didn’t just encrypt files and demand payment they spied on employees, exfiltrated sensitive data, and maintained stealthy backdoors long after the ransomware detonated.

What makes this attack so concerning? They used off-the-shelf pentesting tools software designed to help security professionals against their victims. This isn’t just ransomware anymore; it’s cyber-espionage with a financial twist.

Let’s break down exactly how they pulled it off and what businesses can do to defend themselves.

How the Attack Unfolded: A Step-by-Step Breakdown

1. Initial Compromise: The Silent Entry

Investigators believe the attackers first breached the target’s Exchange Server, though the exact entry point remains unclear. Once inside, they didn’t rush to deploy ransomware. Instead, they lurked for nearly two weeks, quietly mapping the network.

2. Reconnaissance: Spying Like a Sysadmin

Using basic but effective commands like

whoami (to check privileges)

net use (to map network shares)

nltest /domain_trusts (to find connected domains)

They identified high-value targets, including financial databases and employee workstations.

3. The Unusual Toolkit: Legitimate Apps Turned Malicious

Instead of custom malware, Fog operators used

Syteca (employee monitoring software): To track user activity.

GC2 (a command-and-control framework): Used Google Sheets & SharePoint for stealthy communication.

Adaptix C2 Beacon: A pentesting tool repurposed for data theft.

Stowaway Proxy To hide their movements inside the network.

This approach made detection extremely difficult many security tools ignore these applications because they’re not traditionally malicious.

4. Data Exfiltration: Hiding in Plain Sight

The GC2 framework was particularly clever. Instead of connecting to a shady server, it:

Polled Google Sheets for commands (blending in with normal cloud traffic).

Exfiltrated files via SharePoint (looking like regular business activity).

This meant no suspicious IPs, no odd domains just what appeared to be normal cloud service usage.

5. Ransomware Deployment and Beyond

After stealing data, they finally triggered the ransomware. But unlike typical attacks, they didn’t just leave afterward.

They created a persistent backdoor named:

“SecurityHealthIron” (disguised as a legitimate Windows service).

This service acted as a watchdog, ensuring their GC2 spy tools kept running even after the ransom was paid.

Why This Attack Changes the Game

1. Ransomware as a Smokescreen for Espionage

Most ransomware gangs hit and run. Fog, however, stuck around, suggesting they weren’t just after money—they wanted long-term access to sensitive data.

2. The Rise of “Living-off-the-Land” Attacks

Using trusted software (like Google Sheets for C2) makes attacks nearly invisible to traditional security tools.

3. A Warning for Security Teams

If hackers can turn pentesting tools against you, how do you tell friend from foe?

How to Defend Against These Attacks

1. Monitor Unusual Cloud Activity

Unexpected Google Sheets/SharePoint access? Investigate.

Unusual API calls? Lock it down.

2. Restrict Legitimate Pentesting Tools

Syteca, GC2, Cobalt Strike? Only allow them in controlled environments.

3. Hunt for Post-Ransomware Backdoors

Check for suspicious services (like “SecurityHealthIron”).

Audit scheduled tasks & new registry entries.

4. Assume Breach, Act Early

If ransomware hits, don’t assume the attackers are gone. They might still be inside.

The Blurring Line Between Crime and Cyberwarfare

The Fog ransomware attack isn’t just another data encryption scheme it’s a hybrid threat combining financial extortion with corporate espionage.

As attackers get smarter, businesses must evolve beyond basic ransomware defenses. The next wave of cyber threats won’t just lock your files they’ll steal your secrets while pretending to be you.

Are you prepared?


Discover more from CyberAwareHub

Subscribe to get the latest posts sent to your email.

Leave a Reply

Discover more from CyberAwareHub

Subscribe now to keep reading and get access to the full archive.

Continue reading