CyberSecurity news
Threat Hunter@Broadcom Software Blogs
//
The Fog ransomware gang is employing increasingly sophisticated tactics, including the use of legitimate employee monitoring software in their attacks. A recent Symantec report reveals that Fog leveraged Syteca, a security solution designed for on-screen activity recording and keystroke monitoring, alongside open-source pen-testing tools. This unusual approach was observed during a May 2025 attack on a financial institution in Asia, marking a significant shift in the gang's methods. The threat actors even utilized PsExec and SMBExec to execute the Syteca client on remote systems, highlighting their advanced understanding of system administration tools.
Researchers noted that the use of legitimate software like Syteca makes detection more challenging. However, specific event types, such as process creation events with "syteca" as the process file product name, can be used for threat hunting. The attackers also deployed several open-source pentesting tools, including GC2, Adaptix, and Stowaway, which are not commonly used during ransomware attacks. This combination of legitimate and malicious tools allows the attackers to blend in with normal network activity, making their actions harder to detect.
This incident indicates a multi-stage attack where the threat actors were present on the target's network for approximately two weeks before deploying the ransomware. What is also unusual is that after the initial ransomware deployment, the attackers established a service to maintain persistence on the network. This behavior contrasts with typical ransomware attacks, where malicious activity ceases after data exfiltration and ransomware deployment. The shift suggests a desire to maintain long-term access to the compromised network. The initial infection vector is unknown, but two of the infected machines were Exchange Servers.
ImgSrc: www.secureworld
References :
- @VMblog: Specific details about the unconventional toolset used in the attack and the potential motives behind it.
- BleepingComputer: Fog ransomware attack uses unusual mix of legitimate and open-source tools
- SecureWorld News: Fog Ransomware Exploits Legitimate Monitoring Software in Sophisticated Attacks
- Broadcom Software Blogs: Fog Ransomware: Unusual Toolset Used in Recent Attack
- www.csoonline.com: multiple legitimate, unusual tools were used in a Fog ransomware attack, including one employed by Chinese hacking group APT41.
- Know Your Adversary: Threat actors are always adding new tools to their arsenal. This Symantec on Fog Ransomware proves it one more time. Among other uncommon tools, the adversary leveraged Syteca - a legitimate security solution, which enables recording on-screen activity, keystroke monitoring, etc.
- www.scworld.com: Fog ransomware uses legit monitoring software, open-source tools
- securityonline.info: SecurityOnline: Ransomware or Espionage? Fog Ransomware Attack in Asia Raises Suspicion with Rare Toolset
- www.techradar.com: Fog ransomware attacks use employee monitoring tool to break into business networks
- securityonline.info: Ransomware or Espionage? Fog Ransomware Attack in Asia Raises Suspicion with Rare Toolset
- www.sentinelone.com: Interpol disrupts major infostealer operation, Fog ransomware abuses pentesting tools, and zero-click AI flaw in MS 365 Copilot exposes data.
- ciso2ciso.com: Unusual toolset used in recent Fog Ransomware attack – Source: securityaffairs.com
- Jon Greig: A cyberattack on a financial institution in Asia last month featuring the Fog ransomware caused concern because the attackers tried to maintain access after the incident and used employee monitoring tools during the attack
- therecord.media: A cyberattack on a financial institution in Asia last month featuring the Fog ransomware caused concern because the attackers tried to maintain access after the incident and used employee monitoring tools during the attack
- aboutdfir.com: Fog ransomware attacks use employee monitoring tool to break into business networksÂ
FogÂransomware operators have expanded their arsenal to include legitimate and open source tools.
- securityaffairs.com: Unusual toolset used in recent Fog Ransomware attack
Classification:
- HashTags: #Ransomware #Fog #LivingOffTheLand
- Company: Symantec
- Target: Financial Institution
- Attacker: Fog
- Product: Syteca
- Feature: Employee monitoring
- Malware: Syteca
- Type: Ransomware
- Severity: Major