Efani<p>😵💫 Ransomware with a meme twist: the latest Fog attacks come with DOGE-themed ransom notes — mocking victims and even offering free decryption if they "spread the malware".</p><p>Researchers at Trend Micro have been tracking a surge in attacks from the Fog ransomware group, which has now hit over 100 confirmed victims since January. While earlier variants relied on compromised VPN credentials, the latest campaigns use phishing emails to deliver a malicious “Pay Adjustment[dot]zip ” file that drops the ransomware via PowerShell.</p><p>Key observations:<br>- Initial infection begins with a ZIP file and LNK shortcut <br>- PowerShell downloads scripts and executables for system profiling, lateral movement, and encryption <br>- A QR code leads to Monero payment options <br>- Political commentary and YouTube links are embedded directly in the code <br>- Sectors hit include tech, education, manufacturing, and transportation</p><p>💰 The ransom notes reference the satirical Department of Government Efficiency (DOGE), making absurd demands like “list five tasks you accomplished last week” or “pay one trillion dollars.” In one version, victims are told they can decrypt their system for free — if they forward the malware.</p><p>This marks a shift in behavior:<br>- Originally, Fog didn’t exfiltrate data or run leak sites <br>- Now, researchers report double-extortion tactics and faster attack cycles <br>- In some incidents, data was encrypted within two hours of initial access</p><p>🛡️ Trend Micro and Darktrace urge organizations to:<br>- Monitor Fog IoCs <br>- Segment networks <br>- Keep offline, tested backups <br>- Train teams to spot phishing attempts <br>- Patch VPNs and remote access infrastructure</p><p>At <span class="h-card" translate="no"><a href="https://infosec.exchange/@Efani" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>Efani</span></a></span>, we believe even “troll” ransomware is no joke. Whether done for profit or chaos, the operational damage from Fog attacks can be severe. Stay vigilant — even the ransom notes are engineered for distraction.</p><p><a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/Ransomware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ransomware</span></a> <a href="https://infosec.exchange/tags/FogRansomware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FogRansomware</span></a> <a href="https://infosec.exchange/tags/DOGE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DOGE</span></a> <a href="https://infosec.exchange/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatIntel</span></a> <a href="https://infosec.exchange/tags/EfaniSecure" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EfaniSecure</span></a> <a href="https://infosec.exchange/tags/Phishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Phishing</span></a> <a href="https://infosec.exchange/tags/IncidentResponse" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IncidentResponse</span></a></p>