Lifting the Fog: Investigating Fog Ransomware

Short Summary:

Fog ransomware, first detected in May 2024, is a new strain targeting US educational organizations. Darktrace’s investigation revealed a rapid attack cycle, utilizing compromised VPN credentials for initial access, followed by lateral movement, data exfiltration, and encryption of files. The ransomware employs common remote access tools to establish command-and-control communication, complicating detection efforts.

Key Points:

  • Fog ransomware first observed in May 2024, targeting US educational institutions.
  • Utilizes compromised VPN credentials for initial access to networks.
  • Darktrace detected rapid progression from access to file encryption in as little as 2 hours.
  • Key activities include enumeration, lateral movement, encryption, and data exfiltration.
  • Employs remote access tools like AnyDesk and SplashTop for command-and-control communication.
  • Exfiltration attempts suggest a double extortion tactic, threatening public exposure of sensitive data.
  • Darktrace’s Autonomous Response effectively mitigated some attacks by quarantining affected devices.

MITRE ATT&CK TTPs – created by AI

  • Data ObfuscationID: T1001
    • Used to obscure data during command and control communication.
  • Remote System DiscoveryID: T1018
    • Reconnaissance to identify systems within the network.
  • SMB/Windows Admin SharesID: T1021.002
    • Utilized for lateral movement within the network.
  • Rename System UtilitiesID: T1036.003
    • Used for evading detection by renaming tools.
  • Network SniffingID: T1040
    • Gathering credentials and sensitive information from network traffic.
  • Exfiltration Over C2 ChannelID: T1041
    • Exfiltrating data through established command and control channels.
  • Data StagedID: T1074
    • Preparing data for exfiltration.
  • Valid AccountsID: T1078
    • Utilizing compromised accounts for access and persistence.
  • Taint Shared ContentID: T1080
    • Manipulating shared content for lateral movement.
  • File and Directory DiscoveryID: T1083
    • Identifying files and directories for targeted attacks.
  • Email CollectionID: T1114
    • Gathering emails for further exploitation.
  • Automated CollectionID: T1119
    • Automating the collection of sensitive data.
  • Network Share DiscoveryID: T1135
    • Identifying network shares for potential exploitation.
  • Exploit Public-Facing ApplicationID: T1190
    • Exploiting vulnerabilities in public-facing applications for initial access.
  • Hardware AdditionsID: T1200
    • Using hardware modifications for unauthorized access.
  • Remote Access SoftwareID: T1219
    • Using legitimate remote access software for command-and-control.
  • Data Encrypted for ImpactID: T1486
    • Encrypting data to disrupt operations and demand ransom.
  • Pass the HashID: T1550.002
    • Using hashed credentials for lateral movement.
  • Exfiltration to Cloud StorageID: T1567.002
    • Transferring data to cloud storage services for exfiltration.
  • Lateral Tool TransferID: T1570
    • Transferring tools between systems for lateral movement.

In early May 2024, Fog ransomware was first observed in the wild, seemingly targeting US-based educational organizations. Read on to find out about Darktrace’s investigation into this novel ransomware threat.

Introduction to Fog Ransomware

As ransomware attacks continue to be launched at an alarming rate, Darktrace’s Threat Research team has identified that familiar strains like Akira, LockBit, and BlackBasta remain among the most prevalent threats impacting its customers, as reported in the First 6: Half-Year Threat Report 2024. Despite efforts by law agencies, like dismantling the infrastructure of cybercriminals and shutting down their operations [2], these groups continue to adapt and evolve.

As such, it is unsurprising that new ransomware variants are regularly being created and launched to get round law enforcement agencies and increasingly adept security teams. One recent example of this is Fog ransomware.

What is Fog ransomware?

Fog ransomware is strain that first appeared in the wild in early May 2024 and has been observed actively using compromised virtual private network (VPN) credentials to gain access to organization networks in the education sector in the United States.

Darktrace’s detection of Fog Ransomware

In June 2024, Darktrace observed instances of Fog ransomware across multiple customer environments. The shortest time observed from initial access to file encryption in these attacks was just 2 hours, underscoring the alarming speed with which these threat actors can achieve their objectives.

Darktrace identified key activities typical of a ransomware kill chain, including enumeration, lateral movement, encryption, and data exfiltration. In most cases, Darktrace was able to successfully halt the progression Fog attacks in their early stages by applying Autonomous Response actions such as quarantining affected devices and blocking suspicious external connections.

To effectively illustrate the typical kill chain of Fog ransomware, this blog focuses on customer environments that did not have Darktrace’s Autonomous Response enabled. In these cases, the attack progressed unchecked and reached its intended objectives until the customer received Darktrace’s alerts and intervened.

Darktrace’s Coverage of Fog Ransomware

Initial Intrusion

After actors had successfully gained initial access into customer networks by exploiting compromised VPN credentials, Darktrace observed a series of suspicious activities, including file shares, enumeration and extensive scanning. In one case, a compromised domain controller was detected making outgoing NTLM authentication attempts to another internal device, which was subsequently used to establish RDP connections to a Windows server running Hyper-V.

Given that the source was a domain controller, the attacker could potentially relay the NTLM hash to obtain a domain admin Kerberos Ticket Granting Ticket (TGT). Additionally, incoming NTLM authentication attempts could be triggered by tools like Responder, and NTLM hashes used to encrypt challenge response authentication could be abused by offline brute-force attacks.

Darktrace also observed the use of a new administrative credential on one affected device, indicating that malicious actors were likely using compromised privileged credentials to conduct relay attacks.

Establish Command-and-Control Communication (C2)

In many instances of Fog ransomware investigated by Darktrace’s Threat Research team, devices were observed making regular connections to the remote access tool AnyDesk. This was exemplified by consistent communication with the endpoint “download[.]anydesk[.]com” via the URI “/AnyDesk.exe”. In other cases, Darktrace identified the use of another remote management tool, namely SplashTop, on customer servers.

In ransomware attacks, threat actors often use such legitimate remote access tools to establish command-and-control (C2) communication. The use of such services not only complicates the identification of malicious activities but also enables attackers to leverage existing infrastructure, rather than having to implement their own.

Internal Reconnaissance

Affected devices were subsequently observed making an unusual number of failed internal connections to other internal locations over ports such as 80 (HTTP), 3389 (RDP), 139 (NetBIOS) and 445 (SMB). This pattern of activity strongly indicated reconnaissance scanning behavior within affected networks. A further investigation into these HTTP connections revealed the URIs “/nice ports”/Trinity.txt.bak”, commonly associated with the use of the Nmap attack and reconnaissance tool.

Simultaneously, some devices were observed engaging in SMB actions targeting the IPC$ share and the named pipe “srvsvc” on internal devices. Such activity aligns with the typical SMB enumeration tactics, whereby attackers query the list of services running on a remote host using a NULL session, a method often employed to gather information on network resources and vulnerabilities.

Lateral Movement

As attackers attempted to move laterally through affected networks, Darktrace observed suspicious RDP activity between infected devices. Multiple RDP connections were established to new clients, using devices as pivots to propagate deeper into the networks, Following this, devices on multiple networks exhibited a high volume of SMB read and write activity, with internal share drive file names being appended with the “.flocked” extension – a clear sign of ransomware encryption. Around the same time, multiple “readme.txt” files were detected being distributed across affected networks, which were later identified as ransom notes.

Further analysis of the ransom note revealed that it contained an introduction to the Fog ransomware group, a summary of the encryption activity that had been carried out, and detailed instructions on how to communicate with the attackers and pay the ransom.

Packet capture (PCAP) of the ransom note file titled “readme.txt”.
Figure 1: Packet capture (PCAP) of the ransom note file titled “readme.txt”.

Data Exfiltration

In one of the cases of Fog ransomware, Darktrace’s Threat Research team observed potential data exfiltration involving the transfer of internal files to an unusual endpoint associated with the MEGA file storage service, “gfs302n515[.]userstorage[.]mega[.]co[.]nz”.

This exfiltration attempt suggests the use of double extortion tactics, where threat actors not only encrypt victim’s data but also exfiltrate it to threaten public exposure unless a ransom is paid. This often increases pressure on organizations as they face the risk of both data loss and reputational damage caused by the release of sensitive information.

Darktrace’s Cyber AI Analyst autonomously investigated what initially appeared to be unrelated events, linking them together to build a full picture of the Fog ransomware attack for customers’ security teams. Specifically, on affected networks Cyber AI Analyst identified and correlated unusual scanning activities, SMB writes, and file appendages that ultimately suggested file encryption.

Cyber AI Analyst’s analysis of encryption activity on one customer network.
Figure 2: Cyber AI Analyst’s analysis of encryption activity on one customer network.
Figure 3: Cyber AI Analysts breakdown of the investigation process between the linked incident events on one customer network.

Conclusion

As novel and fast-moving ransomware variants like Fog persist across the threat landscape, the time taken for from initial compromise to encryption has significantly decreased due to the enhanced skill craft and advanced malware of threat actors. This trend particularly impacts organizations in the education sector, who often have less robust cyber defenses and significant periods of time during which infrastructure is left unmanned, and are therefore more vulnerable to quick-profit attacks.

Traditional security methods may fall short against these sophisticated attacks, where stealthy actors evade detection by human-managed teams and tools. In these scenarios Darktrace’s AI-driven product suite is able to quickly detect and respond to the initial signs of compromise through autonomous analysis of any unusual emerging activity.

When Darktrace’s Autonomous Response capability was active, it swiftly mitigated emerging Fog ransomware threats by quarantining devices exhibiting malicious behavior to contain the attack and blocking the exfiltration of sensitive data, thus preventing customers from falling victim to double extortion attempts.

Credit to Qing Hong Kwa (Senior Cyber Analyst and Deputy Analyst Team Lead, Singapore) and Ryan Traill (Threat Content Lead

Appendices

Darktrace Model Detections:

– Anomalous Server Activity::Anomalous External Activity from Critical Network Device

– Anomalous Connection::SMB Enumeration

– Anomalous Connection::Suspicious Read Write Ratio and Unusual SMB

– Anomalous Connection::Uncommon 1 GiB Outbound

– Anomalous File::Internal::Additional Extension Appended to SMB File

– Compliance::Possible Cleartext LDAP Authentication

– Compliance::Remote Management Tool On Server

– Compliance::SMB Drive Write

– Compromise::Ransomware::SMB Reads then Writes with Additional Extensions

– Compromise::Ransomware::Possible Ransom Note Write

– Compromise::Ransomware::Ransom or Offensive Words Written to SMB

– Device::Attack and Recon Tools

– User::New Admin Credentials on Client

– Unusual Activity::Anomalous SMB Move & Write

– Unusual Activity::Internal Data Transfer

– Unusual Activity::Unusual External Data Transfer

– Unusual Activity::Enhanced Unusual External Data Transfer

Darktrace Model Detections:

– Antigena::Network::External Threat::Antigena Suspicious File Block

– Antigena::Network::External Threat::Antigena Suspicious File Pattern of Life Block

– Antigena::Network::External Threat::Antigena File then New Outbound Block

– Antigena::Network::External Threat::Antigena Ransomware Block

– Antigena::Network::External Threat::Antigena Suspicious Activity Block

– Antigena::Network::Significant Anomaly::Antigena Controlled and Model Breach

– Antigena::Network::Significant Anomaly::Antigena Enhanced Monitoring from Server Block

– Antigena::Network::Significant Anomaly::Antigena Breaches Over Time Block

– Antigena::Network::Significant Anomaly::Antigena Significant Server Anomaly Block

– Antigena::Network::Insider Threat::Antigena Internal Data Transfer Block

– Antigena::Network::Insider Threat::Antigena Large Data Volume Outbound Block

– Antigena::Network::Insider Threat::Antigena SMB Enumeration Block

AI Analyst Incident Coverage

– Encryption of Files over SMB

– Scanning of Multiple Devices

– SMB Writes of Suspicious Files

MITRE ATT&CK Mapping

(Technique Name) – (Tactic) – (ID) – (Sub-Technique of)

Data Obfuscation – COMMAND AND CONTROL – T1001

Remote System Discovery – DISCOVERY – T1018

SMB/Windows Admin Shares – LATERAL MOVEMENT – T1021.002 – T1021

Rename System Utilities – DEFENSE EVASION – T1036.003 – T1036

Network Sniffing – CREDENTIAL ACCESS, DISCOVERY – T1040

Exfiltration Over C2 Channel – EXFILTRATION – T1041

Data Staged – COLLECTION – T1074

Valid Accounts – DEFENSE EVASION, PERSISTENCE, PRIVILEGE ESCALATION, INITIAL ACCESS – T1078

Taint Shared Content – LATERAL MOVEMENT – T1080

File and Directory Discovery – DISCOVERY – T1083

Email Collection – COLLECTION – T1114

Automated Collection – COLLECTION – T1119

Network Share Discovery – DISCOVERY – T1135

Exploit Public-Facing Application – INITIAL ACCESS – T1190

Hardware Additions – INITIAL ACCESS – T1200

Remote Access Software – COMMAND AND CONTROL – T1219

Data Encrypted for Impact – IMPACT – T1486

Pass the Hash – DEFENSE EVASION, LATERAL MOVEMENT – T1550.002 – T1550

Exfiltration to Cloud Storage – EXFILTRATION – T1567.002 – T1567

Lateral Tool Transfer – LATERAL MOVEMENT – T1570

List of Indicators of Compromise (IoCs)

IoC – Type – Description

/AnyDesk.exe – Executable File – Remote Access Management Tool

gfs302n515[.]userstorage[.]mega[.]co[.]nz- Domain – Exfiltration Domain

*.flocked – Filename Extension – Fog Ransomware Extension

readme.txt – Text File – Fog Ransom Note

xql562evsy7njcsngacphcerzjfecwotdkobn3m4uxu2gtqh26newid[.]onion – Onion Domain – Threat Actor’s Communication Channel

References

[1] https://arcticwolf.com/resources/blog/lost-in-the-fog-a-new-ransomware-threat/

[2] https://intel471.com/blog/assessing-the-disruptions-of-ransomware-gangs

[3] https://www.pcrisk.com/removal-guides/30167-fog-ransomware

Source: Original Post