Fog Ransomware

Experiencing Ransomware or Cyber Breach?

Response time is everything when you're under attack. If you've been breached or have an urgent matter, contact us immediately.

Emerging in early 2024, Fog has quickly established itself as a disruptive ransomware group, targeting organisations with advanced encryption techniques and aggressive extortion tactics.

An infection with Fog, like any ransomware, results in your systems being locked and your data encrypted. Victims are then presented with a ransom demand, often in cryptocurrency, to restore access and prevent stolen data from being leaked online.

Why you must not interfere with your ransomware environment

If you discover a physical break-in at your offices, your first instinct would be to call the police; touch nothing and let them search for clues to find the perpetrator. Then, your attention would turn towards getting your business operations back up and running.

A cyber-attack requires the same approach. Your digital environment is a CRIME SCENE. It is crucial to leave the environment untouched to allow for a forensic investigation.

This is not a task for your IT team or MSP. Digital Forensic specialists available 24/7 to assist you, just like in a physical crime.

Fog ScreenA PC Monitor

If you discover a message on your system, similar to the one above - you have likely suffered a Fog attack.

YOU MUST NOT ATTEMPT TO TOUCH, RESTORE OR OVERWRITE THE DATA

Who is Fog? What does it do?

First detected in early 2024, Fog is a highly organised ransomware operation that primarily focuses on large enterprises and critical infrastructure. While little is known about its origins, cybersecurity analysts have identified similarities between Fog and previous sophisticated ransomware groups, suggesting potential ties to experienced cybercriminal networks.

Fog primarily targets Windows and Linux environments, exploiting vulnerabilities in remote desktop protocol (RDP), phishing emails, and software supply chains to gain access to victim networks. Once inside, the ransomware encrypts files and exfiltrates sensitive data, using double extortion tactics to pressure victims into paying the ransom.

UK Data 2025

How Does Fog Attack?

Fog follows the double extortion model, meaning that in addition to encrypting data, it also steals sensitive information. This forces victims to pay not only for file decryption but also to prevent the public release of their stolen data.

After infiltrating a system, Fog encrypts critical files and disables security protections, making recovery challenging. A ransom note is then displayed, demanding payment in cryptocurrency to restore access and avoid data exposure. Reports indicate that Fog has also used distributed denial-of-service (DDoS) attacks against victims who refuse to comply, adding another layer of pressure.

Due to its rapid rise and aggressive attack strategies, Fog is considered a serious threat in the cybersecurity landscape. Experts are closely monitoring its activities and advising organisations to strengthen their defences against this evolving ransomware operation.

How old is Fog and how many attacks have there been?

Emerging in early 2024, Fog is a relatively new ransomware group but has already made a significant impact. Within its first few months, Fog has been linked to multiple high-profile attacks, affecting businesses in sectors such as finance, healthcare, and government.

The confirmed number of victims has yet to be established.

Most Recent Fog Attacks
TitleAvailableLast visitfqdnScreenshots
BlogYes2025-03-19 10:03:46.405970http://xbkv2qey6u3gd3qxcojynrt4h5sgrhkar6whuo74wo63hijnn677jnyd.onion/posts
BlogYes2025-03-19 10:02:45.180549http://xbkv2qey6u3gd3qxcojynrt4h5sgrhkar6whuo74wo63hijnn677jnyd.onion
FOGYes2025-03-19 10:01:42.838439http://xql562evsy7njcsngacphc2erzjfecwotdkobn3m4uxu2gtqh26newid.onion

Solace Cyber’s track record includes hundreds of successful response recoveries, providing Digital Forensic Incident Response services, 24x7x365.

“The average annual cost of cybercrime for UK businesses is estimated at approximately £15,300 per victim.”

Read more...

Post Breach Actions

Your NCSC-approved supplier is a specialist Crime Scene Investigator who helps you get back to full operation faster. They will:
  • Isolate and preserve your environment for forensic investigation.
  • Identify where the data has been duplicated and issue a legal takedown order.
  • Identify your data, application and systems restore points. These might be at different points in time and will need to be carefully restored and reconstructed in a pristine environment.
  • Liaise with your business insurance company and if needed, with the Police.
  • Advise you on notifying your customers of your situation.
  • Rebuild your systems, restore your data and get you back to full operation.
Note: This process can take between 2 weeks – 2 months.

Ransom Groups Stats by Industry

Critical infrastructure ransomware attacks 2021 bar chart

Who is Solace Cyber and what experience do they have in recovering from Fog ransomware attacks?

Solace Global was founded in 2010 as global experts in risk management and security, offering services such as Travel, Crisis, and Offshore Risk Management. With a 24/7 Security Operations Centre and an in-house intelligence team providing daily and weekly reports, Solace Global is accredited to ISO 27001, 14001, 45001, and 9001 standards.

Solace Cyber was established in 2021, specialising in Cyber breaches, particularly Digital Forensics and Incident Response, Ransomware, Risk Management, and Information Security, along with Managed Security Services. The leadership team collectively possess over 20 years of experience in the IT and security industry.

Solace Cyber is accredited to ISO 27001 and in 2022 gained the prestigious Cyber Incident Response (Level 2) accreditation with the National Cyber Security Centre in 2022. This accreditation represents the UK’s highest cyber security standards, providing top-tier incident response support and recovery.

Solace Cyber Stats

s

Successful breach recoveries

Users recovered in largest ransomware case
We have NEVER paid a ransom
Designed automation tools to reduce costs

%+

Incident Response
delivered via our Insurance
Partners

Experiencing Ransomware or Cyber Breach?

Response time is everything when you're under attack. If you've been breached or have an urgent matter, contact us immediately.

Why should I trust Solace Cyber to do this work rather than my IT team?

A forensic analysis needs to be meticulous and a clean restore and recovery requires a wealth of experience not normally available in an in-house team who must provide a broader range of IT support skills:

  • Internal IT teams don’t have the necessary skill set to resolve security encryption issues themselves.
  • Internal teams are pressured to restore business operations and may recover before forensic analysis even begins, potentially destroying the crime scene before completion.
  • IT teams may recover to the same position with indicators of compromise ready to do it again…. which can lead to another breach.
  • In 2022, there were not enough adequately qualified people in the job market to meet the CSIRT* resource requirements.
  • Cybercrime has stepped up again in 2024.
Happy customer service worker
IT Support

Solace Cyber was established precisely for this scenario. We have a well-defined process for handling cyber-attacks like Fog, which involves a 6-step approach:

  1. Triage
  2. Analysis
  3. Contain and Mitigate
  4. Remediate and Eradicate
  5. Recover
  6. Post-Incident Examination

It includes a thorough digital forensic analysis from step 2 where the output becomes a central component of business recovery. This is because understanding the attack is of critical importance:

  • Informing an initial infection date
  • The extent and spread of infection
  • Data exfiltration having an impact on regulatory positions
  • Ensuring that the attacker and any tooling or artefacts they leave behind are eradicated

It is critical that the analysis of digital evidence is carried out to an agreed plan. This will have been designed to provide the best and earliest chance of discovering a root cause, which is essential to inform remediation/eradication and recovery as well as supporting a legal take-down case if this is applicable. A legal take-down means we can assist in the legal enforcement that stops the criminals from publishing the data, thus undermining the ransom notice.

Solace’s Digital Forensic and Incident Response teams maintain consistent communication throughout. Dedicated Incident Managers and technical engineering leads provide updates during the Cyber Incident Response journey, utilising risk registers and working within change management processes, all from triage through to post-incident, delivering successful business recovery.

Key Take Aways

  • You will not be able to access your systems or data.
  • It is advised to disconnect from the internet and shut down your systems, including PCs, to prevent further infections.
  • Your Office 365 system might also be compromised, allowing the attackers to monitor your responses. Avoid communicating with individuals through your primary email or team systems.
  • Threat actors typically infiltrate your system at least 2-4 weeks before you become aware of the attack. Your data will have already been exfiltrated. If your system is encrypted, this was not an overnight event.
  • Ransom demands can range from £0.5 million to £3 million.
  • Paying the ransom may violate financial sanctions, which is a criminal offence and could result in a custodial sentence or further financial penalties.
  • If your data is sold or published online, it puts your customers and staff at risk, potentially implicating you in a Data Protection breach.
  • You will need to submit a data takedown request to the initial location where the data was transferred.
  • Do not overwrite the encrypted data. It is crucial to determine when the infection began and where the data was sent.
  • Avoid rebuilding from the latest backup, as it is likely to be infected.
How do I maintain security in future to prevent a further ransomware attack?

Solace Cyber's assistance extends beyond the recovery phase. Following the restoration of your business operations, we collaborate with you to enhance your cybersecurity posture using a threat-informed methodology. This involves leveraging our Cyber 9 Step Process, designed to comprehensively address cyber threats and vulnerabilities.

Frequently asked questions

Yes, Fog is a ransomware group that encrypts files and demands payment from victims. It also engages in double extortion by threatening to leak stolen data if the ransom is not paid.

The Fog ransomware entered your system by one of several ways:

  • Phishing Emails
  • RDP Exploits
  • Compromised Software Updates

We recommend you adopt policies to:

  1. Educate your staff on the importance of cyber security and the risks of not complying
  2. Use strong passwords
  3. Multi-factor authentication
  4. Remove old users
  5. Perform regular backups
  6. Deploy timely updates to software and systems

After recovering from Fog, Solace Cyber recommends that you update your business continuity plan to account for lessons learnt during this attack & recovery.

Most ransomware breaches cost approximately £500K, while smaller email data breaches typically cost around £50K. There is a critical balance between preserving the environment for forensic analysis and quickly recovering it to minimise business interruption. The costs increase the longer it takes to identify and resolve the breach.

A cyber security insurance claim is complex, covering reasonable expenses for investigating and remediating an incident, along with legal fees, business interruption, criminal liability, employment liability, and ransom payments. Although the insurance industry is responsible for facilitating business recovery, cyber insurance is viewed as volatile, and many policies are not being validated correctly.

Finding your way through demands expertise, and that's where Solace Cyber can offer assistance.

Facing genuine pressure, there's a crucial decision to make - one that could rescue your organisation from weeks of operational standstill, reputation damage, and client data loss. Yet, the probability of a favourable outcome remains slim, emphasising the importance of engaging a specialised ransomware incident response team. They are your most viable recourse for navigating a ransomware incident.

The NCSC have documented the deliberations for paying ransomware: https://www.ncsc.gov.uk/ransomware/home

Important Reminder: It is a criminal offense to pay money to people who are subject to financial sanctions. The list of who is subject to financial sanctions is constantly changing.

The latest iteration can be found here: https://www.gov.uk/government/publications/financial-sanctions-consolidated-list-of-targets

Yes. There's a possibility that some of the lost data falls under the category of "Personal Data" belonging to your customers. It's your legal responsibility to safeguard this data, even if it has been lost. Additionally, you may need to notify the Information Commissioner's Office (ICO) at https://ico.org.uk/.

Your insurer or legal counsel will provide guidance on the necessary steps and how to move forward in this situation. Solace has experience collaborating with insurers and legal professionals and can offer support in managing this relationship during this challenging period.

A ransomware attack presents the most significant threat to your business by:

  • Disabling your access to systems, which could hinder machinery operation or impede progress through your business processes.
  • Blocking access to critical data concerning suppliers, shipments, customers, orders, or steps in your business workflow.

In the event of a business interruption, determining your position in the supply chain for any item and sustaining operations become challenges. If the disruption persists, maintaining business continuity becomes paramount. Moreover, upon restoration of systems and data, addressing any backlog of work and establishing operational protocols for the future becomes essential.
Ransomware ranks only behind receivership in terms of its capacity to incapacitate a business.

The NCSC is the UK National Cyber Security Centre. They provide cyber security guidance and support, helping to make the UK the safest place to live and work online. They have defined a Cyber Incident Response procedure and they have approved and accredited suppliers to provide this service.

https://www.ncsc.gov.uk/

As a recognised Assured Service Provider by the National Cyber Security Centre (NCSC), Solace Cyber provide comprehensive cyber risk management services that are designed to Protect, Detect & Mitigate cyber security threats across the UK.

Action Fraud is the UK's national reporting centre for fraud and cybercrime. Whether you have been scammed, defrauded, or experienced cybercrime in England, Wales, or Northern Ireland, Action Fraud offers a central point of contact for information on fraud and financially motivated cybercrime.

https://www.actionfraud.police.uk/

Contact Us

Under Attack?

In the event of a Fog Ransom attack on your systems, STAY CALM.

DO NOT INTERACT WITH THEM, ATTEMPT TO RESTORE, OR OVERWRITE ANY DATA (explanation above).

Reach out to Solace Cyber at 01202 308818 or complete our form for a callback from one of our specialists.

We'll respond promptly to minimize your business's downtime.

Request a callback

Solace Cyber, part of Solace Global, helps companies across the UK recover from ransomware attacks and data breaches.

Risk
Offshore
Cyber
Intelligence & Reports
Case Studies

SOLACE GLOBAL CYBER LTD is registered in England & Wales no. 08830710

Incident Response Winner 2025

Solace Global

Twin Sails House,
W Quay Rd,
Poole, BH15 1JF
United Kingdom

Telephone

Please note that calls may be recorded for security and training purposes.