Ransomware hackers demand victims justify their jobs, or pay up
Date:
Wed, 23 Apr 2025 10:53:36 +0000
Description:
This new ransomware attack is asking victims to list five bullet points from their working week, like Musk did recently.
FULL STORY
A new ransomware attack appears to be channelling Elon Musks energy by demanding that workers share a recap of their weekly accomplishments, much
like the Tesla CEO has demanded as part of his DOGE efforts.
The note references Musks controversial five bullet points memo, asking
victims to justify their jobs or cough up $1 trillion.
The original Musk policy was issued under Trumps administration, and intended to drive accountability in federal departments. It quickly faced backlash and later became optional, however its now fuelling the latest round of scams according to a new Trend Micro report.
TrendMicro found nine ransomware samples between March 27 and April 2, which
it has attributed to FOG Ransomware.
They dropped a note containing key names related to the Department of Government Efficiency (DOGE), says the report, which highlights DOGEs
position in the headlines.
The report cites recent Reuters reporting disclosing a DOGE technologist had previously been involved in providing support to a cybercrime gang linked to trafficking stolen data and cyberstalking an FBI agent.
FOG ransomware has been tied to 173 counts of ransomware activity since June 2024, and 53 in February 2025 alone. Individuals and organizations from the technology, education, manufacturing and transportation sectors are mostly at risk.
In the case of the current DOGE-inspired attack, malware is delivered via
email or a phishing attempt using a ZIP file named Pay Adjustment, which contains a LNK file disguised as a PDF. Clicking the file runs a PowerShell script which retrieves ransomware payloads and plays political YouTube
videos.
Although there are basic cybersecurity hygiene steps users can take to
prevent attacks, such as not clicking on suspicious links, social engineering continues to be othe most exploited attack vector and humans are the weakest point of any companys cybersecurity strategy, which is why Trend Micro is
also recommending companies to monitor indicators of compromise.
======================================================================
Link to news story:
https://www.techradar.com/pro/security/ransomware-hackers-demand-victims-justi fy-their-jobs-or-pay-up
$$
--- SBBSecho 3.20-Linux
* Origin: capitolcityonline.net * Telnet/SSH:2022/HTTP (1:2320/105)