- New FOG ransomware is asking victims to justify their jobs
- FOG has been responsible for 173 attacks since June 2024
- The payload is initially delivered by email/phishing
A new ransomware attack appears to be channelling Elon Musk’s energy by demanding that workers share a recap of their weekly accomplishments, much like the Tesla CEO has demanded as part of his DOGE efforts.
The note references Musk’s controversial ‘five bullet points’ memo, asking victims to justify their jobs or cough up $1 trillion.
The original Musk policy was issued under Trump’s administration, and intended to drive accountability in federal departments. It quickly faced backlash and later became optional, however it’s now fuelling the latest round of scams according to a new Trend Micro report.
FOG ransomware inspired by Musk’s push for accountability
TrendMicro found nine ransomware samples between March 27 and April 2, which it has attributed to FOG Ransomware.
They “dropped a note containing key names related to the Department of Government Efficiency (DOGE),” says the report, which highlights DOGE’s position in the headlines.
The report cites recent Reuters reporting disclosing a DOGE technologist had previously been involved in providing support to a cybercrime gang linked to trafficking stolen data and cyberstalking an FBI agent.
FOG ransomware has been tied to 173 counts of ransomware activity since June 2024, and 53 in February 2025 alone. Individuals and organizations from the technology, education, manufacturing and transportation sectors are mostly at risk.
In the case of the current DOGE-inspired attack, malware is delivered via email or a phishing attempt using a ZIP file named ‘Pay Adjustment’, which contains a LNK file disguised as a PDF. Clicking the file runs a PowerShell script which retrieves ransomware payloads and plays political YouTube videos.
Although there are basic cybersecurity hygiene steps users can take to prevent attacks, such as not clicking on suspicious links, social engineering continues to be othe most exploited attack vector and humans are the weakest point of any company’s cybersecurity strategy, which is why Trend Micro is also recommending companies to monitor indicators of compromise.
You might also like
- These are the best endpoint protection systems
- Check out the best malware removal tools around
- Fake PDF converters are spreading malware to steal user information and worse – here’s how to stay secure
This articles is written by : Nermeen Nabil Khear Abdelmalak
All rights reserved to : USAGOLDMIES . www.usagoldmines.com
You can Enjoy surfing our website categories and read more content in many fields you may like .
Why USAGoldMines ?
USAGoldMines is a comprehensive website offering the latest in financial, crypto, and technical news. With specialized sections for each category, it provides readers with up-to-date market insights, investment trends, and technological advancements, making it a valuable resource for investors and enthusiasts in the fast-paced financial world.