MetrolineDirect Faces Ransomware Breach by Fog Group

Incident Date: Nov 26, 2024

Attack Overview
VICTIM
Metroline
INDUSTRY
Transportation
LOCATION
USA
ATTACKER
Fog
FIRST REPORTED
November 26, 2024

Ransomware Attack on MetrolineDirect: A Closer Look at the Fog Group's Latest Target

MetrolineDirect, a prominent independent distributor of telecommunications equipment in the United States, has recently fallen victim to a ransomware attack allegedly orchestrated by the notorious Fog group. This incident highlights the growing threat posed by sophisticated cybercriminals targeting diverse sectors.

About MetrolineDirect

MetrolineDirect has carved out a niche as a leading distributor in the technology and telecommunications sector, with over 30 years of experience. The company operates a 60,000 square foot warehouse in southeastern Michigan, managing a diverse inventory of new and certified refurbished products. Known for its independence from major manufacturers, MetrolineDirect offers competitive pricing and warranties, earning accolades for customer service excellence. With an annual revenue of $8.4 million, the company is a significant player in its industry.

Attack Overview

The Fog ransomware group has claimed responsibility for the attack, reportedly exfiltrating 1.3GB of sensitive data from MetrolineDirect. The compromised information includes financial documents, employee health records, and critical files such as customer and employee contact details and insurance documents. This breach underscores the vulnerabilities that even well-established companies face in the current cyber threat landscape.

Fog Ransomware Group

Fog ransomware, also known as "Lost in the Fog," is a variant of the STOP/DJVU ransomware family. The group is notorious for its double extortion tactics, encrypting data and threatening to leak it on the dark web if ransoms are not paid. Fog typically gains access through compromised VPN credentials, weak RDP configurations, or phishing attacks. Once inside, they use tools like Cobalt Strike and Mimikatz to escalate privileges and move laterally across networks, encrypting files and exfiltrating data.

Potential Vulnerabilities

MetrolineDirect's reliance on technology and telecommunications infrastructure may have made it an attractive target for the Fog group. The company's extensive inventory management and customer service operations could have been vulnerable to exploitation through compromised credentials or phishing attacks. This incident serves as a stark reminder of the importance of cybersecurity measures in protecting sensitive data.

See Halcyon in action

Interested in getting a demo?
Fill out the form to meet with a Halcyon Anti-Ransomware Expert!

1
2
3
Let's get started
1
1
2
3
1
1
2
2
3
Back
Next
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.