ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

FoggyWeb is the Latest Malware to Wreak Havoc

FoggyWeb is the Latest Malware to Wreak Havoc

The attack on SolarWinds earlier this year caused a lot of challenges, and now that time has passed and the dust has settled somewhat, Microsoft has uncovered another type of malware associated with the attack. This one is called FoggyWeb. What does this threat do and what can we learn about it?

In April, researchers found that the SolarWinds attack was performed by the Russian Foreign Intelligence Service. Various modules were used by the attack group, a collective known as Nobelium. Nobelium includes various malware like GoldMax, GoldFinder, and Sibot. These are in addition to other malware previously discovered, including Sunburst/Solorigate, Teardrop, and Sunspot. The latest addition to this—FoggyWeb—is a malware that installs a backdoor on systems that have already been compromised.

Backdoors give hackers the ability to influence all kinds of aspects within your organization. They can use backdoors to access your network at any point in the future, provided the backdoor is not discovered; this backdoor can be used to install malware, access sensitive data, spy on a network, and so on. These are incredibly dangerous, especially over extended periods of time. Imagine how much damage they can do over the course of a year or longer.

FoggyWeb itself is used to steal credentials and configurations from compromised systems. These credentials give hackers the ability to access infrastructures long after the malware has been purged from the system, as they can simply use the credentials to control access and perform other tasks without being uncovered. FoggyWeb can also receive commands remotely, making it capable of pulling off even more dangerous antics.

The best way to protect your business is to keep a lookout for suspicious activity on your network, prioritize access controls, and deploy powerful enterprise-grade security solutions that are designed to mitigate the majority of threats on your network. If this sounds complicated, don’t worry—with us on your side, it’s anything but!

ClearView IT can provide your organization with the tools and services needed to make security a top priority. We can implement, maintain, and monitor your solutions to guarantee that your systems are as best protected as can be. To learn more, reach out to us at 866-326-7214.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 05 July 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Network Security Privacy Data Cloud Business User Tips IT Support Internet Hardware Innovation Email Hosted Solutions Malware Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Cybersecurity Business Management Phishing IT Services Backup Ransomware Data Backup Smartphone communications Microsoft Office Upgrade Smartphones Small Business Mobile Devices Network Data Recovery Communication Managed IT Services Productivity Quick Tips Social Media VoIP Users Mobile Device Tech Term Automation Facebook Business Continuity Windows 10 Disaster Recovery Passwords Covid-19 Holiday Managed Service IT Support Apps Browser Windows 10 Cloud Computing Outsourced IT Miscellaneous Internet of Things Remote Work Managed Service Provider Data Management Government Saving Money Operating System Workplace Strategy Artificial Intelligence Managed IT services Networking Gadgets Windows Business Technology Spam Mobile Device Management Blockchain WiFi Bandwidth Remote Server Encryption Information App Virtualization History Budget Two-factor Authentication Office 365 Apple Information Technology Employee/Employer Relationship Gmail Office Health Analytics Access Control Cybercrime Data Security Conferencing Big Data BDR Wi-Fi Employer-Employee Relationship IT Management Training Hacker Remote Computing Cost Management Compliance Patch Management Document Management Save Money Remote Monitoring Help Desk Voice over Internet Protocol Hacking Vendor Managed Services Retail Vulnerabilities BYOD Alert Computing Vendor Management Hiring/Firing Hard Drive Money Outlook Customer Service Password Unified Threat Management Firewall Data loss Augmented Reality Legal Word Data storage IBM Website Project Management Search... Mobile Office Best Practice Applications Free Resource Cleaning Mobility Meetings Robot Laptop Monitoring How To Google Maps Healthcare Scam User VPN Social Sports SaaS DDoS Twitter Update Chrome Law Enforcement End of Support iPhone Printer Education Cortana Content Filtering Paperless Office Antivirus Mobile Computing Maintenance Windows 11 Marketing Router Travel Running Cable Data Breach Virtual Reality Remote Workers Social Engineering Cryptocurrency The Internet of Things YouTube Black Market Websites Storage Windows 7 Virtual Private Network Vulnerability Wireless Technology Software as a Service Politics Current Events Data Protection Machine Learning eWaste Settings Multi-factor Authentication Solutions Solid State Drive Downtime Safety HIPAA Saving Time Images 101 Integration Display Virtual Desktop Chromebook Drones Computers Experience Bitcoin Automobile Tech Terms Telephone Employees Managed IT Avoiding Downtime Digital How To Holidays Microchip Flexibility Disaster Excel Taxes PowerPoint Cooperation Video Conferencing Administration Hack Lithium-ion battery Identity Theft Virtual Machines Presentation Notifications Unified Communications Computer Repair Specifications Virtual Assistant IT Consultant Physical Security Google Docs Processors Professional Services Bluetooth Customer Relationship Management Distributed Denial of Service Office Tips Co-Managed IT Start Menu Private Cloud Memory Processor Entertainment Downloads Managed Services Provider Computer Care Public Speaking Uninterrupted Power Supply Webcam Flash Navigation Google Apps Addiction email scam Streaming Media Telework Mobile Security Business Mangement Telephone Systems Scams Business Growth User Tip Smartwatch Legislation Communitications News Keyboard Microsoft 365 Tablets Hard Drives Evernote Network Management Procurement FinTech Google Calendar intranet Supercomputer Banking Cables Google Wallet Deep Learning Proxy Server CES Emails Wireless IT Assessment Virus Troubleshooting Fake News Shortcut Messenger Computing Infrastructure Heating/Cooling Value Environment Motion Sickness Service Level Agreement Supply Chain Management Management Windows XP Organization Comparison Device security Cyber security Google Drive Social Networking Business Metrics Point of Sale Hosted Solution Wireless Headphones Smart Devices Microsoft Excel Books Business Cards Corporate Profile Language Tech Shortcuts Society Going Green Remote Working Knowledge Error AI Television Trend Micro Telephony Employer Employee Relationship Monitors Bookmark Digital Security Cameras Visible Light Communication Electronic Health Records Business Owner Transportation Cabling Reading Piracy Wasting Time Tablet G Suite Term Be Proactive Windows 8 Download Mouse HTML eCommerce VoIP Modem Tracking Displays Browsers Videos Advertising Nanotechnology Staffing Surveillance Relocation Software License IP Address Managing Costs Web Server Work/Life Balance Google Play Workplace Strategies Tech Support Upload Social Network SharePoint SSID Digital Payment Data Analysis Media Screen Reader Development Inbound Marketing Employer/Employee Relationships Worker Mobile Technology Virtual Machine Access In Internet of Things Security Cameras Trends Network Congestion Customer Resource management Reviews Devices Optimization Time Management Public Cloud Hacks Reliable Computing Writing Fileless Malware 2FA Recovery Tip of the week Competition Teamwork Audit Electronic Payment Company Culture Hypervisor Spyware Smart Technology Gamification Data Storage Telephone System LiFi Shopping Regulations Entrepreneur Medical IT File Sharing Scalability Directions Paperless Backup and Disaster Recovery Documents Redundancy Application SQL Server Desktop Licensing Cache Phone System Administrator Business Intelligence Text Messaging Proactive IT Content PCI DSS Electronic Medical Records Gig Economy Accountants Humor Unified Threat Management Workers Bring Your Own Device Business Communications Database Securty Internet Service Provider Azure Regulations Compliance Printing Domains Managed IT Service CCTV Supply Chain Music Health IT Equifax Memes Touchscreen Computer Accessories Computer Malfunction Human Resources Tactics Net Neutrality Emergency Hard Drive Disposal Financial Data Vendor Mangement Botnet Workplace Username Micrsooft Risk Management Startup IT Freedom of Information Samsung Rental Service

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?