Ransomware hackers demand victims justify their jobs, or pay up

This new ransomware attack is asking victims to list five bullet points from their working week, like Musk did recently.

Apr 23, 2025 - 11:57
 0
Ransomware hackers demand victims justify their jobs, or pay up

  • New FOG ransomware is asking victims to justify their jobs
  • FOG has been responsible for 173 attacks since June 2024
  • The payload is initially delivered by email/phishing

A new ransomware attack appears to be channelling Elon Musk’s energy by demanding that workers share a recap of their weekly accomplishments, much like the Tesla CEO has demanded as part of his DOGE efforts.

The note references Musk’s controversial ‘five bullet points’ memo, asking victims to justify their jobs or cough up $1 trillion.

The original Musk policy was issued under Trump’s administration, and intended to drive accountability in federal departments. It quickly faced backlash and later became optional, however it’s now fuelling the latest round of scams according to a new Trend Micro report.

FOG ransomware inspired by Musk’s push for accountability

TrendMicro found nine ransomware samples between March 27 and April 2, which it has attributed to FOG Ransomware.

They “dropped a note containing key names related to the Department of Government Efficiency (DOGE),” says the report, which highlights DOGE’s position in the headlines.

The report cites recent Reuters reporting disclosing a DOGE technologist had previously been involved in providing support to a cybercrime gang linked to trafficking stolen data and cyberstalking an FBI agent.

FOG ransomware has been tied to 173 counts of ransomware activity since June 2024, and 53 in February 2025 alone. Individuals and organizations from the technology, education, manufacturing and transportation sectors are mostly at risk.

In the case of the current DOGE-inspired attack, malware is delivered via email or a phishing attempt using a ZIP file named ‘Pay Adjustment’, which contains a LNK file disguised as a PDF. Clicking the file runs a PowerShell script which retrieves ransomware payloads and plays political YouTube videos.

Although there are basic cybersecurity hygiene steps users can take to prevent attacks, such as not clicking on suspicious links, social engineering continues to be othe most exploited attack vector and humans are the weakest point of any company’s cybersecurity strategy, which is why Trend Micro is also recommending companies to monitor indicators of compromise.

You might also like