Site icon WinCert

FARGO ransomware targets vulnerable SQL Servers

<p>According to the latest report from ASEC &lpar;AhnlLab Security Emergency Response Center&rpar;&comma; new ransomware is in distribution that targets vulnerable Microsoft SQL servers&period;<&sol;p>&NewLine;<p><img class&equals;"alignnone size-full wp-image-4770" src&equals;"https&colon;&sol;&sol;www&period;wincert&period;net&sol;wp-content&sol;uploads&sol;2022&sol;09&sol;database-g71a42639b&lowbar;640&period;jpg" alt&equals;"" width&equals;"640" height&equals;"213" &sol;><&sol;p>&NewLine;<p>FARGO ransomware variant is not completely new as it was already used in the past and was named Mallox since it was using the &period;mallox file extension&period;<&sol;p>&NewLine;<p>Considering that Microsoft SQL servers are used for relational database management and therefore are storing and retrieving data for many software applications and internet services&comma; issues with SQL can present a huge problem for corporations&period;<&sol;p>&NewLine;<p>SQL servers can get infected when the MS-SQL process downloads a &period;NET file using a command prompt or PowerShell&period; Afterward&comma; the infected file additionally downloads and loads malware that usually stops specific processes and services&period;<&sol;p>&NewLine;<p><em>&OpenCurlyDoubleQuote;The ransomware’s behavior begins by being injected into AppLaunch&period;exe&comma; a normal Windows program&period; It attempts to delete a registry key on a certain path&comma; and executes the recovery deactivation command&comma; and closes certain processes&period;”&comma;<&sol;em> ASEC explained&period;<&sol;p>&NewLine;<p>The ASEC researchers also said that FARGO encrypts files but not all of them&comma; leaving the system partly accessible&period;<&sol;p>&NewLine;<p>Cybercriminals rename encrypted files using the &period;Fargo3 extension with the ransom note generated in the folder with the name &&num;8220&semi;RECOVERY FILES&period;txt&&num;8221&semi;&period; In the recovery message&comma; a victim can see threats of their files being permanently deleted or published in the public domain if they refuse to pay the ransom or try to use third-party software to decrypt files&period;<&sol;p>&NewLine;

Exit mobile version