• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
second largest us school district falls to ransomware attack

FARGO ransomware targets vulnerable Microsoft SQL servers in new wave of attacks

You are here: Home / General Cyber Security News / FARGO ransomware targets vulnerable Microsoft SQL servers in new wave of attacks
September 26, 2022

Shutterstock

Microsoft SQL servers are succumbing to FARGO ransomware, security scientists at AhnLab Security Emergency Response Centre (ASEC) have warned.

Alongside GlobeImposter, FARGO has grow to be a single of the most widespread ransomware that targets susceptible MS-SQL servers, the business stated in a site article. Statistical knowledge from “ID Ransomware” attests to the burgeoning advancement.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


The pressure was formerly codenamed “Mallox” right after analysts discerned the ransomware included a “.mallox” extension to encrypted data files. Avast comprehensive the exact strain in a report in February, labelling the ransomware “TargetCompany”.  

Also, the cyber security company introduced a decryption utility to support TargetCompany ransomware victims get better their files for cost-free. On the other hand, the decryptor could only restore encrypted documents less than restricted instances.

Decoding lively exploits by FARGO ransomware, ASEC stated the pressure leads to a compromised machine to download a .NET file using cmd.exe and powershell.exe.

“The loaded malware generates and executes a BAT file which shuts down specific processes and products and services, in the %temp% directory,” additional the corporation.

Immediately after injecting by itself into AppLaunch.exe, the ransomware payload attempts to delete the registry critical for the open up-supply ransomware vaccine Raccine. But that’s not all. The malware deactivates databases procedures and executes a restoration deactivation command to unencrypt confidential knowledge.

“Administrators of MS-SQL servers ought to use passwords that are challenging to guess for their accounts and alter them periodically to secure the database server from brute drive attacks and dictionary attacks, and update to the most current patch to stop vulnerability attacks,” recommended ASEC.


Some parts of this report are sourced from:
www.itpro.co.uk

Previous Post: «blackcat ransomware attackers spotted fine tuning their malware arsenal BlackCat Ransomware Attackers Spotted Fine-Tuning Their Malware Arsenal
Next Post: 35 cyber startups join largest UK government-backed accelerator 35 cyber startups join largest uk government backed accelerator»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.