SecurNerd
    What's Hot

    Google just launched a new AI and has already admitted at least one demo wasn’t real

    December 8, 2023

    BLUFFS Bluetooth Vulnerabilities Open Door to Adversary-in-the-Middle Threats

    December 5, 2023

    Qilin Ransomware’s Latest Variant Targets VMware ESXi Servers with Advanced Linux Encryptor

    December 4, 2023
    Facebook Twitter Instagram
    Facebook Twitter Instagram
    SecurNerd
    • Home
    • AI
    • General News
    • Science
    • Tech
    • Contact Us
    • More
      • About US
      • Disclaimer
      • Privacy Policy
      • Terms and Conditions
    SecurNerd
    Home»Cybersecurity»Mallox Ransomware Exploits Weak MS-SQL Servers to Breach Networks
    Cybersecurity

    Mallox Ransomware Exploits Weak MS-SQL Servers to Breach Networks

    securnerdBy securnerdJuly 23, 2023Updated:July 23, 202313 Mins Read111 Views
    Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp Reddit Email
    Mallox Ransomware
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Newly-discovered ransomware, known as Mallox, (alternatively named TargetCompany, FARGO, and Tohnichi), is launching an aggressive campaign against Microsoft SQL (MS-SQL) servers.

    First appearing in June 2021, this specific strain of ransomware is particularly worrisome due to its focus on exploiting unsecured MS-SQL servers, giving it the potential to cause widespread network breaches.

    Unit 42 security researchers, who recently identified the Mallox ransomware, reported an alarming 174% spike in incidents involving Mallox targeting MS-SQL servers, utilizing brute force attacks, data theft, and network scanners for distribution.

    The Mallox Ransomware Modus Operandi

    The perpetrators of the Mallox ransomware adopt a two-pronged strategy, engaging in both data encryption and theft, thereby applying considerable pressure on victims to pay the demanded ransom.

    The Mallox group strategically displays stolen data, complete with redacted names and logos, while providing private keys for negotiations and payment processes.

    While the Mallox group claims to have ensnared hundreds of victims, data from Unit 42 suggests that several dozen victims from a broad range of industries, including manufacturing, professional services, legal services, wholesale, and retail have been affected. Mallox activities have seen an unprecedented surge in 2023, with a staggering 174% increase in attacks compared to late 2022.

    The group’s approach for initial access remains consistent: it targets unsecured MS-SQL servers via dictionary brute force attacks, followed by the use of command line and PowerShell to download the ransomware payload.

    Execution of Mallox

    Before successful encryption, the ransomware payload makes multiple attempts to take over the system. These attempts include:

    • Stopping and removing SQL-related services using sc.exe and net.exe.
    • Deleting volume shadows to limit file restoration post-encryption.
    • Wiping logs with Microsoft’s wevtutil command line utility to evade detection and forensic analysis.
    • Using takeown.exe to change file permissions and restrict access to critical system processes.
    • Inhibiting manual System Image Recovery with bcdedit.exe.
    • Utilizing taskkill.exe to terminate security processes and evade security solutions.
    • Altering the registry key to circumvent Raccine anti-ransomware.

    The Ransom Note

    Upon successful infection, the ransomware leaves a ransom note in every directory on the victim’s drive. The note elucidates the nature of the infection and provides contact details for further proceedings.

    Despite Mallox’s currently limited size and closed group, the team is actively seeking to expand by recruiting affiliates to further its illegal activities. If successful, Mallox could significantly broaden its sphere of influence, putting more organizations at risk.

    Unit 42 advises robust configuration and timely patching of all internet-facing applications and systems as a crucial line of defense. This can significantly minimize the attack surface, thus limiting the opportunities for potential attackers.

    Featured Ransomware
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    securnerd
    • Website
    • Facebook
    • Twitter
    • Instagram

    We're your premier source for the latest in AI, cybersecurity, science, and technology. Dedicated to providing clear, thorough, and accurate information, our team brings you insights into the innovations that shape tomorrow. Let's navigate the future together."

    Related Posts

    Google just launched a new AI and has already admitted at least one demo wasn’t real

    December 8, 2023

    BLUFFS Bluetooth Vulnerabilities Open Door to Adversary-in-the-Middle Threats

    December 5, 2023

    Qilin Ransomware’s Latest Variant Targets VMware ESXi Servers with Advanced Linux Encryptor

    December 4, 2023
    View 1 Comment

    1 Comment

    1. Pingback: IBM Report Reveals Data Breach Costs Surge to $4.45 Million in 2023 – SecurNerd

    Leave A Reply Cancel Reply

    Top Posts

    Apple Takes Stand Against U.K. Surveillance Proposals, Considers Withdrawal of iMessage and FaceTime Services

    July 22, 20232,637 Views

    Apple’s Market Value Skyrockets by $71 Billion Amid Speculation of In-house ‘Apple GPT’ to Challenge OpenAI

    July 23, 2023894 Views

    Android Malware Developers Utilize Stealthy APK Compression to Bypass Detection Measures

    August 20, 2023810 Views

    Apple Store Blocks Twitter’s iOS App Rebranding to ‘X’ Due to Minimum Character Regulations

    July 29, 2023760 Views
    Don't Miss
    2 Mins Read

    Google just launched a new AI and has already admitted at least one demo wasn’t real

    By securnerdDecember 8, 2023

    Google recently unveiled Gemini, its latest suite of powerful AI models, but the tech giant…

    BLUFFS Bluetooth Vulnerabilities Open Door to Adversary-in-the-Middle Threats

    December 5, 2023

    Qilin Ransomware’s Latest Variant Targets VMware ESXi Servers with Advanced Linux Encryptor

    December 4, 2023

    Zyxel Addresses 15 Security Vulnerabilities Across NAS, Firewall, and AP Devices with Latest Patches

    December 1, 2023
    Stay In Touch
    • Facebook
    • Twitter
    • Instagram
    • LinkedIn
    • Telegram
    About Us
    About Us

    We're your premier source for the latest in AI, cybersecurity, science, and technology. Dedicated to providing clear, thorough, and accurate information, our team brings you insights into the innovations that shape tomorrow. Let's navigate the future together."

    Latest

    Google just launched a new AI and has already admitted at least one demo wasn’t real

    December 8, 2023

    BLUFFS Bluetooth Vulnerabilities Open Door to Adversary-in-the-Middle Threats

    December 5, 2023

    Qilin Ransomware’s Latest Variant Targets VMware ESXi Servers with Advanced Linux Encryptor

    December 4, 2023
    Popular Post

    Microsoft’s Ongoing Struggles with Cybersecurity: A $2.4 Trillion Giant’s Failures

    September 23, 20231 Views

    Ukrainian Authorities Detect Russian Hacker Campaign Seeking Evidence of War Crimes

    September 25, 20231 Views

    Zyxel Addresses 15 Security Vulnerabilities Across NAS, Firewall, and AP Devices with Latest Patches

    December 1, 20231 Views

    Ethos Technologies Data Breach Settlement Offers Compensation of Up to $5,200 for Affected Individuals

    September 23, 20232 Views

    New Sophisticated and Modular ‘Deadglyph’ Malware Unleashed in Government Cyberattacks

    September 24, 20232 Views

    Nigerian Man Admits Guilt in $6 Million Business Email Compromise Scheme

    September 24, 20233 Views

    Microsoft Unveils Security Copilot Early Access Program, Revolutionizing Threat Response

    October 23, 20233 Views

    Meta Introduces Ad-Free Subscriptions in Europe, Adapting to Privacy Regulations

    October 31, 20234 Views

    Ukraine Enhances Wartime Efforts Through Advanced Cyber Intelligence Strategies

    August 10, 20235 Views

    Critical Security Flaws Exposed in Nagios XI Network Monitoring Software

    September 20, 20235 Views
    Facebook Twitter Instagram LinkedIn Telegram
    © 2023 SecurNerd. Powered by Codelivly.

    Type above and press Enter to search. Press Esc to cancel.