{"id":79449,"date":"2022-09-27T08:36:55","date_gmt":"2022-09-27T08:36:55","guid":{"rendered":"https:\/\/harchi90.com\/sql-server-admins-warned-to-watch-for-fargo-ransomware-the-register\/"},"modified":"2022-09-27T08:36:55","modified_gmt":"2022-09-27T08:36:55","slug":"sql-server-admins-warned-to-watch-for-fargo-ransomware-the-register","status":"publish","type":"post","link":"https:\/\/harchi90.com\/sql-server-admins-warned-to-watch-for-fargo-ransomware-the-register\/","title":{"rendered":"SQL Server admins warned to watch for Fargo ransomware \u2022 The Register"},"content":{"rendered":"
\n

Organizations are being warned about a wave of attacks targeting Microsoft SQL Server with ransomware known as Fargo, which encrypts files and threatens victims that their data may be published online if they do not pay up.<\/p>\n

The warning comes in a blog posting from analysts at the AhnLab Security Emergency Response Center (ASEC), which says that Fargo is one of the most prominent ransomware strains targeting vulnerable SQL Server instances, and was previously also known as Mallox because it used the file extension .mallox for encrypted files in an earlier wave of attacks.<\/p>\n

According to ASEC, a Fargo attack starts with the SQL Server process on a compromised machine being used to download a .net file via the cmd.exe and powershell.exe consoles. This payload fetches and runs additional malware code which generates and executes a BAT file that then shuts down some processes and services.<\/p>\n

\n