MS-SQL Servers Under Siege: Mallox Ransomware Deployed via Honeypot
Stellar Information Technology Pvt. Ltd.
Global Data Care Experts #1 in India since 1993
NEWS | 13 MAY 2024
A recent incident involving an MS-SQL (Microsoft SQL) honeypot has highlighted the sophisticated tactics employed by cyber-attackers using Mallox ransomware (also known as Fargo, TargetCompany, Mawahelper, etc.). The honeypot, set up by the Sekoia research team, was targeted by an intrusion set using brute-force techniques to deploy Mallox ransomware via PureCrypter, exploiting various MS-SQL vulnerabilities.
Attack Overview
The Sekoia research team deployed an MS-SQL honeypot to monitor potential cyber-attacks and gather intelligence on the methods used by attackers. Shortly after deployment, the honeypot was compromised through a brute-force attack targeting the “sa” (SQL Administrator) account. The account was compromised within an hour, demonstrating the attackers' persistence and determination.
Technical Analysis
The technical analysis of the Mallox ransomware attack on the MS-SQL honeypot revealed several sophisticated tactics and techniques employed by the attackers. Here is an in-depth look at the mechanisms used:
Initial Compromise
The attackers gained initial access to the MS-SQL server by targeting the “sa” account through a brute-force attack. This account, often the default administrative account in MS-SQL installations, is a common target due to its high level of privileges. The attackers used automated tools to repeatedly attempt various password combinations until they successfully gained access.
Exploitation Techniques
Once the “sa” account was compromised, the attackers utilized several techniques to maintain control over the server and prepare it for ransomware deployment:
Payload Deployment
The payloads used in the attack corresponded to PureCrypter, a loader developed in .NET. The deployment process included several stages:
Ransomware Execution
Mallox ransomware follows a multi-stage execution process:
Mallox Ransomware Characteristics
Mallox ransomware, a Ransomware-as-a-Service (RaaS) operation, has been active since at least June 2021. The Mallox group uses a double extortion strategy, threatening to publish stolen data in addition to encrypting it. This approach increases the pressure on victims to pay the ransom, as they face not only data loss but also potential exposure of sensitive information .
Role of Affiliates
The Sekoia research identified two distinct affiliates involved in the Mallox operation, each using different approaches. One affiliate focused on exploiting vulnerable assets, while the other aimed at broader system compromises. Affiliates such as Maestro, Vampire, and Hiervos exhibit different tactics and ransom demands, highlighting the diverse strategies used within the Mallox group.
领英推荐
Suspicious Hosting Activities
The research also raised suspicions regarding the hosting company Xhost Internet, linked to AS208091. This company has been associated with ransomware activity in the past. While formal links to cybercrime remain unproven, the involvement of this AS in previous ransomware compromises and the longevity of its IP address monitoring is intriguing. Sekoia.io analysts continue to monitor activities associated with this AS and investigate related operations .
Impact of the Mallox Ransomware Attack
The Mallox ransomware attack had several notable impacts. Firstly, it compromised critical business data stored on the MS-SQL server. This included financial records, customer information, and intellectual property that could be sold on dark web markets. Secondly, the compromised MS-SQL server presented an entry point into the organization’s network, allowing attackers to deploy additional ransomware or conduct other malicious activities.
Data Loss
The primary impact of Mallox ransomware is data loss due to file encryption. The ransomware uses strong encryption algorithms that make it nearly impossible to recover files without the decryption key. This can result in significant data loss for organizations that do not have proper backups. Additionally, the exfiltration of sensitive data increases the risk of data being publicly released, leading to reputational damage and potential legal consequences.
Data Recovery
Data recovery in the aftermath of a ransomware attack is challenging. If a victim has reliable backups, they can restore their systems without paying the ransom. However, this requires that backups are regularly maintained and stored securely offline to prevent them from being compromised during the attack. In cases where no backups are available, organizations face difficult choices: either pay the ransom with no guarantee of data recovery or accept the loss of data.
If you need to recover an encrypted database, you can try a free download and scan your database with the software Stellar Repair for MS SQL For further assistance, Stellar Support, with extensive experience in recovering databases from encryption, is available to help .
Differences from Other Ransomware Families
Mallox ransomware shares several characteristics with other ransomware families but also has unique attributes:
Tips for Protecting Against Ransomware
To protect against ransomware attacks like Mallox, organizations should implement the following best practices:
Conclusion
The Mallox ransomware attack on the MS-SQL honeypot underscores the need for robust security measures to protect SQL Servers. Regularly updating systems, implementing strong access controls, and monitoring for suspicious activities are crucial steps in mitigating the risk of ransomware attacks. The ongoing efforts by researchers and security professionals to understand and counter these threats are vital in the fight against cybercrime. As cyber-attacks become increasingly sophisticated, staying informed and proactive is essential for safeguarding critical data and systems.
Checkout the case study where we have decrypted ransomware locked data, recovered essential business information and recoved acces to vital data for a packaging solutions company.
Sources: