Blogs

FARGO Ransomware Guide

Product

FARGO Ransomware Guide

FARGO Ransomware Guide

Finn Callaghan

Jul 10, 2024

Latest Headline

FARGO ransomware, also known as Mallox and TargetCompany, has become a significant threat in the cybersecurity landscape, reemerging in July 2024. Recent attacks have predominantly targeted Microsoft SQL servers, causing extensive disruptions across various industries.

Key Points

  • First emerged in June 2021

  • Originally focused on Windows systems, recently expanded its reach to Linux systems and VMware ESXi environments, targets MS-SQL servers

  • 687 total IOCs as of publication

 

Fletch is constantly monitoring the threat landscape. The data in this guide is most up to date as of publication. Check out FARGO’s Threat Board for any updates or join Fletch to be in the know for every threat.

 

FARGO Group Summary

FARGO is attributed to a group that operates under several aliases, including Mallox, TargetCompany, and Tohnichi. Research by security firms such as AhnLab and Palo Alto Networks indicates that the infrastructure supporting these attacks is frequently traced back to China, although the precise origins of the group remain uncertain. Operating as a Ransomware-as-a-Service (RaaS), FARGO uses affiliates to spread its reach, employing double extortion tactics by threatening to leak stolen data unless ransoms are paid.

  • Severity: High

  • Maturity: Mainstream

  • IOCs: 685 Malware hashes and 2 vulnerabilities

  • Targets: 7 tech targets, 2 industry targets, and 16 geo targets

 

Learn more about Fletch’s metrics in the Fletch Help Center.

FARGO Victims & Motivations

FARGO affects a wide range of industries, including manufacturing, legal services, wholesale, retail, and professional services. The ransomware targets MS-SQL servers and VMware ESXi environments, exploiting these systems' vulnerabilities to maximize disruption. Its global reach includes significant activities in Asia and recent attacks in the United States. The primary motivation behind these attacks is financial gain through ransomware payments and data theft for further leverage.

 

FARGO Tactics

FARGO ransomware uses a variety of sophisticated techniques to ensure its payload is executed and data is encrypted. The ransomware deletes volume shadows, clears logs, and disables recovery options to hinder restoration efforts. By injecting its payload into legitimate processes like AppLaunch.exe, FARGO makes detection and removal more challenging. The ransomware uses AES-256 CBC, ChaCha20, and RSA encryption algorithms, and custom shell scripts to encrypt data.

 

Mitigation Advice

At the time of publication, this was the mitigation advice against FARGO:

  • If systems are infected with ransomware, disconnect infected devices from the network and any external storage devices that may be connected.

  • Enable automatic software updates on computers, mobile devices, and connected devices.

At the time of publication, these were the right compliance controls to focus on for FARGO:

  • Limit the use of PowerShell to only administrators and restrict what commands can be executed.

  • Limit access to sensitive transactions and use secure methods for payment approvals.

  • Install and regularly update antivirus software on all company devices.

  • Provide training to employees on how to recognize and avoid social engineering techniques.

  • Train employees to recognize and report suspicious emails and attachments.

 

You can check out the most recent mitigation measures by creating an account when you join Fletch.

 

Communication

On top of mitigation advice, Fletch also provides Beta AI-generated communications so you can educate your different company stakeholders. At the time of publication, this was what was recommended for the following:

For employees with exposure:

For customers:

 

For more templates for your different stakeholders, create a workspace when you join Fletch.

 

Takeaway

FARGO ransomware represents a persistent and evolving threat capable of causing significant damage to vulnerable systems. Its expansion to Linux and VMware environments highlights the need for comprehensive cybersecurity measures. Organizations should implement strong passwords, regular software updates and patches, multi-factor authentication, and regular data backups to mitigate the risks posed by this ransomware.

FARGO is just one example of an ever-evolving threat that Fletch helps you keep track of and prioritize. 

Our AI engine is constantly scanning and indexing the threat landscape for you so you can plug the gaps in your security. You can use Fletch to prioritize your alerts, forecast threats on your horizon, and give you daily advice on what to do.

 

Join the Fletch waitlist and try it for yourself.

1. Secure Reading [Eldorado Ransomware Attacks: Windows and VMware ESXi VMs at Risk] (https://securereading.com/eldorado-ransomware-attacks-windows-and-vmware-esxi-vms-at-risk/)

2. SC Magazine [Attacks with new Mallox ransomware version aimed at Linux] (https://www.scmagazine.com/brief/attacks-with-new-mallox-ransomware-version-aimed-at-linux)

3. Security Online [Mallox Ransomware Goes Cross-Platform: New Linux Variant Discovered, Decryptor Released] (https://securityonline.info/mallox-ransomware-goes-cross-platform-new-linux-variant-discovered-decryptor-released/)

See how much time you can save

Fletch surfaces the 5% of threats that matter to you right now. You’ll have every detail about the threat, what to do about it and what to say. 

Get API access

See how much time you can save

Fletch surfaces the 5% of threats that matter to you right now. You’ll have every detail about the threat, what to do about it and what to say. 

Get API access

See how much time you can save

Fletch surfaces the 5% of threats that matter to you right now. You’ll have every detail about the threat, what to do about it and what to say. 

Get API access

See how much time you can save

Fletch surfaces the 5% of threats that matter to you right now. You’ll have every detail about the threat, what to do about it and what to say. 

Get API access

See how much time you can save

Fletch surfaces the 5% of threats that matter to you right now. You’ll have every detail about the threat, what to do about it and what to say. 

Get API access