Friday, December 8, 2023

New Mongolock Ransomware Attacking Database to Encrypt & Deleting Files

Newly discovered a distractive Ransomware Mongolock targets the databases & deleting files along with encrypting the files in order to demand the ransom amount.

Ransomware attackers are nowadays dramatically increasing and the attackers are using different techniques to encrypt the files and evade the detection of security software with the ultimate motivation to earn revenue.

Unlike traditional ransomware attack, Mongolock Ransomware not only encrypts the compromised victim files but also deleting the victim’s file in local drive and back up the database to demand ransom amount.

During infection session, once the file will be executed it checks for user’s folders and specific locations such as Documents, Desktop, Recent, Favorites, Music and Video.

In this case, Mongolock Ransomware using ‘format.com’, a legitimate windows command formatting the folders and drives in order to delete the compromised system files.

Mongolock Ransomware Infection & Deleting Process

Once the Mangolock ransomware successfully launched the it executed various command for each folder in order to perform a format operation.

  • “C:\Windows\system32\cmd.exe” /c del C:\Users\Public\Desktop\* /F /Q
  • “C:\Windows\system32\cmd.exe” /c del C:\Users\User\Videos\* /F /Q
  • “C:\Windows\system32\cmd.exe” /c del D:\\* /F /Q
  • “C:\Windows\system32\cmd.exe” /c format D: /fs:ntfs /q /y
  • “C:\Windows\system32\cmd.exe” /c del C:\Users\User\Desktop\* /F /Q
  • “C:\Windows\system32\cmd.exe” /c del C:\Users\User\Music\* /F /Q
  • “C:\Windows\system32\cmd.exe” /c del C:\Users\User\Favorites\* /F /Q
  • “C:\Windows\system32\cmd.exe” /c del C:\Users\User\Documents\* /F /Q

Before performing a formatting process, ransomware collect and send all the victims information into the attacker by establish the connection with Command & control server.


 Command to delete Desktop files

Command to format local disk drive

According to Quick heal Research, Though we have seen the connectivity of the ransomware to the CnC server, we have not seen any data being backed up on the server, hence, users are advised not to pay any ransom as the malware authors will not be able to restore the data.

Once the ransomware complete its operation then finally it drops the ransomware note that contain the detailed information that says “victim’s database and files back up on their secured server. “

Warning message say that the victims need to pay the 0.1 bitcoin to the wallet that they mention in the ransomware notes and the backed up data will be return to the victim within 24 hours once the payment will be made from victims end.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Also Read:Ransomware Attack Response and Mitigation Checklist


Website

Latest articles

Exploitation Methods Used by PlugX Malware Revealed by Splunk Research

PlugX malware is sophisticated in evasion, as it uses the following techniques to avoid...

TA422 Hackers Attack Organizations Using Outlook & WinRAR Vulnerabilities

Hackers exploit Outlook and WinRAR vulnerabilities because these widely used software programs are lucrative...

Bluetooth keystroke-injection Flaw: A Threat to Apple, Linux & Android Devices

An unauthenticated Bluetooth keystroke-injection vulnerability that affects Android, macOS, and iOS devices has been...

Atlassian Patches RCE Flaw that Affected Multiple Products

Atlassian has been discovered with four new vulnerabilities associated with Remote Code Execution in...

Reflectiz Introduces AI-powered Insights on Top of Its Smart Alerting System

Reflectiz, a cybersecurity company specializing in continuous web threat management, proudly introduces a new...

SLAM Attack Gets Root Password Hash in 30 Seconds

Spectre is a class of speculative execution vulnerabilities in microprocessors that can allow threat...

Akira Ransomware Exploiting Zero-day Flaws For Organization Network Access

The Akira ransomware group, which first appeared in March 2023, has been identified as...
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Endpoint Strategies for 2024 and beyond

Converge and Defend

What's the pulse of Unified Endpoint Management and Security (UEMS) in Europe? Join us live to uncover the strategies that are defining endpoint security in the region.

Related Articles