{"id":2092,"date":"2022-09-29T17:12:33","date_gmt":"2022-09-29T10:42:33","guid":{"rendered":"https:\/\/thetysmyanmar.ohofusion.com\/?p=2092"},"modified":"2025-06-30T11:22:47","modified_gmt":"2025-06-30T04:52:47","slug":"targetcompany-ransomware-%e1%80%90%e1%80%ad%e1%80%af%e1%80%80%e1%80%ba%e1%80%81%e1%80%ad%e1%80%af%e1%80%80%e1%80%ba%e1%80%99%e1%80%be%e1%80%af%e1%80%90%e1%80%bd%e1%80%b1%e1%80%99%e1%80%be%e1%80%ac-mic","status":"publish","type":"post","link":"https:\/\/www.thetysmyanmar.com\/en\/blog\/technology\/targetcompany-ransomware-%e1%80%90%e1%80%ad%e1%80%af%e1%80%80%e1%80%ba%e1%80%81%e1%80%ad%e1%80%af%e1%80%80%e1%80%ba%e1%80%99%e1%80%be%e1%80%af%e1%80%90%e1%80%bd%e1%80%b1%e1%80%99%e1%80%be%e1%80%ac-mic\/","title":{"rendered":"Microsoft SQL servers hacked in TargetCompany ransomware attacks"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1310.4px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-text fusion-title-size-one\" style=\"--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:20px;--awb-margin-left-small:0px;--awb-font-size:36px;\"><h1 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;font-size:1em;--fontSize:36;line-height:1.12;\"><h1 class=\"entry-title fusion-responsive-typography-calculated\" data-fontsize=\"48\" data-lineheight=\"69.6px\">Microsoft SQL servers hacked in TargetCompany ransomware attacks<\/h1><\/h1><\/div><div class=\"fusion-text fusion-text-1\"><p>\u1021\u102c\u1038\u1014\u100a\u103a\u1038\u1001\u103b\u1000\u103a\u101b\u103e\u102d\u1010\u1032\u1037 Microsoft SQL servers \u1010\u103d\u1031\u1000\u102d\u102f FARGO ransomware \u1016\u103c\u1004\u1037\u103a \u1010\u102d\u102f\u1000\u103a\u1001\u102d\u102f\u1000\u103a\u1019\u103e\u102f \u101c\u103e\u102d\u102f\u1004\u103a\u1038\u101e\u1005\u103a \u1010\u1005\u103a\u1001\u102f\u1019\u103e\u102c \u1015\u1005\u103a\u1019\u103e\u1010\u103a \u1011\u102c\u1038\u1001\u1036\u101b \u1010\u101a\u103a\u101f\u102f \u101c\u102f\u1036\u1001\u103c\u102f\u1036\u101b\u1031\u1038 \u101e\u102f\u1010\u1031\u101e\u102e\u1019\u103b\u102c\u1038\u1000 \u101e\u1010\u102d\u1015\u1031\u1038 \u1011\u102c\u1038\u1015\u102b\u1010\u101a\u103a\u104b<\/p>\n<p>MS-SQL servers \u1010\u103d\u1031\u1000 \u1021\u1004\u103a\u1010\u102c\u1014\u1000\u103a \u101d\u1014\u103a\u1006\u1031\u102c\u1004\u103a\u1019\u103e\u102f\u1010\u103d\u1031 \u1014\u103e\u1004\u1037\u103a apps \u1010\u103d\u1031 \u1021\u1010\u103d\u1000\u103a \u1012\u1031\u1010\u102c \u1010\u103d\u1031\u1000\u102d\u102f \u1000\u102d\u102f\u1004\u103a\u1006\u1031\u102c\u1004\u103a\u1011\u102c\u1038\u1010\u1032\u1037 database management systems \u1010\u103d\u1031\u1015\u1032 \u1016\u103c\u1005\u103a\u1015\u102b\u1010\u101a\u103a \u104b \u104e\u1004\u103a\u1038\u1010\u102d\u102f\u1037\u1000\u102d\u102f \u1014\u103e\u1031\u102c\u1004\u1037\u103a\u101a\u103e\u1000\u103a\u1001\u103c\u1004\u103a\u1038\u1000 \u1006\u102d\u102f\u1038\u101b\u103d\u102c\u1038\u1010\u1032\u1037 business trouble \u1010\u103d\u1031 \u1016\u103c\u1005\u103a\u1005\u1031 \u1014\u102d\u102f\u1004\u103a\u1015\u102b\u1010\u101a\u103a\u104b<\/p>\n<p>BleepingComputer \u1000\u00a0<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/vulnerable-microsoft-sql-servers-targeted-with-cobalt-strike\/\">\u1016\u1031\u1016\u1031\u102c\u103a\u101d\u102b\u101b\u102e \u101c<\/a>\u1000 \u1021\u101c\u102c\u1038\u1010\u1030 \u1010\u102d\u102f\u1000\u103a\u1001\u102d\u102f\u1000\u103a\u1019\u103e\u102f \u1010\u103d\u1031\u1000\u102d\u102f \u1021\u1005\u102e\u101b\u1004\u103a\u1001\u1036 \u1001\u1032\u1037\u1015\u103c\u102e\u1038 Cobalt Strike beacons \u1010\u103d\u1031\u1000\u102d\u102f \u1000\u103b\u1006\u1004\u103a\u1038 \u1005\u1031\u1001\u1032\u1037 \u1015\u102b\u1010\u101a\u103a\u104b\u00a0<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/microsoft-sql-servers-hacked-to-steal-bandwidth-for-proxy-services\/\">\u1007\u1030\u101c\u102d\u102f\u1004\u103a\u101c<\/a>\u1019\u103e\u102c proxy services \u1010\u103d\u1031 \u1021\u1010\u103d\u1000\u103a bandwidth \u1000\u102d\u102f \u1001\u102d\u102f\u1038\u101a\u1030\u1016\u102d\u102f\u1037 threat actors \u1010\u103d\u1031\u1000 \u1021\u102c\u1038\u1014\u100a\u103a\u1038\u1001\u103b\u1000\u103a \u101b\u103e\u102d\u1010\u1032\u1037 MS-SQL servers \u1010\u103d\u1031\u1000\u102d\u102f \u1015\u103c\u1014\u103a\u1015\u1031\u1038\u1006\u103d\u1032 \u1001\u1032\u1037\u1015\u102b\u1010\u101a\u103a\u104b<br \/>\n\u1014\u1031\u102c\u1000\u103a\u1006\u102f\u1036\u1038 wave \u1000 database owners \u1010\u103d\u1031\u1000\u102d\u102f blackmailing \u1015\u103c\u102f\u101c\u102f\u1015\u103a\u1001\u103c\u1004\u103a\u1038\u1016\u103c\u1004\u1037\u103a \u101c\u103b\u1004\u103a\u1019\u103c\u1014\u103a\u101c\u103d\u101a\u103a\u1000\u1030\u101e\u1031\u102c \u1021\u1019\u103c\u1010\u103a\u1021\u1005\u103d\u1014\u103a\u1038 \u101b\u101b\u103e\u102d\u1016\u102d\u102f\u1037 \u101b\u100a\u103a\u101b\u103d\u101a\u103a\u104d \u1015\u102d\u102f\u1019\u102d\u102f \u1006\u102d\u102f\u1038\u101b\u103d\u102c\u1038 \u1015\u102b\u1010\u101a\u103a\u104b<\/p>\n<\/div><div class=\"fusion-text fusion-text-2\"><div class=\"fusion-title title fusion-title-2 fusion-sep-none fusion-title-text fusion-title-size-three\">\n<h3 class=\"title-heading-left fusion-responsive-typography-calculated\">ARGO ransomware\u104a a.k.a. TargetCompany<\/h3>\n<\/div>\n<div class=\"fusion-text fusion-text-2\">\n<p>AhnLab Security Emergency Response Center (ASEC) \u1019\u103e \u101c\u102f\u1036\u1001\u103c\u102f\u1036\u101b\u1031\u1038 \u101e\u102f\u1010\u1031\u101e\u102e\u1010\u103d\u1031\u1000 FARGO \u1000 GlobeImposter \u1014\u103e\u1004\u1037\u103a\u1021\u1010\u1030 MS-SQL servers \u1010\u103d\u1031 \u1015\u1031\u102b\u103a\u1019\u103e\u102c \u1021\u1013\u102d\u1000\u1011\u102c\u1038 \u101c\u102f\u1015\u103a\u1006\u1031\u102c\u1004\u103a\u1010\u1032\u1037 \u1021\u1011\u1004\u103a\u101b\u103e\u102c\u1038\u1006\u102f\u1036\u1038 ransomware strains \u1010\u103d\u1031\u1011\u1032\u1019\u103e \u1010\u1005\u103a\u1001\u102f \u1016\u103c\u1005\u103a\u1000\u103c\u1031\u102c\u1004\u103a\u1038\u00a0<a href=\"https:\/\/asec.ahnlab.com\/en\/39152\/\">\u1015\u103c\u1031\u102c\u1000\u103c\u102c\u1038 \u1001\u1032\u1037\u1015\u102b\u1010\u101a\u103a\u104b<\/a><\/p>\n<p>\u1012\u102e malware family \u1000\u102d\u102f \u101a\u1001\u1004\u103a\u1000 \u201cMallox\u201d \u101f\u102f \u101b\u100a\u103a\u100a\u103d\u103e\u1014\u103a\u1038 \u1011\u102c\u1038\u101e\u1031\u102c\u103a\u101c\u100a\u103a\u1038 \u104e\u1004\u103a\u1038\u1000 \u104e\u1004\u103a\u1038\u101b\u1032\u1037 \u1000\u102f\u1012\u103a\u101d\u103e\u1000\u103a \u1011\u102c\u1038\u1010\u1032\u1037 \u1016\u102d\u102f\u1004\u103a\u1010\u103d\u1031\u1019\u103e\u102c \u201c.mallox\u201d extension \u1000\u102d\u102f \u1011\u100a\u1037\u103a\u101e\u103d\u1004\u103a\u1038 \u1011\u102c\u1038\u101e\u1031\u102c\u1000\u103c\u1031\u102c\u1004\u1037\u103a \u1016\u103c\u1005\u103a\u1015\u102b\u1010\u101a\u103a\u104b<\/p>\n<p>\u1011\u102d\u102f\u1037\u1021\u1015\u103c\u1004\u103a \u104a \u1012\u102e\u1019\u103b\u102d\u102f\u1038\u1000\u103d\u1032\u101f\u102c \u1016\u1031\u1016\u1031\u102c\u103a\u101d\u102b\u101b\u102e \u101c\u1000 \u1021\u1005\u102e\u101b\u1004\u103a\u1001\u1036\u1005\u102c\u1019\u103e\u102c \u201cTargetCompany\u201d \u101f\u102f \u1021\u1019\u100a\u103a\u1015\u1031\u1038\u1011\u102c\u1038\u1010\u1032\u1037 Avast researchers \u1010\u103d\u1031\u1014\u103e\u1004\u1037\u103a \u1021\u1010\u1030\u1010\u1030\u1015\u1004\u103a \u1016\u103c\u1005\u103a\u1015\u103c\u102e\u1038\u104a \u1021\u1001\u103b\u102d\u102f\u1037\u101e\u1031\u102c \u1000\u102d\u1005\u1039\u1005\u1010\u103d\u1031\u1019\u103e\u102c \u1000\u102f\u1012\u103a\u101d\u103e\u1000\u103a\u1011\u102c\u1038\u101e\u1031\u102c \u1016\u102d\u102f\u1004\u103a\u1010\u103d\u1031\u1000\u102d\u102f\u00a0<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/free-decryptor-released-for-targetcompany-ransomware-victims\/\">\u1021\u1001\u1019\u1032\u1037 \u1015\u103c\u1014\u103a\u101c\u100a\u103a \u101b\u101a\u1030\u1014\u102d\u102f\u1004\u103a\u1000\u103c\u1031\u102c\u1004\u103a<\/a>\u1038 \u1019\u102e\u1038\u1019\u1031\u102c\u1004\u103a\u1038 \u1011\u102d\u102f\u1038\u1015\u103c\u1011\u102c\u1038 \u1015\u102b\u1010\u101a\u103a\u104b<\/p>\n<\/div>\n<div class=\"fusion-text fusion-text-3\">\n<p><a href=\"https:\/\/id-ransomware.malwarehunterteam.com\/\">ID Ransomware<\/a>\u00a0platform \u101b\u103e\u102d ransomware \u1010\u102d\u102f\u1000\u103a\u1001\u102d\u102f\u1000\u103a\u1019\u103e\u102f\u1010\u103d\u1031\u1014\u103e\u1004\u1037\u103a \u1015\u1010\u103a\u101e\u1000\u103a\u1010\u1032\u1037 \u1000\u102d\u1014\u103a\u1038\u1002\u100f\u1014\u103a\u1038 \u1021\u1001\u103b\u1000\u103a\u1021\u101c\u1000\u103a\u1010\u103d\u1031\u1000 file-encrypting malware \u101b\u1032\u1037 FARGO family \u1000 \u1021\u101c\u103d\u1014\u103a \u1010\u1000\u103a\u1000\u103c\u103d\u1000\u103c\u1031\u102c\u1004\u103a\u1038 \u1016\u1031\u102c\u103a\u1015\u103c \u1015\u102b\u1010\u101a\u103a\u104b<\/p>\n<\/div>\n<\/div><div class=\"fusion-image-element\" style=\"--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\"fusion-imageframe imageframe-none imageframe-1 hover-type-none\"><img decoding=\"async\" width=\"1600\" height=\"510\" title=\"ransom-id\" src=\"https:\/\/www.thetysmyanmar.com\/wp-content\/uploads\/sites\/13\/2022\/09\/ransom-id.jpg\" alt class=\"img-responsive wp-image-2095\" srcset=\"https:\/\/www.thetysmyanmar.com\/wp-content\/uploads\/sites\/13\/2022\/09\/ransom-id-200x64.jpg 200w, https:\/\/www.thetysmyanmar.com\/wp-content\/uploads\/sites\/13\/2022\/09\/ransom-id-400x128.jpg 400w, https:\/\/www.thetysmyanmar.com\/wp-content\/uploads\/sites\/13\/2022\/09\/ransom-id-600x191.jpg 600w, https:\/\/www.thetysmyanmar.com\/wp-content\/uploads\/sites\/13\/2022\/09\/ransom-id-800x255.jpg 800w, https:\/\/www.thetysmyanmar.com\/wp-content\/uploads\/sites\/13\/2022\/09\/ransom-id-1200x383.jpg 1200w, https:\/\/www.thetysmyanmar.com\/wp-content\/uploads\/sites\/13\/2022\/09\/ransom-id.jpg 1600w\" sizes=\"(max-width: 1024px) 100vw, (max-width: 640px) 100vw, 1600px\" \/><\/span><\/div><div class=\"fusion-text fusion-text-3\" style=\"--awb-content-alignment:center;\"><p>FARGO activity in the last 30 days (ID Ransomware)<\/p>\n<\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;width:100%;\"><div class=\"fusion-separator-border sep-single sep-solid\" style=\"--awb-height:20px;--awb-amount:20px;border-color:#e8eaf0;border-top-width:1px;\"><\/div><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-4\"><div class=\"fusion-title title fusion-title-3 fusion-sep-none fusion-title-text fusion-title-size-three\">\n<h3 class=\"title-heading-left fusion-responsive-typography-calculated\">Infection and execution<\/h3>\n<\/div>\n<div class=\"fusion-text fusion-text-5\">\n<p>Researchers \u1010\u103d\u1031\u1000 ransomware \u1000\u1030\u1038\u1005\u1000\u103a\u1001\u1036\u101b\u1019\u103e\u102f\u101f\u102c cmd.exe \u1014\u103e\u1004\u1037\u103a powershell.exe \u1000\u102d\u102f \u1021\u101e\u102f\u1036\u1038\u1015\u103c\u102f\u104d .NET \u1016\u102d\u102f\u1004\u103a\u1000\u102d\u102f \u1012\u1031\u102b\u1004\u103a\u1038\u101c\u102f\u1012\u103a \u101c\u102f\u1015\u103a\u1010\u1032\u1037 \u1005\u1000\u103a\u1019\u103e\u102c MS-SQL process \u1019\u103e \u1005\u1010\u1004\u103a\u1000\u103c\u1031\u102c\u1004\u103a\u1038 \u101e\u1010\u102d\u1015\u103c\u102f \u1019\u102d\u1015\u102b\u1010\u101a\u103a\u104b<\/p>\n<p>Payload \u1000 \u1010\u102d\u1000\u103b\u101e\u1031\u102c \u101c\u102f\u1015\u103a\u1004\u1014\u103a\u1038\u1005\u1009\u103a\u1010\u103d\u1031 \u1014\u103e\u1004\u1037\u103a \u101d\u1014\u103a\u1006\u1031\u102c\u1004\u103a\u1019\u103e\u102f\u1010\u103d\u1031\u1000\u102d\u102f \u101b\u1015\u103a\u1006\u102d\u102f\u1004\u103a\u1038\u1010\u1032\u1037 BAT \u1016\u102d\u102f\u1004\u103a\u1000\u102d\u102f \u1011\u102f\u1010\u103a\u1015\u1031\u1038\u1015\u103c\u102e\u1038 \u101c\u102f\u1015\u103a\u1006\u1031\u102c\u1004\u103a\u1010\u1032\u1037 \u1021\u1015\u102d\u102f malware ( \u101c\u1031\u102c\u1037\u1001\u103a\u1000\u102c\u1021\u1015\u102b\u1021\u101d\u1004\u103a ) \u1000\u102d\u102f \u101b\u101a\u1030\u1011\u102c\u1038 \u1015\u102b\u1010\u101a\u103a\u104b<\/p>\n<p>\u1011\u102d\u102f\u1037\u1014\u1031\u102c\u1000\u103a \u104a ransomware payload \u1000 \u1010\u101b\u102c\u1038\u101d\u1004\u103a Windows process \u1016\u103c\u1005\u103a\u1010\u1032\u1037 AppLaunch.exe \u1011\u1032\u101e\u102d\u102f\u1037 \u101e\u1030\u1037\u1000\u102d\u102f\u101a\u103a\u101e\u1030 \u1011\u102d\u102f\u1038\u101e\u103d\u1004\u103a\u1038\u1015\u103c\u102e\u1038 Raccine \u101f\u102f \u1001\u1031\u102b\u103a\u101e\u1031\u102c open-source ransomware \u201cvaccine\u201d \u1021\u1010\u103d\u1000\u103a registry key \u1000\u102d\u102f \u1016\u103b\u1000\u103a\u1016\u102d\u102f\u1037 \u1000\u103c\u102d\u102f\u1038\u1005\u102c\u1038\u1014\u1031\u1010\u102c\u1015\u1032 \u1016\u103c\u1005\u103a\u1015\u102b\u1010\u101a\u103a\u104b<\/p>\n<p>\u1011\u102d\u102f\u1037\u1021\u1015\u103c\u1004\u103a\u104a Malware \u1000 recovery deactivation command \u1000\u102d\u102f \u101c\u102f\u1015\u103a\u1006\u1031\u102c\u1004\u103a\u1015\u103c\u102e\u1038 \u104e\u1004\u103a\u1038\u1010\u102d\u102f\u1037\u101b\u1032\u1037 \u1021\u1000\u103c\u1031\u102c\u1004\u103a\u1038\u1021\u101b\u102c\u1010\u103d\u1031\u1000\u102d\u102f encryption \u1021\u1010\u103d\u1000\u103a \u101b\u1014\u102d\u102f\u1004\u103a\u1005\u1031\u1016\u102d\u102f\u1037 database-related processes \u1010\u103d\u1031\u1000\u102d\u102f \u101b\u1015\u103a\u1006\u102d\u102f\u1004\u103a\u1038 \u1005\u1031\u1015\u102b\u1010\u101a\u103a\u104b<\/p>\n<\/div>\n<\/div><div class=\"fusion-image-element\" style=\"--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\"fusion-imageframe imageframe-none imageframe-2 hover-type-none\"><img decoding=\"async\" width=\"1155\" height=\"243\" title=\"killed-processes\" src=\"https:\/\/www.thetysmyanmar.com\/wp-content\/uploads\/sites\/13\/2022\/09\/killed-processes.jpg\" alt class=\"img-responsive wp-image-2096\" srcset=\"https:\/\/www.thetysmyanmar.com\/wp-content\/uploads\/sites\/13\/2022\/09\/killed-processes-200x42.jpg 200w, https:\/\/www.thetysmyanmar.com\/wp-content\/uploads\/sites\/13\/2022\/09\/killed-processes-400x84.jpg 400w, https:\/\/www.thetysmyanmar.com\/wp-content\/uploads\/sites\/13\/2022\/09\/killed-processes-600x126.jpg 600w, https:\/\/www.thetysmyanmar.com\/wp-content\/uploads\/sites\/13\/2022\/09\/killed-processes-800x168.jpg 800w, https:\/\/www.thetysmyanmar.com\/wp-content\/uploads\/sites\/13\/2022\/09\/killed-processes.jpg 1155w\" sizes=\"(max-width: 1024px) 100vw, (max-width: 640px) 100vw, 1155px\" \/><\/span><\/div><div class=\"fusion-text fusion-text-5\" style=\"--awb-content-alignment:center;\"><p>Processes killed by FARGO prior to initiating encryption (ASEC)<\/p>\n<\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;width:100%;\"><div class=\"fusion-separator-border sep-single sep-solid\" style=\"--awb-height:20px;--awb-amount:20px;border-color:#e8eaf0;border-top-width:1px;\"><\/div><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-6\"><p>FARGO ransomware \u1019\u103b\u102d\u102f\u1038\u1000\u103d\u1032\u1000 \u1010\u102d\u102f\u1000\u103a\u1001\u102d\u102f\u1000\u103a\u1001\u1036\u101b\u1010\u1032\u1037 \u1005\u1014\u1005\u103a\u1021\u102c\u1038 \u101c\u102f\u1036\u1038\u101d \u1021\u101e\u102f\u1036\u1038\u1019\u1015\u103c\u102f\u1014\u102d\u102f\u1004\u103a\u1005\u1031\u1016\u102d\u102f\u1037 \u1000\u102c\u1000\u103d\u101a\u103a\u101b\u1014\u103a \u1021\u1010\u103d\u1000\u103a \u1021\u1001\u103b\u102d\u102f\u1037\u101e\u1031\u102c \u1006\u1031\u102c\u1037\u1016\u103a\u101d\u1032\u101c\u103a \u1014\u103e\u1004\u1037\u103a \u101c\u1019\u103a\u1038\u100a\u103d\u103e\u1014\u103a\u1001\u103b\u1000\u103a \u1010\u103d\u1031\u1000\u102d\u102f encryption \u1019\u103e \u1016\u101a\u103a\u1011\u102f\u1010\u103a \u1011\u102c\u1038\u1015\u102b\u1010\u101a\u103a\u104b<\/p>\n<p>Encryption \u1019\u103e \u1000\u1004\u103a\u1038\u101c\u103d\u1010\u103a\u1001\u103d\u1004\u1037\u103a\u1010\u103d\u1031\u1000 Microsoft Windows system \u101c\u1019\u103a\u1038\u100a\u103d\u103e\u1014\u103a\u1010\u103d\u1031 \u104a boot \u1016\u102d\u102f\u1004\u103a\u1010\u103d\u1031 \u104a Tor Browser \u104a Internet Explorer \u104a \u1021\u101e\u102f\u1036\u1038\u1015\u103c\u102f\u101e\u1030 \u1005\u102d\u1010\u103a\u1000\u103c\u102d\u102f\u1000\u103a \u1015\u103c\u1004\u103a\u1006\u1004\u103a\u1019\u103e\u102f\u1010\u103d\u1031 \u1014\u103e\u1004\u1037\u103a settings \u1010\u103d\u1031 \u104a debug log file (\u101e\u102d\u102f\u1037\u1019\u101f\u102f\u1010\u103a) thumbnail database \u1010\u103d\u1031\u1015\u1032 \u1016\u103c\u1005\u103a\u1015\u102b\u1010\u101a\u103a \u104b<\/p>\n<p>Encryption \u1015\u103c\u102e\u1038\u101e\u103d\u102c\u1038\u1010\u1032\u1037 \u1021\u1001\u102b\u104a \u101c\u1031\u102c\u1037\u1001\u103a\u1001\u103b\u1011\u102c\u1038\u101e\u1031\u102c \u1016\u102d\u102f\u1004\u103a\u1010\u103d\u1031\u1000\u102d\u102f \u201c.Fargo3\u201d extension \u1021\u101e\u102f\u1036\u1038\u1015\u103c\u102f\u104d \u1021\u1019\u100a\u103a\u1015\u103c\u1031\u102c\u1004\u103a\u1038\u1015\u103c\u102e\u1038 malware \u1000 ransom note (\u201cRECOVERY FILES.txt\u201d) \u1000\u102d\u102f \u1011\u102f\u1010\u103a\u1015\u1031\u1038 \u1015\u102b\u1010\u101a\u103a\u104b<\/p>\n<\/div><div class=\"fusion-image-element\" style=\"--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\"fusion-imageframe imageframe-none imageframe-3 hover-type-none\"><img decoding=\"async\" width=\"1429\" height=\"727\" title=\"ransom-note(8)\" src=\"https:\/\/www.thetysmyanmar.com\/wp-content\/uploads\/sites\/13\/2022\/09\/ransom-note8.png\" alt class=\"img-responsive wp-image-2097\" srcset=\"https:\/\/www.thetysmyanmar.com\/wp-content\/uploads\/sites\/13\/2022\/09\/ransom-note8-200x102.png 200w, https:\/\/www.thetysmyanmar.com\/wp-content\/uploads\/sites\/13\/2022\/09\/ransom-note8-400x203.png 400w, https:\/\/www.thetysmyanmar.com\/wp-content\/uploads\/sites\/13\/2022\/09\/ransom-note8-600x305.png 600w, https:\/\/www.thetysmyanmar.com\/wp-content\/uploads\/sites\/13\/2022\/09\/ransom-note8-800x407.png 800w, https:\/\/www.thetysmyanmar.com\/wp-content\/uploads\/sites\/13\/2022\/09\/ransom-note8-1200x610.png 1200w, https:\/\/www.thetysmyanmar.com\/wp-content\/uploads\/sites\/13\/2022\/09\/ransom-note8.png 1429w\" sizes=\"(max-width: 1024px) 100vw, (max-width: 640px) 100vw, 1429px\" \/><\/span><\/div><div class=\"fusion-text fusion-text-7\" style=\"--awb-content-alignment:center;\"><p>FARGO ransom note<\/p>\n<\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;width:100%;\"><div class=\"fusion-separator-border sep-single sep-solid\" style=\"--awb-height:20px;--awb-amount:20px;border-color:#e8eaf0;border-top-width:1px;\"><\/div><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-8\"><div class=\"fusion-text fusion-text-9\">\n<p>Database servers \u1010\u103d\u1031\u1000\u102d\u102f \u1019\u1000\u103c\u102c\u1001\u100f \u1006\u102d\u102f\u101e\u101c\u102d\u102f brute-force \u1014\u103e\u1004\u1037\u103a dictionary attacks \u1010\u103d\u1031\u1019\u103e \u1021\u1031\u102c\u1004\u103a\u1019\u103c\u1004\u103a\u101e\u1031\u102c \u1021\u1011\u1031\u102c\u1000\u103a\u1021\u1011\u102c\u1038\u1010\u103d\u1031 \u1021\u102c\u1038\u1014\u100a\u103a\u1038\u101e\u1031\u102c \u1021\u1011\u1031\u102c\u1000\u103a\u1021\u1011\u102c\u1038\u1010\u103d\u1031\u1016\u103c\u1004\u1037\u103a \u1000\u102c\u1000\u103d\u101a\u103a\u1011\u102c\u1038\u1010\u1032\u1037 \u1021\u1000\u1031\u102c\u1004\u1037\u103a\u1010\u103d\u1031\u1000\u102d\u102f \u1016\u103b\u1000\u103a\u1006\u102e\u1038 \u1001\u1036\u101b\u101c\u1031\u1037 \u101b\u103e\u102d\u1015\u102b\u1010\u101a\u103a \u104b \u1010\u1014\u100a\u103a\u1038\u1021\u102c\u1038\u1016\u103c\u1004\u1037\u103a \u104a cybercriminals \u1010\u103d\u1031\u1000 \u1015\u1005\u103a\u1019\u103e\u1010\u103a\u1000\u102d\u102f \u1016\u102c\u1011\u1031\u1038\u1001\u103c\u1004\u103a\u1038 \u1019\u1015\u103c\u102f\u101e\u1031\u102c \u101e\u102d\u1011\u102c\u1038\u1010\u1032\u1037 \u1021\u102c\u1038\u1014\u100a\u103a\u1038\u1001\u103b\u1000\u103a\u1010\u103d\u1031\u1000\u102d\u102f \u1021\u101e\u102f\u1036\u1038\u1001\u103b\u1016\u102d\u102f\u1037 \u1000\u103c\u102d\u102f\u1038\u1005\u102c\u1038\u1000\u103c \u1015\u102b\u1010\u101a\u103a\u104b<\/p>\n<p>MS-SQL server administrators \u1010\u103d\u1031 \u1021\u1010\u103d\u1000\u103a \u1021\u1000\u103c\u1036\u1015\u103c\u102f\u1001\u103b\u1000\u103a\u1019\u103e\u102c \u104e\u1004\u103a\u1038\u1010\u102d\u102f\u1037\u1000 \u101c\u102f\u1036\u101c\u1031\u102c\u1000\u103a\u1015\u103c\u102e\u1038 \u1011\u1030\u1038\u1001\u103c\u102c\u1038\u101e\u1031\u102c \u1005\u1000\u102c\u1038\u101d\u103e\u1000\u103a\u1010\u103d\u1031\u1000\u102d\u102f \u1021\u101e\u102f\u1036\u1038\u1015\u103c\u102f\u1000\u103c\u1031\u102c\u1004\u103a\u1038 \u101e\u1031\u1001\u103b\u102c\u1005\u1031\u1016\u102d\u102f\u1037 \u1016\u103c\u1005\u103a\u1015\u102b\u1010\u101a\u103a \u104b \u1011\u102d\u102f\u1037\u1021\u1015\u103c\u1004\u103a\u104a \u101c\u102f\u1036\u1001\u103c\u102f\u1036\u101b\u1031\u1038 \u1021\u102c\u1038\u1014\u100a\u103a\u1038\u1001\u103b\u1000\u103a\u1010\u103d\u1031 \u1021\u1010\u103d\u1000\u103a \u1014\u1031\u102c\u1000\u103a\u1006\u102f\u1036\u1038\u1015\u1031\u102b\u103a \u1015\u103c\u1004\u103a\u1006\u1004\u103a\u1019\u103e\u102f\u1010\u103d\u1031 \u1014\u103e\u1004\u1037\u103a\u1021\u1010\u1030 \u1005\u1000\u103a\u1000\u102d\u102f up-to-date \u1016\u103c\u1005\u103a\u1021\u1031\u102c\u1004\u103a \u1011\u102c\u1038\u101b\u103e\u102d\u1001\u103c\u1004\u103a\u1038\u101f\u102c \u1001\u1031\u1010\u103a\u1019\u1019\u102e\u1010\u1031\u102c\u1037\u1010\u1032\u1037 \u1021\u1000\u103c\u1036\u1009\u102c\u100f\u103a\u101e\u102c \u1016\u103c\u1005\u103a\u1015\u102b\u1010\u101a\u103a\u104b<\/p>\n<\/div>\n<div class=\"fusion-text fusion-text-10\">\n<p>Reference:\u00a0<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/microsoft-sql-servers-hacked-in-targetcompany-ransomware-attacks\/\">BleepingComputer<\/a><\/p>\n<\/div>\n<\/div><div class=\"fusion-text fusion-text-9\"><p><a href=\"https:\/\/www.thetysmyanmar.com\/en\/\">Thetys Co.,Ltd website<\/a>\u00a0\u1014\u103e\u1004\u1037\u103a\u00a0<a href=\"https:\/\/www.facebook.com\/thetysmm\">Thetys Facebook<\/a>\u00a0\u1010\u103d\u1004\u103a \u1021\u1001\u103c\u102c\u1038\u101e\u1031\u102c IT \u1014\u1032\u1037\u1015\u1010\u103a\u101e\u1010\u103a\u101e\u1031\u102c Knowledge \u1019\u103b\u102c\u1038\u1000\u102d\u102f\u101c\u1032 \u101c\u1031\u1037\u101c\u102c\u1016\u1010\u103a\u101b\u103e\u102f\u1014\u102d\u102f\u1004\u103a\u1015\u102b\u101e\u100a\u103a\u104b<\/p>\n<\/div><\/div><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"","protected":false},"author":8,"featured_media":2093,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[241,218],"tags":[],"class_list":["post-2092","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-technology"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>TargetCompany ransomware \u1010\u102d\u102f\u1000\u103a\u1001\u102d\u102f\u1000\u103a\u1019\u103e\u102f\u1010\u103d\u1031\u1019\u103e\u102c Microsoft SQL servers \u1010\u103d\u1031 \u101f\u1000\u103a\u1001\u103a\u1001\u1036\u101b - Thetys<\/title>\n<meta name=\"description\" content=\"Software Development , Xamarin , C# , Wordpress, TargetCompany ransomware , Microsoft SQL servers, MS-SQL servers,\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.thetysmyanmar.com\/en\/blog\/technology\/targetcompany-ransomware-\u1010\u102d\u102f\u1000\u103a\u1001\u102d\u102f\u1000\u103a\u1019\u103e\u102f\u1010\u103d\u1031\u1019\u103e\u102c-mic\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"TargetCompany ransomware \u1010\u102d\u102f\u1000\u103a\u1001\u102d\u102f\u1000\u103a\u1019\u103e\u102f\u1010\u103d\u1031\u1019\u103e\u102c Microsoft SQL servers \u1010\u103d\u1031 \u101f\u1000\u103a\u1001\u103a\u1001\u1036\u101b - Thetys\" \/>\n<meta property=\"og:description\" content=\"Software Development , Xamarin , C# , Wordpress, TargetCompany ransomware , Microsoft SQL servers, MS-SQL servers,\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.thetysmyanmar.com\/en\/blog\/technology\/targetcompany-ransomware-\u1010\u102d\u102f\u1000\u103a\u1001\u102d\u102f\u1000\u103a\u1019\u103e\u102f\u1010\u103d\u1031\u1019\u103e\u102c-mic\/\" \/>\n<meta property=\"og:site_name\" content=\"Thetys\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/thetysmm\" \/>\n<meta property=\"article:published_time\" content=\"2022-09-29T10:42:33+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-30T04:52:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.thetysmyanmar.com\/wp-content\/uploads\/sites\/13\/2022\/09\/MSSQL.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"1066\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Mr. Jarviz\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mr. Jarviz\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.thetysmyanmar.com\\\/blog\\\/technology\\\/targetcompany-ransomware-%e1%80%90%e1%80%ad%e1%80%af%e1%80%80%e1%80%ba%e1%80%81%e1%80%ad%e1%80%af%e1%80%80%e1%80%ba%e1%80%99%e1%80%be%e1%80%af%e1%80%90%e1%80%bd%e1%80%b1%e1%80%99%e1%80%be%e1%80%ac-mic\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.thetysmyanmar.com\\\/blog\\\/technology\\\/targetcompany-ransomware-%e1%80%90%e1%80%ad%e1%80%af%e1%80%80%e1%80%ba%e1%80%81%e1%80%ad%e1%80%af%e1%80%80%e1%80%ba%e1%80%99%e1%80%be%e1%80%af%e1%80%90%e1%80%bd%e1%80%b1%e1%80%99%e1%80%be%e1%80%ac-mic\\\/\"},\"author\":{\"name\":\"Mr. Jarviz\",\"@id\":\"https:\\\/\\\/www.thetysmyanmar.com\\\/en\\\/#\\\/schema\\\/person\\\/709f4d8e04069e58c5a9a78d6fdf1fde\"},\"headline\":\"TargetCompany ransomware \u1010\u102d\u102f\u1000\u103a\u1001\u102d\u102f\u1000\u103a\u1019\u103e\u102f\u1010\u103d\u1031\u1019\u103e\u102c Microsoft SQL servers \u1010\u103d\u1031 \u101f\u1000\u103a\u1001\u103a\u1001\u1036\u101b\",\"datePublished\":\"2022-09-29T10:42:33+00:00\",\"dateModified\":\"2025-06-30T04:52:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.thetysmyanmar.com\\\/blog\\\/technology\\\/targetcompany-ransomware-%e1%80%90%e1%80%ad%e1%80%af%e1%80%80%e1%80%ba%e1%80%81%e1%80%ad%e1%80%af%e1%80%80%e1%80%ba%e1%80%99%e1%80%be%e1%80%af%e1%80%90%e1%80%bd%e1%80%b1%e1%80%99%e1%80%be%e1%80%ac-mic\\\/\"},\"wordCount\":1588,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.thetysmyanmar.com\\\/blog\\\/technology\\\/targetcompany-ransomware-%e1%80%90%e1%80%ad%e1%80%af%e1%80%80%e1%80%ba%e1%80%81%e1%80%ad%e1%80%af%e1%80%80%e1%80%ba%e1%80%99%e1%80%be%e1%80%af%e1%80%90%e1%80%bd%e1%80%b1%e1%80%99%e1%80%be%e1%80%ac-mic\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.thetysmyanmar.com\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2022\\\/09\\\/MSSQL.jpg\",\"articleSection\":[\"Blog\",\"Technology\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.thetysmyanmar.com\\\/blog\\\/technology\\\/targetcompany-ransomware-%e1%80%90%e1%80%ad%e1%80%af%e1%80%80%e1%80%ba%e1%80%81%e1%80%ad%e1%80%af%e1%80%80%e1%80%ba%e1%80%99%e1%80%be%e1%80%af%e1%80%90%e1%80%bd%e1%80%b1%e1%80%99%e1%80%be%e1%80%ac-mic\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.thetysmyanmar.com\\\/blog\\\/technology\\\/targetcompany-ransomware-%e1%80%90%e1%80%ad%e1%80%af%e1%80%80%e1%80%ba%e1%80%81%e1%80%ad%e1%80%af%e1%80%80%e1%80%ba%e1%80%99%e1%80%be%e1%80%af%e1%80%90%e1%80%bd%e1%80%b1%e1%80%99%e1%80%be%e1%80%ac-mic\\\/\",\"url\":\"https:\\\/\\\/www.thetysmyanmar.com\\\/blog\\\/technology\\\/targetcompany-ransomware-%e1%80%90%e1%80%ad%e1%80%af%e1%80%80%e1%80%ba%e1%80%81%e1%80%ad%e1%80%af%e1%80%80%e1%80%ba%e1%80%99%e1%80%be%e1%80%af%e1%80%90%e1%80%bd%e1%80%b1%e1%80%99%e1%80%be%e1%80%ac-mic\\\/\",\"name\":\"TargetCompany ransomware \u1010\u102d\u102f\u1000\u103a\u1001\u102d\u102f\u1000\u103a\u1019\u103e\u102f\u1010\u103d\u1031\u1019\u103e\u102c Microsoft SQL servers \u1010\u103d\u1031 \u101f\u1000\u103a\u1001\u103a\u1001\u1036\u101b - Thetys\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.thetysmyanmar.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.thetysmyanmar.com\\\/blog\\\/technology\\\/targetcompany-ransomware-%e1%80%90%e1%80%ad%e1%80%af%e1%80%80%e1%80%ba%e1%80%81%e1%80%ad%e1%80%af%e1%80%80%e1%80%ba%e1%80%99%e1%80%be%e1%80%af%e1%80%90%e1%80%bd%e1%80%b1%e1%80%99%e1%80%be%e1%80%ac-mic\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.thetysmyanmar.com\\\/blog\\\/technology\\\/targetcompany-ransomware-%e1%80%90%e1%80%ad%e1%80%af%e1%80%80%e1%80%ba%e1%80%81%e1%80%ad%e1%80%af%e1%80%80%e1%80%ba%e1%80%99%e1%80%be%e1%80%af%e1%80%90%e1%80%bd%e1%80%b1%e1%80%99%e1%80%be%e1%80%ac-mic\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.thetysmyanmar.com\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2022\\\/09\\\/MSSQL.jpg\",\"datePublished\":\"2022-09-29T10:42:33+00:00\",\"dateModified\":\"2025-06-30T04:52:47+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.thetysmyanmar.com\\\/en\\\/#\\\/schema\\\/person\\\/709f4d8e04069e58c5a9a78d6fdf1fde\"},\"description\":\"Software Development , Xamarin , C# , Wordpress, TargetCompany ransomware , Microsoft SQL servers, MS-SQL servers,\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.thetysmyanmar.com\\\/blog\\\/technology\\\/targetcompany-ransomware-%e1%80%90%e1%80%ad%e1%80%af%e1%80%80%e1%80%ba%e1%80%81%e1%80%ad%e1%80%af%e1%80%80%e1%80%ba%e1%80%99%e1%80%be%e1%80%af%e1%80%90%e1%80%bd%e1%80%b1%e1%80%99%e1%80%be%e1%80%ac-mic\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.thetysmyanmar.com\\\/blog\\\/technology\\\/targetcompany-ransomware-%e1%80%90%e1%80%ad%e1%80%af%e1%80%80%e1%80%ba%e1%80%81%e1%80%ad%e1%80%af%e1%80%80%e1%80%ba%e1%80%99%e1%80%be%e1%80%af%e1%80%90%e1%80%bd%e1%80%b1%e1%80%99%e1%80%be%e1%80%ac-mic\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.thetysmyanmar.com\\\/blog\\\/technology\\\/targetcompany-ransomware-%e1%80%90%e1%80%ad%e1%80%af%e1%80%80%e1%80%ba%e1%80%81%e1%80%ad%e1%80%af%e1%80%80%e1%80%ba%e1%80%99%e1%80%be%e1%80%af%e1%80%90%e1%80%bd%e1%80%b1%e1%80%99%e1%80%be%e1%80%ac-mic\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.thetysmyanmar.com\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2022\\\/09\\\/MSSQL.jpg\",\"contentUrl\":\"https:\\\/\\\/www.thetysmyanmar.com\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2022\\\/09\\\/MSSQL.jpg\",\"width\":1600,\"height\":1066},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.thetysmyanmar.com\\\/blog\\\/technology\\\/targetcompany-ransomware-%e1%80%90%e1%80%ad%e1%80%af%e1%80%80%e1%80%ba%e1%80%81%e1%80%ad%e1%80%af%e1%80%80%e1%80%ba%e1%80%99%e1%80%be%e1%80%af%e1%80%90%e1%80%bd%e1%80%b1%e1%80%99%e1%80%be%e1%80%ac-mic\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.thetysmyanmar.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"TargetCompany ransomware \u1010\u102d\u102f\u1000\u103a\u1001\u102d\u102f\u1000\u103a\u1019\u103e\u102f\u1010\u103d\u1031\u1019\u103e\u102c Microsoft SQL servers \u1010\u103d\u1031 \u101f\u1000\u103a\u1001\u103a\u1001\u1036\u101b\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.thetysmyanmar.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.thetysmyanmar.com\\\/en\\\/\",\"name\":\"Thetys\",\"description\":\"Your One Stop Solution Service\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.thetysmyanmar.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.thetysmyanmar.com\\\/en\\\/#\\\/schema\\\/person\\\/709f4d8e04069e58c5a9a78d6fdf1fde\",\"name\":\"Mr. Jarviz\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/efb0b66f01e5755f9f212b7c062c527c2c4c4329f879f6cb248382d686b79a5c?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/efb0b66f01e5755f9f212b7c062c527c2c4c4329f879f6cb248382d686b79a5c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/efb0b66f01e5755f9f212b7c062c527c2c4c4329f879f6cb248382d686b79a5c?s=96&d=mm&r=g\",\"caption\":\"Mr. Jarviz\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TargetCompany ransomware \u1010\u102d\u102f\u1000\u103a\u1001\u102d\u102f\u1000\u103a\u1019\u103e\u102f\u1010\u103d\u1031\u1019\u103e\u102c Microsoft SQL servers \u1010\u103d\u1031 \u101f\u1000\u103a\u1001\u103a\u1001\u1036\u101b - Thetys","description":"Software Development , Xamarin , C# , Wordpress, TargetCompany ransomware , Microsoft SQL servers, MS-SQL servers,","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.thetysmyanmar.com\/en\/blog\/technology\/targetcompany-ransomware-\u1010\u102d\u102f\u1000\u103a\u1001\u102d\u102f\u1000\u103a\u1019\u103e\u102f\u1010\u103d\u1031\u1019\u103e\u102c-mic\/","og_locale":"en_US","og_type":"article","og_title":"TargetCompany ransomware \u1010\u102d\u102f\u1000\u103a\u1001\u102d\u102f\u1000\u103a\u1019\u103e\u102f\u1010\u103d\u1031\u1019\u103e\u102c Microsoft SQL servers \u1010\u103d\u1031 \u101f\u1000\u103a\u1001\u103a\u1001\u1036\u101b - Thetys","og_description":"Software Development , Xamarin , C# , Wordpress, TargetCompany ransomware , Microsoft SQL servers, MS-SQL servers,","og_url":"https:\/\/www.thetysmyanmar.com\/en\/blog\/technology\/targetcompany-ransomware-\u1010\u102d\u102f\u1000\u103a\u1001\u102d\u102f\u1000\u103a\u1019\u103e\u102f\u1010\u103d\u1031\u1019\u103e\u102c-mic\/","og_site_name":"Thetys","article_publisher":"https:\/\/www.facebook.com\/thetysmm","article_published_time":"2022-09-29T10:42:33+00:00","article_modified_time":"2025-06-30T04:52:47+00:00","og_image":[{"width":1600,"height":1066,"url":"https:\/\/www.thetysmyanmar.com\/wp-content\/uploads\/sites\/13\/2022\/09\/MSSQL.jpg","type":"image\/jpeg"}],"author":"Mr. Jarviz","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Mr. Jarviz","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.thetysmyanmar.com\/blog\/technology\/targetcompany-ransomware-%e1%80%90%e1%80%ad%e1%80%af%e1%80%80%e1%80%ba%e1%80%81%e1%80%ad%e1%80%af%e1%80%80%e1%80%ba%e1%80%99%e1%80%be%e1%80%af%e1%80%90%e1%80%bd%e1%80%b1%e1%80%99%e1%80%be%e1%80%ac-mic\/#article","isPartOf":{"@id":"https:\/\/www.thetysmyanmar.com\/blog\/technology\/targetcompany-ransomware-%e1%80%90%e1%80%ad%e1%80%af%e1%80%80%e1%80%ba%e1%80%81%e1%80%ad%e1%80%af%e1%80%80%e1%80%ba%e1%80%99%e1%80%be%e1%80%af%e1%80%90%e1%80%bd%e1%80%b1%e1%80%99%e1%80%be%e1%80%ac-mic\/"},"author":{"name":"Mr. Jarviz","@id":"https:\/\/www.thetysmyanmar.com\/en\/#\/schema\/person\/709f4d8e04069e58c5a9a78d6fdf1fde"},"headline":"TargetCompany ransomware \u1010\u102d\u102f\u1000\u103a\u1001\u102d\u102f\u1000\u103a\u1019\u103e\u102f\u1010\u103d\u1031\u1019\u103e\u102c Microsoft SQL servers \u1010\u103d\u1031 \u101f\u1000\u103a\u1001\u103a\u1001\u1036\u101b","datePublished":"2022-09-29T10:42:33+00:00","dateModified":"2025-06-30T04:52:47+00:00","mainEntityOfPage":{"@id":"https:\/\/www.thetysmyanmar.com\/blog\/technology\/targetcompany-ransomware-%e1%80%90%e1%80%ad%e1%80%af%e1%80%80%e1%80%ba%e1%80%81%e1%80%ad%e1%80%af%e1%80%80%e1%80%ba%e1%80%99%e1%80%be%e1%80%af%e1%80%90%e1%80%bd%e1%80%b1%e1%80%99%e1%80%be%e1%80%ac-mic\/"},"wordCount":1588,"commentCount":0,"image":{"@id":"https:\/\/www.thetysmyanmar.com\/blog\/technology\/targetcompany-ransomware-%e1%80%90%e1%80%ad%e1%80%af%e1%80%80%e1%80%ba%e1%80%81%e1%80%ad%e1%80%af%e1%80%80%e1%80%ba%e1%80%99%e1%80%be%e1%80%af%e1%80%90%e1%80%bd%e1%80%b1%e1%80%99%e1%80%be%e1%80%ac-mic\/#primaryimage"},"thumbnailUrl":"https:\/\/www.thetysmyanmar.com\/wp-content\/uploads\/sites\/13\/2022\/09\/MSSQL.jpg","articleSection":["Blog","Technology"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.thetysmyanmar.com\/blog\/technology\/targetcompany-ransomware-%e1%80%90%e1%80%ad%e1%80%af%e1%80%80%e1%80%ba%e1%80%81%e1%80%ad%e1%80%af%e1%80%80%e1%80%ba%e1%80%99%e1%80%be%e1%80%af%e1%80%90%e1%80%bd%e1%80%b1%e1%80%99%e1%80%be%e1%80%ac-mic\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.thetysmyanmar.com\/blog\/technology\/targetcompany-ransomware-%e1%80%90%e1%80%ad%e1%80%af%e1%80%80%e1%80%ba%e1%80%81%e1%80%ad%e1%80%af%e1%80%80%e1%80%ba%e1%80%99%e1%80%be%e1%80%af%e1%80%90%e1%80%bd%e1%80%b1%e1%80%99%e1%80%be%e1%80%ac-mic\/","url":"https:\/\/www.thetysmyanmar.com\/blog\/technology\/targetcompany-ransomware-%e1%80%90%e1%80%ad%e1%80%af%e1%80%80%e1%80%ba%e1%80%81%e1%80%ad%e1%80%af%e1%80%80%e1%80%ba%e1%80%99%e1%80%be%e1%80%af%e1%80%90%e1%80%bd%e1%80%b1%e1%80%99%e1%80%be%e1%80%ac-mic\/","name":"TargetCompany ransomware \u1010\u102d\u102f\u1000\u103a\u1001\u102d\u102f\u1000\u103a\u1019\u103e\u102f\u1010\u103d\u1031\u1019\u103e\u102c Microsoft SQL servers \u1010\u103d\u1031 \u101f\u1000\u103a\u1001\u103a\u1001\u1036\u101b - Thetys","isPartOf":{"@id":"https:\/\/www.thetysmyanmar.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.thetysmyanmar.com\/blog\/technology\/targetcompany-ransomware-%e1%80%90%e1%80%ad%e1%80%af%e1%80%80%e1%80%ba%e1%80%81%e1%80%ad%e1%80%af%e1%80%80%e1%80%ba%e1%80%99%e1%80%be%e1%80%af%e1%80%90%e1%80%bd%e1%80%b1%e1%80%99%e1%80%be%e1%80%ac-mic\/#primaryimage"},"image":{"@id":"https:\/\/www.thetysmyanmar.com\/blog\/technology\/targetcompany-ransomware-%e1%80%90%e1%80%ad%e1%80%af%e1%80%80%e1%80%ba%e1%80%81%e1%80%ad%e1%80%af%e1%80%80%e1%80%ba%e1%80%99%e1%80%be%e1%80%af%e1%80%90%e1%80%bd%e1%80%b1%e1%80%99%e1%80%be%e1%80%ac-mic\/#primaryimage"},"thumbnailUrl":"https:\/\/www.thetysmyanmar.com\/wp-content\/uploads\/sites\/13\/2022\/09\/MSSQL.jpg","datePublished":"2022-09-29T10:42:33+00:00","dateModified":"2025-06-30T04:52:47+00:00","author":{"@id":"https:\/\/www.thetysmyanmar.com\/en\/#\/schema\/person\/709f4d8e04069e58c5a9a78d6fdf1fde"},"description":"Software Development , Xamarin , C# , Wordpress, TargetCompany ransomware , Microsoft SQL servers, MS-SQL servers,","breadcrumb":{"@id":"https:\/\/www.thetysmyanmar.com\/blog\/technology\/targetcompany-ransomware-%e1%80%90%e1%80%ad%e1%80%af%e1%80%80%e1%80%ba%e1%80%81%e1%80%ad%e1%80%af%e1%80%80%e1%80%ba%e1%80%99%e1%80%be%e1%80%af%e1%80%90%e1%80%bd%e1%80%b1%e1%80%99%e1%80%be%e1%80%ac-mic\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.thetysmyanmar.com\/blog\/technology\/targetcompany-ransomware-%e1%80%90%e1%80%ad%e1%80%af%e1%80%80%e1%80%ba%e1%80%81%e1%80%ad%e1%80%af%e1%80%80%e1%80%ba%e1%80%99%e1%80%be%e1%80%af%e1%80%90%e1%80%bd%e1%80%b1%e1%80%99%e1%80%be%e1%80%ac-mic\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.thetysmyanmar.com\/blog\/technology\/targetcompany-ransomware-%e1%80%90%e1%80%ad%e1%80%af%e1%80%80%e1%80%ba%e1%80%81%e1%80%ad%e1%80%af%e1%80%80%e1%80%ba%e1%80%99%e1%80%be%e1%80%af%e1%80%90%e1%80%bd%e1%80%b1%e1%80%99%e1%80%be%e1%80%ac-mic\/#primaryimage","url":"https:\/\/www.thetysmyanmar.com\/wp-content\/uploads\/sites\/13\/2022\/09\/MSSQL.jpg","contentUrl":"https:\/\/www.thetysmyanmar.com\/wp-content\/uploads\/sites\/13\/2022\/09\/MSSQL.jpg","width":1600,"height":1066},{"@type":"BreadcrumbList","@id":"https:\/\/www.thetysmyanmar.com\/blog\/technology\/targetcompany-ransomware-%e1%80%90%e1%80%ad%e1%80%af%e1%80%80%e1%80%ba%e1%80%81%e1%80%ad%e1%80%af%e1%80%80%e1%80%ba%e1%80%99%e1%80%be%e1%80%af%e1%80%90%e1%80%bd%e1%80%b1%e1%80%99%e1%80%be%e1%80%ac-mic\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.thetysmyanmar.com\/"},{"@type":"ListItem","position":2,"name":"TargetCompany ransomware \u1010\u102d\u102f\u1000\u103a\u1001\u102d\u102f\u1000\u103a\u1019\u103e\u102f\u1010\u103d\u1031\u1019\u103e\u102c Microsoft SQL servers \u1010\u103d\u1031 \u101f\u1000\u103a\u1001\u103a\u1001\u1036\u101b"}]},{"@type":"WebSite","@id":"https:\/\/www.thetysmyanmar.com\/en\/#website","url":"https:\/\/www.thetysmyanmar.com\/en\/","name":"Thetys","description":"Your One Stop Solution Service","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.thetysmyanmar.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.thetysmyanmar.com\/en\/#\/schema\/person\/709f4d8e04069e58c5a9a78d6fdf1fde","name":"Mr. Jarviz","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/efb0b66f01e5755f9f212b7c062c527c2c4c4329f879f6cb248382d686b79a5c?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/efb0b66f01e5755f9f212b7c062c527c2c4c4329f879f6cb248382d686b79a5c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/efb0b66f01e5755f9f212b7c062c527c2c4c4329f879f6cb248382d686b79a5c?s=96&d=mm&r=g","caption":"Mr. Jarviz"}}]}},"_links":{"self":[{"href":"https:\/\/www.thetysmyanmar.com\/en\/wp-json\/wp\/v2\/posts\/2092","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.thetysmyanmar.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.thetysmyanmar.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.thetysmyanmar.com\/en\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.thetysmyanmar.com\/en\/wp-json\/wp\/v2\/comments?post=2092"}],"version-history":[{"count":0,"href":"https:\/\/www.thetysmyanmar.com\/en\/wp-json\/wp\/v2\/posts\/2092\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.thetysmyanmar.com\/en\/wp-json\/wp\/v2\/media\/2093"}],"wp:attachment":[{"href":"https:\/\/www.thetysmyanmar.com\/en\/wp-json\/wp\/v2\/media?parent=2092"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.thetysmyanmar.com\/en\/wp-json\/wp\/v2\/categories?post=2092"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.thetysmyanmar.com\/en\/wp-json\/wp\/v2\/tags?post=2092"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}