Narilam malware destroys businesses' SQL databases

Latest discovery by Symantec could wreak havoc on business critical systems

spider in digital tunnel

Security and anti-malware company Symantec has identified a new worm that is attacking business IT systems and destroying their databases.

The threat, dubbed W32.Narilam, is predominantly active in the Middle East, according to the company's field tests. However, it has also been detected in the USA and UK.

Narilam is not the first malware to target businesses. Stuxnet, which was first discovered in 2010, targeted Siemens industrial software and equipment, while Flame, which was discovered in May 2012, is a spyware programme. Like Narilam, Stuxnet and Flame were originally centred in the Middle East, specifically Iran, and spread from there.

However, Narilam differs from other malware in that it only targets SQL databases, damaging the information they contain.

"Given the types of objects that the threat searches for, the targeted databases seem to be related to ordering, accounting, or customer management systems belonging to corporations," Symantec said in a blog post.

"Our in-field telemetry indicates that the vast majority of users impacted by this threat are corporate users. This fact is consistent with the functionality contained within the threat. The types of databases that this threat is looking for is unlikely to be found in the systems of home users," the organisation added.

As the worm damages the databases by entering random values into the SQL code, Symantec is warning that unless appropriate backups are in place, those affected will be very difficult to restore and the disruption caused could even cause companies to suffer financial losses.

"Symantec users with the latest definitions are protected from W32.Narilam; however, we strongly recommend that important databases be backed up regularly," the company concluded.

Featured Resources

Shining light on new 'cool' cloud technologies and their drawbacks

IONOS Cloud Up! Summit, Cloud Technology Session with Russell Barley

Watch now

Build mobile and web apps faster

Three proven tips to accelerate modern app development

Free download

Reduce the carbon footprint of IT operations up to 88%

A carbon reduction opportunity

Free Download

Comparing serverless and server-based technologies

Determining the total cost of ownership

Free download

Recommended

Hackers could use new Wslink malware in highly targeted cyber attacks
malware

Hackers could use new Wslink malware in highly targeted cyber attacks

1 Nov 2021
FBI raids Chinese POS business following cyber attack claims
malware

FBI raids Chinese POS business following cyber attack claims

27 Oct 2021
Malware developers create malformed code signatures to avoid detection
malware

Malware developers create malformed code signatures to avoid detection

24 Sep 2021
New malware uses search engine ads to target pirate gamers
malware

New malware uses search engine ads to target pirate gamers

21 Jul 2021

Most Popular

What should you really be asking about your remote access software?
Sponsored

What should you really be asking about your remote access software?

17 Nov 2021
What are the pros and cons of AI?
machine learning

What are the pros and cons of AI?

30 Nov 2021
How to move Microsoft's Windows 11 from a hard drive to an SSD
Microsoft Windows

How to move Microsoft's Windows 11 from a hard drive to an SSD

24 Nov 2021