Narilam malware destroys businesses' SQL databases

Latest discovery by Symantec could wreak havoc on business critical systems

spider in digital tunnel

Security and anti-malware company Symantec has identified a new worm that is attacking business IT systems and destroying their databases.

The threat, dubbed W32.Narilam, is predominantly active in the Middle East, according to the company's field tests. However, it has also been detected in the USA and UK.

Narilam is not the first malware to target businesses. Stuxnet, which was first discovered in 2010, targeted Siemens industrial software and equipment, while Flame, which was discovered in May 2012, is a spyware programme. Like Narilam, Stuxnet and Flame were originally centred in the Middle East, specifically Iran, and spread from there.

However, Narilam differs from other malware in that it only targets SQL databases, damaging the information they contain.

"Given the types of objects that the threat searches for, the targeted databases seem to be related to ordering, accounting, or customer management systems belonging to corporations," Symantec said in a blog post.

"Our in-field telemetry indicates that the vast majority of users impacted by this threat are corporate users. This fact is consistent with the functionality contained within the threat. The types of databases that this threat is looking for is unlikely to be found in the systems of home users," the organisation added.

As the worm damages the databases by entering random values into the SQL code, Symantec is warning that unless appropriate backups are in place, those affected will be very difficult to restore and the disruption caused could even cause companies to suffer financial losses.

"Symantec users with the latest definitions are protected from W32.Narilam; however, we strongly recommend that important databases be backed up regularly," the company concluded.

Featured Resources

The complete guide to changing your phone system provider

Optimise your phone system for better business results

Download now

Simplify cluster security at scale

Centralised secrets management across hybrid, multi-cloud environments

Download now

The endpoint as a key element of your security infrastructure

Threats to endpoints in a world of remote working

Download now

2021 state of IT asset management report

The role of IT asset management for maximising technology investments

Download now

Recommended

Ryuk behind a third of all ransomware attacks in 2020
Security

Ryuk behind a third of all ransomware attacks in 2020

29 Oct 2020
REvil hacking group says it has made more than $100m in a year
Security

REvil hacking group says it has made more than $100m in a year

29 Oct 2020
36 billion personal records exposed by hacks in 2020 so far
Security

36 billion personal records exposed by hacks in 2020 so far

29 Oct 2020
Trump website defaced in second successive cyber breach
Security

Trump website defaced in second successive cyber breach

28 Oct 2020

Most Popular

Do smart devices make us less intelligent?
artificial intelligence (AI)

Do smart devices make us less intelligent?

19 Oct 2020
Politicians need to stop talking about technology
Policy & legislation

Politicians need to stop talking about technology

21 Oct 2020
Best MDM solutions 2020
mobile device management (MDM)

Best MDM solutions 2020

21 Oct 2020