Mallox ransomware has been active since mid-2021, with a surge in activity between September and December 2022. It is also known as “TargetCompany” or “Fargo” ransomware. Mallox payloads are usually .NET-based .EXE or .DLL files that can be spread through various methods, including exposed MS-SQL servers and phishing/spam emails. It uses a combination of AES-128 and ChaCha20 for encryption and terminates a list of processes and services without attempting to hide its malicious activity. The extortion group encrypts victims’ data and threatens to post it on their public TOR-based sites.
SentinelOne PartnerOne - America's 2025
⛳️ Last week in Pebble Beach the America's best cybersecurity partners came together for our annual PartnerOne summit. Check out…
Just a Sec: Cybersecurity Unfiltered—Fast, Frank, and From the Front Lines
Welcome to the first-ever Just A Sec, a no-holds-barred, quick-fire monthly livestream. It’s cybersecurity like you’ve never heard it before—unfiltered,…
See how our intelligent, autonomous cybersecurity platform harnesses the power of data and AI to protect your organization now and into the future.