Similar to malware like W32.Stuxnet—designed to tamper with industrial automation systems—and other destructive examples—such as W32.Disstrack and W32.Flamer, which can both wipe out data and files from hard disks—W32.Narilam is targeting and modifying corporate databases. W32.Narilam is active predominantly in the Middle East. http://alrt.co/VMypCT
Takeaway: Unless appropriate backups are in place, the affected database will be difficult to restore. The affected organization will likely suffer a significant disruption and even financial loss while restoring thedatabase. As the malware is aimed at sabotaging the affected database and does not make a copy of the original database first, those affected by this threat will have a long road to recovery ahead of them.