• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
hackers backdoor unpatched microsoft sql database servers with cobalt strike

Hackers Backdoor Unpatched Microsoft SQL Database Servers with Cobalt Strike

You are here: Home / General Cyber Security News / Hackers Backdoor Unpatched Microsoft SQL Database Servers with Cobalt Strike
February 22, 2022

Vulnerable internet-experiencing Microsoft SQL (MS SQL) Servers are becoming targeted by danger actors as component of a new campaign to deploy the Cobalt Strike adversary simulation tool on compromised hosts.

“Attacks that concentrate on MS SQL servers involve attacks to the surroundings the place its vulnerability has not been patched, brute forcing, and dictionary attack in opposition to inadequately managed servers,” South Korean cybersecurity company AhnLab Security Crisis Reaction Middle (ASEC) explained in a report printed Monday.

Automatic GitHub Backups

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Cobalt Strike is a professional, entire-showcased penetration screening framework that makes it possible for an attacker to deploy an agent named “Beacon” on the sufferer machine, granting the operator remote obtain to the system. While billed as a red staff risk simulation system, cracked variations of the software package have been actively applied by a huge vary of threat actors.

Intrusions observed by ASEC include the unidentified actor scanning port 1433 to examine for exposed MS SQL servers to execute brute force or dictionary attacks in opposition to the procedure administrator account, i.e., “sa” account, to attempt a log in.

Microsoft SQL Database Servers

That’s not to say that servers not still left available more than the internet are not vulnerable, what with the threat actor guiding LemonDuck malware scanning the similar port to laterally move throughout the network.

“Controlling admin account credentials so that they are susceptible to brute forcing and dictionary attacks as earlier mentioned or failing to modify the credentials periodically may perhaps make the MS-SQL server the principal goal of attackers,” the researchers reported.

Upon productively getting a foothold, the upcoming period of the attack functions by spawning a Windows command shell via the MS SQL “sqlservr.exe” method to download the upcoming-stage payload that residences the encoded Cobalt Strike binary on to the program.

Prevent Data Breaches

The attacks eventually culminate with the malware decoding the Cobalt Strike executable, followed by injecting it into the respectable Microsoft Make Motor (MSBuild) method, which has been formerly abused by malicious actors to filelessly produce remote entry trojans and password-stealing malware on targeted Windows programs.

Furthermore, the Cobalt Strike that is executed in MSBuild.exe will come with more configurations to evade detection of security computer software. It achieves this by loading “wwanmm.dll,” a Windows library for WWan Media Supervisor, then writing and working the Beacon in the memory spot of the DLL.

“As the beacon that gets the attacker’s command and performs the malicious behavior does not exist in a suspicious memory space and alternatively operates in the ordinary module wwanmm.dll, it can bypass memory-based mostly detection,” the researchers pointed out.

Discovered this posting attention-grabbing? Observe THN on Fb, Twitter  and LinkedIn to study much more distinctive articles we submit.


Some areas of this post are sourced from:
thehackernews.com

Previous Post: «Cyber Security News Teen Framed for Cybercrime Files Lawsuit
Next Post: Chinese Hackers Target Taiwan’s Financial Trading Sector with Supply Chain Attack chinese hackers target taiwan's financial trading sector with supply chain»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors
  • Top 10 Best Practices for Effective Data Protection
  • Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks
  • Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks
  • [Webinar] From Code to Cloud to SOC: Learn a Smarter Way to Defend Modern Applications
  • Meta to Train AI on E.U. User Data From May 27 Without Consent; Noyb Threatens Lawsuit
  • Coinbase Agents Bribed, Data of ~1% Users Leaked; $20M Extortion Attempt Fails
  • Pen Testing for Compliance Only? It’s Time to Change Your Approach
  • 5 BCDR Essentials for Effective Ransomware Defense
  • Russia-Linked APT28 Exploited MDaemon Zero-Day to Hack Government Webmail Servers

Copyright © TheCyberSecurity.News, All Rights Reserved.