• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
microsoft warns of cyber attacks attempting to breach cloud via

Microsoft Warns of Cyber Attacks Attempting to Breach Cloud via SQL Server Instance

You are here: Home / General Cyber Security News / Microsoft Warns of Cyber Attacks Attempting to Breach Cloud via SQL Server Instance
October 4, 2023

Microsoft has detailed a new marketing campaign in which attackers unsuccessfully tried to go laterally to a cloud atmosphere by a SQL Server instance.

“The attackers originally exploited a SQL injection vulnerability in an software within just the target’s ecosystem,” security scientists Sunders Bruskin, Hagai Ran Kestenberg, and Fady Nasereldeen mentioned in a Tuesday report.

“This authorized the attacker to acquire entry and elevated permissions on a Microsoft SQL Server occasion deployed in Azure Virtual Equipment (VM).”

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


In the upcoming phase, the risk actors leveraged the new permissions to attempt to shift laterally to supplemental cloud resources by abusing the server’s cloud identity, which may possibly possess elevated permissions to likely have out various malicious actions in the cloud that the id has access to.

Cybersecurity

Microsoft reported it did not obtain any proof to recommend that the attackers efficiently moved laterally to the cloud means working with the system.

“Cloud products and services like Azure use managed identities for allocating identities to the numerous cloud sources,” the researchers reported. “All those identities are employed for authentication with other cloud means and solutions.”

The starting up position of the attack chain is an SQL injection in opposition to the databases server that enables the adversary to operate queries to gather information about the host, databases, and network configuration.

In the observed intrusions, it truly is suspected that the software focused with the SQL injection vulnerability experienced elevated permissions, which permitted the attackers to permit the xp_cmdshell solution to launch operating technique instructions to commence to the up coming period.

Microsoft

This included conducting reconnaissance, downloading executables and PowerShell scripts, and setting up persistence by means of a scheduled activity to start a backdoor script.

Facts exfiltration is accomplished by getting edge of a publicly obtainable instrument identified as webhook[.]web page in an energy to remain beneath the radar, because outgoing targeted visitors to the services is considered reputable and not likely to be flagged.

“The attackers tried using making use of the cloud identification of the SQL Server occasion by accessing the [instance metadata service] and getting the cloud identity entry important,” the scientists said. “The request to IMDS identity’s endpoint returns the security credentials (identification token) for the cloud identification.”

Cybersecurity

The top aim of the procedure appears to have been to abuse the token to complete numerous functions on cloud resources, which includes lateral motion across the cloud surroundings, whilst it finished in failure thanks to an unspecified mistake.

The improvement underscores the developing sophistication of cloud-centered attack tactics, with negative actors consistently on the lookout for around-privileged processes, accounts, managed identities, and databases connections to carry out additional malicious activities.

“This is a approach we are familiar with in other cloud services this kind of as VMs and Kubernetes cluster but haven’t viewed ahead of in SQL Server instances,” the researchers concluded.

“Not adequately securing cloud identities can expose SQL Server circumstances and cloud methods to identical pitfalls. This approach gives an opportunity for the attackers to achieve higher impression not only on the SQL Server situations but also on the involved cloud means.”

Identified this report interesting? Abide by us on Twitter  and LinkedIn to browse extra exclusive content material we post.


Some sections of this article are sourced from:
thehackernews.com

Previous Post: «looney tunables: new linux flaw enables privilege escalation on major Looney Tunables: New Linux Flaw Enables Privilege Escalation on Major Distributions
Next Post: Rogue npm Package Deploys Open-Source Rootkit in New Supply Chain Attack rogue npm package deploys open source rootkit in new supply chain»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • New FjordPhantom Android Malware Targets Banking Apps in Southeast Asia
  • Qakbot Takedown Aftermath: Mitigations and Protecting Against Future Threats
  • Chinese Hackers Using SugarGh0st RAT to Target South Korea and Uzbekistan
  • Discover How Gcore Thwarted Powerful 1.1Tbps and 1.6Tbps DDoS Attacks
  • WhatsApp’s New Secret Code Feature Lets Users Protect Private Chats with Password
  • U.S. Treasury Sanctions North Korean Kimsuky Hackers and 8 Foreign Agents
  • Zyxel Releases Patches to Fix 15 Flaws in NAS, Firewall, and AP Devices
  • Zero-Day Alert: Apple Rolls Out iOS, macOS, and Safari Patches for 2 Actively Exploited Flaws
  • Google Unveils RETVec – Gmail’s New Defense Against Spam and Malicious Emails
  • North Korea’s Lazarus Group Rakes in $3 Billion from Cryptocurrency Hacks

Copyright © TheCyberSecurity.News, All Rights Reserved.