Wednesday, May 14, 2025
Homecyber securityHackers Exploit MS-SQL Servers to Deploy Ammyy Admin for Remote Access

Hackers Exploit MS-SQL Servers to Deploy Ammyy Admin for Remote Access

Published on

SIEM as a Service

Follow Us on Google News

A sophisticated cyberattack campaign has surfaced, targeting poorly managed Microsoft SQL (MS-SQL) servers to deploy malicious tools like Ammyy Admin and PetitPotato malware.

Cybersecurity researchers have observed attackers exploiting vulnerabilities in these servers to gain unauthorized access, execute commands for reconnaissance, and install malware that facilitates remote access and privilege escalation.

This emerging threat underscores the critical need for robust security measures to protect database environments, which are often a gateway to sensitive organizational data.

- Advertisement - Google News

New Threat Campaign Targets Vulnerable Database Servers

The attack begins with adversaries identifying and exploiting misconfigured or unpatched MS-SQL servers, leveraging weak credentials or known vulnerabilities to infiltrate systems.

Once inside, they execute commands to gather detailed system information, mapping out the environment for further exploitation.

The attackers then use tools like WGet to download and install malware payloads, including Ammyy Admin, a legitimate remote desktop software frequently abused for malicious purposes, and PetitPotato, a lesser-known but potent malware designed for privilege escalation.

These tools enable attackers to maintain a foothold in the compromised system, allowing for lateral movement across the network and deeper penetration into critical infrastructure.

Persistent Access Through RDP and Rogue Accounts

Beyond deploying malware, the attackers take steps to ensure long-term access to the compromised servers.

They enable Remote Desktop Protocol (RDP) services, often disabled by default on many systems, to create a backdoor for future access.

Additionally, they create new user accounts with elevated privileges, embedding themselves within the system to evade detection and maintain persistence even if initial access points are secured.

This multi-layered approach highlights the sophistication of the campaign, as attackers combine technical exploits with strategic persistence mechanisms to maximize their control over targeted environments.

The ultimate goal appears to be sustained access for data theft, ransomware deployment, or other malicious activities that could disrupt business operations or compromise sensitive information.

Symantec has identified and provided protections against this threat, categorizing associated indicators across multiple detection layers.

File-based signatures such as Hacktool.Gen, Hacktool.Porttran, Trojan.Gen.MBT, and WS.Malware.1 are flagged to intercept malicious artifacts.

Machine learning-based detections, including Heur.AdvML.A!300, Heur.AdvML.B, and variants like Heur.AdvML.B!200, enhance proactive identification of evolving threats.

Web-based protections cover observed malicious domains and IPs under WebPulse-enabled security categories, while Carbon Black-based solutions from VMware block known, suspect, and potentially unwanted programs (PUPs) through existing policies.

Symantec recommends enforcing strict execution blocking and leveraging cloud scan delays in VMware Carbon Black Cloud for optimal reputation-based protection.

This campaign serves as a stark reminder of the dangers posed by neglected server management, particularly for MS-SQL environments that are often exposed due to misconfigurations or outdated security practices.

Organizations are urged to prioritize regular patching, enforce strong authentication mechanisms, disable unnecessary services like RDP when not in use, and monitor for suspicious account creation or network activity.

By adopting a multi-layered security posture combining endpoint protection, behavioral analysis, and network monitoring businesses can mitigate the risks posed by such targeted attacks.

As cybercriminals continue to refine their tactics, staying ahead of these threats demands vigilance, proactive defense strategies, and a commitment to securing critical infrastructure against evolving malware campaigns like this one.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Microsoft Patch Tuesday May 2025 Released With the Fixes for 72 Flaws With 5 Actively Exploited 0-Day

Microsoft has released its May 2025 Patch Tuesday updates, addressing 72 security vulnerabilities across...

Ivanti Released Security Updates to Fix for the Mutiple RCE Vulnerabilities – Patch Now

Ivanti, a leading enterprise software provider, has released critical security updates addressing vulnerabilities across...

Fortinet FortiVoice Zero-day Vulnerability Actively Exploited in The Wild

A critical stack-based buffer overflow vulnerability (CWE-121) has been discovered in multiple Fortinet products,...

Ransomware Attacks Surge by 123% Amid Evolving Tactics and Strategies

The 2025 Third-Party Breach Report from Black Kite highlights a staggering 123% surge in...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Microsoft Patch Tuesday May 2025 Released With the Fixes for 72 Flaws With 5 Actively Exploited 0-Day

Microsoft has released its May 2025 Patch Tuesday updates, addressing 72 security vulnerabilities across...

Ivanti Released Security Updates to Fix for the Mutiple RCE Vulnerabilities – Patch Now

Ivanti, a leading enterprise software provider, has released critical security updates addressing vulnerabilities across...

Fortinet FortiVoice Zero-day Vulnerability Actively Exploited in The Wild

A critical stack-based buffer overflow vulnerability (CWE-121) has been discovered in multiple Fortinet products,...