Cyber Security News

Hackers Exploit MS-SQL Servers to Deploy Ammyy Admin for Remote Access

A sophisticated cyberattack campaign has surfaced, targeting poorly managed Microsoft SQL (MS-SQL) servers to deploy malicious tools like Ammyy Admin and PetitPotato malware.

Cybersecurity researchers have observed attackers exploiting vulnerabilities in these servers to gain unauthorized access, execute commands for reconnaissance, and install malware that facilitates remote access and privilege escalation.

This emerging threat underscores the critical need for robust security measures to protect database environments, which are often a gateway to sensitive organizational data.

New Threat Campaign Targets Vulnerable Database Servers

The attack begins with adversaries identifying and exploiting misconfigured or unpatched MS-SQL servers, leveraging weak credentials or known vulnerabilities to infiltrate systems.

Once inside, they execute commands to gather detailed system information, mapping out the environment for further exploitation.

The attackers then use tools like WGet to download and install malware payloads, including Ammyy Admin, a legitimate remote desktop software frequently abused for malicious purposes, and PetitPotato, a lesser-known but potent malware designed for privilege escalation.

These tools enable attackers to maintain a foothold in the compromised system, allowing for lateral movement across the network and deeper penetration into critical infrastructure.

Persistent Access Through RDP and Rogue Accounts

Beyond deploying malware, the attackers take steps to ensure long-term access to the compromised servers.

They enable Remote Desktop Protocol (RDP) services, often disabled by default on many systems, to create a backdoor for future access.

Additionally, they create new user accounts with elevated privileges, embedding themselves within the system to evade detection and maintain persistence even if initial access points are secured.

This multi-layered approach highlights the sophistication of the campaign, as attackers combine technical exploits with strategic persistence mechanisms to maximize their control over targeted environments.

The ultimate goal appears to be sustained access for data theft, ransomware deployment, or other malicious activities that could disrupt business operations or compromise sensitive information.

Symantec has identified and provided protections against this threat, categorizing associated indicators across multiple detection layers.

File-based signatures such as Hacktool.Gen, Hacktool.Porttran, Trojan.Gen.MBT, and WS.Malware.1 are flagged to intercept malicious artifacts.

Machine learning-based detections, including Heur.AdvML.A!300, Heur.AdvML.B, and variants like Heur.AdvML.B!200, enhance proactive identification of evolving threats.

Web-based protections cover observed malicious domains and IPs under WebPulse-enabled security categories, while Carbon Black-based solutions from VMware block known, suspect, and potentially unwanted programs (PUPs) through existing policies.

Symantec recommends enforcing strict execution blocking and leveraging cloud scan delays in VMware Carbon Black Cloud for optimal reputation-based protection.

This campaign serves as a stark reminder of the dangers posed by neglected server management, particularly for MS-SQL environments that are often exposed due to misconfigurations or outdated security practices.

Organizations are urged to prioritize regular patching, enforce strong authentication mechanisms, disable unnecessary services like RDP when not in use, and monitor for suspicious account creation or network activity.

By adopting a multi-layered security posture combining endpoint protection, behavioral analysis, and network monitoring businesses can mitigate the risks posed by such targeted attacks.

As cybercriminals continue to refine their tactics, staying ahead of these threats demands vigilance, proactive defense strategies, and a commitment to securing critical infrastructure against evolving malware campaigns like this one.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Aman Mishra

Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Recent Posts

Microsoft Patch Tuesday May 2025 Released With the Fixes for 72 Flaws With 5 Actively Exploited 0-Day

Microsoft has released its May 2025 Patch Tuesday updates, addressing 72 security vulnerabilities across its…

10 hours ago

Ivanti Released Security Updates to Fix for the Mutiple RCE Vulnerabilities – Patch Now

Ivanti, a leading enterprise software provider, has released critical security updates addressing vulnerabilities across several…

11 hours ago

Fortinet FortiVoice Zero-day Vulnerability Actively Exploited in The Wild

A critical stack-based buffer overflow vulnerability (CWE-121) has been discovered in multiple Fortinet products, including…

12 hours ago

Ransomware Attacks Surge by 123% Amid Evolving Tactics and Strategies

The 2025 Third-Party Breach Report from Black Kite highlights a staggering 123% surge in ransomware…

12 hours ago

Researchers Introduce Mythic Framework Agent to Enhance Pentesting Tool Performance

Penetration testing is still essential for upholding strong security procedures in a time when cybersecurity…

12 hours ago

Swan Vector APT Targets Organizations with Malicious LNK and DLL Implants

A newly identified advanced persistent threat (APT) campaign, dubbed "Swan Vector" by Seqrite Labs, has…

12 hours ago