There has been a discovery of a new type of malware by security researchers named, Maggie, which targets Microsoft SQL servers. Around the world, hundreds of computers have already become infected with the Maggie backdoor.
Maggie is controlled by SQL queries that are executed on the database. Microsoft SQL server admin logins can be hacked, and duplication can be done as a bridge with the network environment of the server.
The cybersecurity analysts, Johann Aydinbas and Axel Wauer of the DCSO CyTec were responsible for discovering the backdoor. Maggie has been detected more frequently in the countries listed below, based on the telemetry data:-
In order for Maggie to operate successfully, it can masquerade itself as a DLL extension which sports an Extended Stored Procedure signature that is signed by a South Korean company, DEEPSoft Co. Ltd.
With an API, extended stored procedures can be enhanced to provide more functionality when running SQL queries. While this API accepts the:-
Through a series of 51 commands, remote access is possible to the backdoor. And here below in the image, you can see all those 51 commands:-
Maggie is capable of performing a wide range of actions with the help of commands, such as:-
Maggie even offers usage instructions for some of these supported arguments, in the case where the attackers are able to append arguments to these commands.
A total of four Exploit commands are also included in the command list. It’s a clear indication that certain actions, such as adding a new user, may be reliant on known vulnerabilities to be performed by the attacker.
After specifying a password list file and a thread count, a brute force attack on admin passwords is conducted by executing the following commands:-
A TCP redirection feature is also provided by the malware. The infected MS-SQL server can thus be accessed remotely from any IP address accessible by the attacker.
Maggie will redirect any incoming connections to the specified IP address and port if this feature is enabled in the system. Currently, there is some information that is not yet known, such as:-
What’s most significant is that the threat has already been identified by the researchers and IOCs have been shared. However, the cybersecurity experts have affirmed that they will continue their investigation to find the answers for the above mentioned questions.
Also Read: Download Secure Web Filtering – Free E-book
A critical security flaw has been uncovered in certain TP-Link routers, potentially allowing malicious actors…
SilkSpecter, a Chinese financially motivated threat actor, launched a sophisticated phishing campaign targeting e-commerce shoppers…
The research revealed how threat actors exploit SEO poisoning to redirect unsuspecting users to malicious…
Black Basta, a prominent ransomware group, has rapidly gained notoriety since its emergence in 2022…
CVE-2024-52301 is a critical vulnerability identified in Laravel, a widely used PHP framework for building…
A critical vulnerability has been discovered in the popular "Really Simple Security" WordPress plugin, formerly…