Friday, January 31, 2025
HomeCyber Security NewsMicrosoft Warns of Malware Campaign Targeting SQL Servers Using Brute Force

Microsoft Warns of Malware Campaign Targeting SQL Servers Using Brute Force

Published on

SIEM as a Service

Follow Us on Google News

The United States Department of Homeland Security has issued a threat advisory regarding brute-forcing attacks aimed at exploiting weak passwords used on Microsoft SQL Server (MSSQL) database servers exposed to the internet.

It is clear that the intrusions analyzed by the firm stand out for their misuse of an auxiliary known as SQLPS.exe, a tool exploiting brute-force attacks as the initial compromise technique, according to a series of tweets that Microsoft has tweeted.

At the moment, no one knows what the ultimate goal of this campaign is, nor who is the threat actor behind it. “SuspSQLUsage” is the name under which Microsoft has identified this malware.

Here’s what the Microsoft Security Intelligence team stated:-

“The attackers also use sqlps.exe to create a new account that they add to the sysadmin role, enabling them to take full control of the SQL server. They then gain the ability to perform other actions, including deploying payloads like coin miners.”

It is possible to create a LOLBin extension using sqlps, a utility that comes with Microsoft SQL Server and that provides the capability of loading SQL Server cmdlets.

In the case of LOBin, an attacker would use PowerShell commands without worrying that his malicious actions would be detected by defenders.

The second benefit of utilizing this method of analysis is that it ensures that no traces will be left during the investigation of the attacks. Bypass Script Block Logging using sqlps to prevent cmdlet operations from being logged to the Windows Event Log.

In March of this year, Microsoft reported similar attacks made against MSSQL servers when Gh0stCringe RATs were installed in an attempt to install them.

The threat actors used the Microsoft SQL xp_cmdshell command from the Microsoft SQL server to drop Cobalt Strike beacons in a previous campaign in February.

Recommendations

It is recommended that MSSQL administrators protect their servers against such attacks by preventing them from being exposed to the internet. And here are some recommendations that are advised by the security experts:-

  • Always use a strong and complex admin password.
  • Make sure to enable the event logging.
  • Always use a robust antivirus tool.
  • Always apply the latest security updates to decrease the attack risk.
  • Enable multi-factor authentication.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity and hacking news updates.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Hackers Exploiting DNS Poisoning to Compromise Active Directory Environments

A groundbreaking technique for Kerberos relaying over HTTP, leveraging multicast poisoning, has been recently...

New Android Malware Exploiting Wedding Invitations to Steal Victims WhatsApp Messages

Since mid-2024, cybersecurity researchers have been monitoring a sophisticated Android malware campaign dubbed "Tria...

500 Million Proton VPN & Pass Users at Risk Due to Memory Protection Vulnerability

Proton, the globally recognized provider of privacy-focused services such as Proton VPN and Proton...

Arcus Media Ransomware Strikes: Files Locked, Backups Erased, and Remote Access Disabled

The cybersecurity landscape faces increasing challenges as Arcus Media ransomware emerges as a highly...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

Hackers Exploiting DNS Poisoning to Compromise Active Directory Environments

A groundbreaking technique for Kerberos relaying over HTTP, leveraging multicast poisoning, has been recently...

New Android Malware Exploiting Wedding Invitations to Steal Victims WhatsApp Messages

Since mid-2024, cybersecurity researchers have been monitoring a sophisticated Android malware campaign dubbed "Tria...

500 Million Proton VPN & Pass Users at Risk Due to Memory Protection Vulnerability

Proton, the globally recognized provider of privacy-focused services such as Proton VPN and Proton...