therecord.media Open in urlscan Pro
2606:4700:4400::6812:20b5  Public Scan

URL: https://therecord.media/microsoft-sql-databases-attacked-ransomware-hackers
Submission: On September 04 via api from TR — Scanned from DE

Form analysis 1 forms found in the DOM

<form><span class="text-black text-sm icon-search"></span><input type="text" name="s" placeholder="Search…" value=""><button type="submit">Go</button></form>

Text Content

This website stores cookies on your computer. These cookies are used to improve
your website experience and provide more personalized services to you, both on
this website and through other media. To find out more about the cookies we use,
see our Privacy Policy.

Accept


 * Leadership
 * Cybercrime
 * Nation-state
 * People
 * Technology

 * Mobile App
 * About
 * Podcast
 * Contact

Go


SUBSCRIBE TO THE RECORD

Subscribe
Jonathan GreigSeptember 1st, 2023
 * Cybercrime
 * News

 * 
 * 
 * 
 * 
 * 

Get more insights with the
Recorded Future
Intelligence Cloud.
Learn more.


RANSOMWARE ATTACKERS ARE TARGETING EXPOSED MICROSOFT SQL DATABASES, REPORT SAYS

Ransomware campaigns are using internet-exposed Microsoft SQL databases as a
beachhead to launch attacks on victim systems, according to researchers.

Cybersecurity company Securonix said that it found examples of hackers
exploiting Microsoft SQL (MSSQL) — a popular software product that helps users
store and retrieve data requested by applications. Microsoft’s version is one of
several database managers that use SQL, short for structured query language.

Oleg Kolesnikov, vice president of threat research at Securonix, told Recorded
Future News that the typical attack sequence begins with hackers trying to gain
access to exposed Microsoft SQL databases through brute forcing — a hacking
method that uses trial and error to crack passwords.

Securonix researchers said it was unclear if the hackers are “using a
dictionary-based, or random password spray attempts.”

Once a database’s password is cracked, “the attackers expand their foothold
within the target system and use MSSQL as a beachhead to launch a number of
different payloads,” including remote access trojan (RAT) malware and
ransomware, Kolesnikov said.

“This is not something we have been seeing often, and what truly sets this
attack sequence apart is the extensive tooling and infrastructure used by the
threat actors,” he said.

After the hackers break in, they use a variety of tools to map out the network,
steal credentials and eventually deploy ransomware.

Securonix did not attribute the attacks to any known group but found that the
hackers deployed ransomware called FreeWorld, a new variant of the Mimic
ransomware. Mimic was spotlighted earlier this year by researchers at TrendMicro
after first being seen in the wild in June 2022.

It targets Russian- and English-speaking users and TrendMicro said there are
indicators tying it to the Conti ransomware builder that was leaked last year.

“Given how quickly the attackers got to work, this attack appears to be quite
sophisticated from tooling to infrastructure,” Securonix researchers said.


USING LEGITIMATE IT TOOLS

The hackers painstakingly disable the system’s defenses before creating
administrator accounts that provide them with widespread access.

In the case examined by Securonix, the threat actors tried a number of different
methods in order to exfiltrate data and import the tools needed to gain further
persistence in the victim systems.

Several tools were blocked by the victim’s firewall, but the hackers eventually
succeeded with the AnyDesk remote access software — a legitimate IT tool
increasingly popular among threat actors. The Cybersecurity and Infrastructure
Security Agency (CISA) warned earlier this year that malicious hackers are
deploying commercial remote monitoring and management (RMM) software.

“Upon execution, the ransomware began encrypting the victim host and generated
encrypted files using the ‘.FreeWorldEncryption’ extension. Once it has run
through its course, it will create a text file named ‘FreeWorld-Contact.txt’
with instructions as to how to pay the ransom,” the Securonix report said.

The company said organizations using Microsoft SQL databases should not expose
them to the internet — advice that CISA has been pushing more fervently in
recent months.

The agency said in June that it is now working with federal agencies to remove
network management tools from the public-facing internet after researchers
discovered hundreds were still publicly exposed.

 * 
 * 
 * 
 * 
 * 

Tags
 * Database
 * Microsoft
 * Hack


JONATHAN GREIG



Jonathan Greig is a Breaking News Reporter at Recorded Future News. Jonathan has
worked across the globe as a journalist since 2014. Before moving back to New
York City, he worked for news outlets in South Africa, Jordan and Cambodia. He
previously covered cybersecurity at ZDNet and TechRepublic.

Previous articleNext article
Golf club maker Callaway says 1 million affected by data breach
Nearly 540,000 people have SSNs leaked after cyberattack on retailer Forever 21


BRIEFS

 * Pennsylvania school district to stay open despite ransomware attackSeptember
   1st, 2023
 * Golf club maker Callaway says 1 million affected by data breachSeptember 1st,
   2023
 * Paramount confirms data breach after cyberattackAugust 31st, 2023
 * NSA insider to succeed George Barnes as agency’s deputy directorAugust 31st,
   2023
 * Internet access in Gabon restored after post-election coupAugust 30th, 2023
 * China-linked hackers spy on Android users through fake messenger appsAugust
   30th, 2023
 * Network technology giant Juniper warns users about denial-of-service
   bugsAugust 30th, 2023
 * Netgear releases patches for two high-severity vulnerabilitiesAugust 30th,
   2023
 * Japan’s cybersecurity agency breached by suspected Chinese hackers:
   reportAugust 29th, 2023


EMPIRE DRAGON ACCELERATES COVERT INFORMATION OPERATIONS, CONVERGES WITH RUSSIAN
NARRATIVES


Empire Dragon Accelerates Covert Information Operations, Converges with Russian
Narratives


CONVERGING NARRATIVES ON HAWAII WILDFIRES ADVANCE DIFFERENT INFLUENCERS’
OBJECTIVES


Converging Narratives on Hawaii Wildfires Advance Different Influencers’
Objectives


MALIGN NARRATIVES OPPOSE “THE VOICE” AHEAD OF AUSTRALIA’S REFERENDUM


Malign Narratives Oppose “the Voice” Ahead of Australia’s Referendum


H1 2023: RANSOMWARE'S PIVOT TO LINUX AND VULNERABLE DRIVERS


H1 2023: Ransomware's Pivot to Linux and Vulnerable Drivers


THREAT ACTORS LEVERAGE INTERNET SERVICES TO ENHANCE DATA THEFT AND WEAKEN
SECURITY DEFENSES


Threat Actors Leverage Internet Services to Enhance Data Theft and Weaken
Security Defenses
 * 
 * 
 * 
 * 

 * Privacy Policy

© Copyright 2023 | The Record from Recorded Future News