{"id":778,"date":"2020-04-18T07:41:39","date_gmt":"2020-04-18T06:41:39","guid":{"rendered":"http:\/\/zerothcode.com\/blog\/?p=778"},"modified":"2020-04-18T07:48:11","modified_gmt":"2020-04-18T06:48:11","slug":"hackers-install-backdoor-mssql-hacking","status":"publish","type":"post","link":"https:\/\/zerothcode.com\/blog\/hackers-install-backdoor-mssql-hacking\/","title":{"rendered":"WARNING: Hackers Install Secret Backdoor on Thousands of Microsoft SQL Servers"},"content":{"rendered":"<p>hackers: mssql-hacking : Cybersecurity researchers today uncovered a sustained malicious campaign dating back to May 2018 that targets<\/p>\n<p>Windows machines running MS-SQL servers to deploy backdoors and other kinds of malware,<\/p>\n<p>including multi-functional remote access tools (RATs) and cryptominers. hackers<\/p>\n<p>Named &#8220;<b>Vollgar<\/b>&#8221; after the Vollar cryptocurrency it mines and its offensive &#8220;vulgar&#8221; modus operandi, : mssql-hacking: hackers<\/p>\n<p>researchers at\u00a0Guardicore Labs\u00a0said the attack employs password brute-force to breach Microsoft SQL servers with weak credentials exposed to the Internet.<\/p>\n<p>Researchers claim the attackers managed to successfully infect nearly 2,000-3,000 database servers daily over the past few weeks,<\/p>\n<p>with potential victims belonging to healthcare, aviation, IT &amp; telecommunications, and higher education sectors across China, India, the US, South Korea, and Turkey.<\/p>\n<div class=\"separator\"><a href=\"https:\/\/thehackernews.com\/images\/-TVfv6kOkL1o\/XoR71snpwcI\/AAAAAAAAAKY\/UWRfpbO8GQYjtKBDpbFxkY74uqu0fo35wCLcBGAsYHQ\/s728-e100\/mssql-malware-attack.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone\" title=\"Windows mssql malware hacking\" src=\"https:\/\/thehackernews.com\/images\/-TVfv6kOkL1o\/XoR71snpwcI\/AAAAAAAAAKY\/UWRfpbO8GQYjtKBDpbFxkY74uqu0fo35wCLcBGAsYHQ\/s728-e100\/mssql-malware-attack.jpg\" alt=\"hackers\" width=\"728\" height=\"400\" border=\"0\" data-original-height=\"400\" data-original-width=\"728\" \/><\/a><\/div>\n<p>Thankfully for those concerned, researchers have also\u00a0released a script\u00a0to let sysadmins detect<\/p>\n<p>if any of their Windows MS-SQL servers have been compromised with this particular threat.<\/p>\n<h4>hackers:mssql-hacking : Vollgar Attack Chain: MS-SQL to System Malware<\/h4>\n<p>The Vollgar attack starts off with brute-force login attempts on\u00a0MS-SQL servers, which, when successful, allows<\/p>\n<p>the interloper to execute a number of configuration changes to run malicious MS-SQL commands and download malware binaries.<\/p>\n<p>&#8220;Attackers [also] validate that certain COM classes are available &#8211; WbemScripting.SWbemLocator,<\/p>\n<p>Microsoft.Jet.OLEDB.4.0 and Windows Script Host Object Model (wshom). :mssql-hacking<\/p>\n<p>These classes support both WMI scripting and command execution through MS-SQL,<\/p>\n<p>which will be later used to download the initial malware binary,&#8221; the researchers said.<\/p>\n<div class=\"separator\"><a href=\"https:\/\/thehackernews.com\/images\/-Q4qp6ESUkDc\/XoR9ERzWS-I\/AAAAAAAAAK0\/9tL7_aECdpo85QcZ6UITdMoKytoSAa4ZgCLcBGAsYHQ\/s728-e100\/mssql-malware.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone\" title=\"Windows mssql malware hacking\" src=\"https:\/\/thehackernews.com\/images\/-Q4qp6ESUkDc\/XoR9ERzWS-I\/AAAAAAAAAK0\/9tL7_aECdpo85QcZ6UITdMoKytoSAa4ZgCLcBGAsYHQ\/s728-e100\/mssql-malware.jpg\" alt=\"hackers\" width=\"728\" height=\"700\" border=\"0\" data-original-height=\"700\" data-original-width=\"728\" \/><\/a><\/div>\n<p>Aside from ensuring that cmd.exe and ftp.exe executables have the necessary execute permissions,<\/p>\n<p>the operator behind Vollgar also creates new backdoor users to the MS-SQL database as well as on the operating system with elevated privileges.<\/p>\n<p>Upon completion of the initial setup, the attack proceeds to create downloader scripts (two VBScripts and one FTP script), hackers<\/p>\n<p>which are executed &#8220;a couple of times,&#8221; each time with a different target location on the local file system to avert possible failures.<\/p>\n<p>One of the initial payloads, named SQLAGENTIDC.exe or SQLAGENTVDC.exe, first proceeds to kill a long list of processes with<\/p>\n<p>the goal of securing the maximum amount of system resources as well as eliminate other threat actors&#8217;<\/p>\n<p>activity and remove their presence from the infected machine. :hackers<\/p>\n<p>Furthermore, it acts as a dropper for different RATs and an XMRig-based crypto-miner<\/p>\n<p>that mines Monero and an alt-coin called VDS or Vollar. :mssql-hacking<\/p>\n<h2>Attack Infrastructure Hosted On Compromised Systems<\/h2>\n<p>Guardicore said attackers held their entire infrastructure on compromised machines, :mssql-hacking<\/p>\n<p>including its primary command-and-control server located in China, which, ironically,<\/p>\n<p>was found compromised by more than one attack group.<\/p>\n<blockquote class=\"tr_bq\"><p>&#8220;Among the files [on the C&amp;C server] was the MS-SQL attack tool, responsible for scanning IP ranges,<\/p><\/blockquote>\n<blockquote class=\"tr_bq\"><p>brute-forcing the targeted database, and executing commands remotely,&#8221; the cybersecurity firm observed. :hackers<\/p><\/blockquote>\n<p>&nbsp;<\/p>\n<blockquote class=\"tr_bq\"><p>&#8220;In addition, we found two CNC programs with GUI in Chinese, a tool for modifying files&#8217; hash values, a portable HTTP file server (HFS),<\/p>\n<p>Serv-U FTP server and a copy of the executable mstsc.exe (Microsoft Terminal Services Client) used to connect to victims over RDP.&#8221;<\/p><\/blockquote>\n<p>&nbsp;<\/p>\n<div class=\"separator\"><a href=\"https:\/\/thehackernews.com\/images\/-OFO6oWqIpZg\/XoR8gHDkFWI\/AAAAAAAAAKo\/zRBoIcD59MII8Ij25HHDaBxKxidxlzjSwCLcBGAsYHQ\/s728-e100\/mssql-hacking-tool.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone\" title=\"Windows mssql malware hacking\" src=\"https:\/\/thehackernews.com\/images\/-OFO6oWqIpZg\/XoR8gHDkFWI\/AAAAAAAAAKo\/zRBoIcD59MII8Ij25HHDaBxKxidxlzjSwCLcBGAsYHQ\/s728-e100\/mssql-hacking-tool.jpg\" alt=\"hackers\" width=\"728\" height=\"500\" border=\"0\" data-original-height=\"500\" data-original-width=\"728\" \/><\/a><\/div>\n<p>Once an infected Windows client pings the C2 server, the latter also receives a variety of details about the machine,<\/p>\n<p>such as its public IP, location, operating system version, computer name, and CPU model.<\/p>\n<p>Stating that the two C2 programs installed on the China-based server were developed by two different vendors, :mssql-hacking<\/p>\n<p>Guardicore said there are similarities in their remote control capabilities \u2014 namely downloading files, installing new Windows services,<\/p>\n<p>keylogging, screen capturing, activating the camera and microphone, and even initiating a Distributed Denial-of-Service (DDoS) attack.<\/p>\n<h2>Use Strong Passwords to Avoid Brute-Force Attacks<\/h2>\n<p>With about half-a-million machines running MS-SQL database service, : mssql-hacking<\/p>\n<p>the campaign yet another indication that attackers going after poorly protected database servers in an attempt to siphon sensitive information.<\/p>\n<p>&#8220;These machines possibly store personal information such as usernames, passwords, credit card numbers, etc.,<\/p>\n<p>which can fall into the attacker&#8217;s hands with only a simple brute-force.&#8221;<\/p>\n<p>&nbsp;<\/p>\n<p>You May Also like to read<\/p>\n<p><a href=\"http:\/\/zerothcode.com\/blog\/wi-fi-vulnerability-affects-billion\/\">http:\/\/zerothcode.com\/blog\/wi-fi-vulnerability-affects-billion\/<\/a><\/p>\n<p><a href=\"http:\/\/zerothcode.com\/blog\/hacking-magecart-inject-skimmers\/\">http:\/\/zerothcode.com\/blog\/hacking-magecart-inject-skimmers\/<\/a><\/p>\n<p>Have something to say about this article? Comment below or share it with us on\u00a0<a href=\"https:\/\/www.facebook.com\/zerothcode\">Facebook<\/a>,\u00a0<a href=\"https:\/\/twitter.com\/zerothcode\">Twitter<\/a>\u00a0or our\u00a0<a href=\"https:\/\/www.linkedin.com\/company\/zerothcode\/\">LinkedIn Group<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>hackers: mssql-hacking : Cybersecurity researchers today uncovered a sustained malicious campaign dating back to May 2018 that targets Windows machines<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[37],"tags":[],"yst_prominent_words":[407,209,960,168,968,962,957,69,961,965,958,969,966,394,963,389,123,936,964,967],"class_list":["post-778","post","type-post","status-publish","format-standard","hentry","category-hackers-news"],"_links":{"self":[{"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/posts\/778","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/comments?post=778"}],"version-history":[{"count":0,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/posts\/778\/revisions"}],"wp:attachment":[{"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/media?parent=778"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/categories?post=778"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/tags?post=778"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/yst_prominent_words?post=778"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}