Hackers abused the BillQuick Web Suite billing software to compromise the network of an engineering company in the United States and deploy ransomware, threat detection firm Huntress reports.
The attack exploited a critical vulnerability in BQE Software’s BillQuick Web Suite versions 2018 through 2021, before 22.0.9.1. Tracked as CVE-2021-42258, the issue is described as an SQL injection bug that could be exploited for unauthenticated remote code execution.
While attempting to recreate the attack in their lab, Huntress’ security researchers identified multiple SQL injection points. Without authentication, they were able to remotely leak sensitive employee information from the billing software’s databases.
Next, they also discovered that BillQuick Web Suite would create during installation a built-in sa account that provides full access to the backend database server, even if the software was set up with specific restrictions in place.
Using crafted SQL queries, an attacker could abuse the account to achieve arbitrary code execution.
The investigation into this attack led Huntress to the discovery of eight other vulnerabilities in BQE Software’s BillQuick and Core offerings, but the security firm refrained from sharing details on these security errors as of now.
“This incident highlights a repeating pattern plaguing SMB software: well-established vendors are doing very little to proactively secure their applications and subject their unwitting customers to significant liability when sensitive data is inevitably leaked and/or ransomed,” Huntress says.
Related: Russia-Linked SolarWinds Hackers Continue Supply Chain Attack Rampage
Related: CISO Forum Panel: Navigating SBOMs and Supply Chain Security Transparency
Related: Codecov Bash Uploader Dev Tool Compromised in Supply Chain Hack

More from Ionut Arghire
- Blackpoint Raises $190 Million to Help MSPs Combat Cyber Threats
- ‘Asylum Ambuscade’ Group Hit Thousands in Cybercrime, Espionage Campaigns
- Google Cloud Now Offering $1 Million Cryptomining Protection
- Pharmaceutical Giant Eisai Takes Systems Offline Following Ransomware Attack
- North Korean Hackers Blamed for $35 Million Atomic Wallet Crypto Theft
- Cisco Patches Critical Vulnerability in Enterprise Collaboration Solutions
- Android’s June 2023 Security Update Patches Exploited Arm GPU Vulnerability
- US, Israel Provide Guidance on Securing Remote Access Software
Latest News
- In Other News: AI Regulation, Layoffs, US Aerospace Attacks, Post-Quantum Encryption
- Blackpoint Raises $190 Million to Help MSPs Combat Cyber Threats
- Google Introduces SAIF, a Framework for Secure AI Development and Use
- ‘Asylum Ambuscade’ Group Hit Thousands in Cybercrime, Espionage Campaigns
- Evidence Suggests Ransomware Group Knew About MOVEit Zero-Day Since 2021
- SaaS Ransomware Attack Hit Sharepoint Online Without Using a Compromised Endpoint
- Google Cloud Now Offering $1 Million Cryptomining Protection
- Democrats and Republicans Are Skeptical of US Spying Practices, an AP-NORC Poll Finds
