Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Malware & Threats

New Brute Force Attacks Against SQL Servers Use PowerShell Wrapper

Microsoft has warned organizations of a new wave of brute force cyberattacks that target SQL servers and use a rather uncommon living-off-the-land binary (LOLBin).

Specifically, the attackers rely on a legitimate utility called sqlps.exe to achieve fileless persistence on SQL servers that use weak or default passwords.

Microsoft has warned organizations of a new wave of brute force cyberattacks that target SQL servers and use a rather uncommon living-off-the-land binary (LOLBin).

Specifically, the attackers rely on a legitimate utility called sqlps.exe to achieve fileless persistence on SQL servers that use weak or default passwords.

According to Microsoft, sqlps.exe, a PowerShell wrapper that supports the execution of SQL-built cmdlets, allows the attackers to run recon commands and to modify the start mode of the SQL service to LocalSystem.

The use of a legitimate tool also enables the attackers to keep their malicious activity hidden from detection tools and it also hinders forensic analysis.

“Defenders typically monitor the use of PowerShell in their environment. The sqlps.exe utility, which comes with all versions of SQL by default, has similar functionality and is equally worthy of increased scrutiny,” Microsoft Security Intelligence warned on Twitter.

As part of the observed attacks, sqlps.exe is also used to create a new account with sysadmin privileges, which is then used to take over the compromised SQL server.

“They then gain the ability to perform other actions, including deploying payloads like coin miners,” Microsoft said.

The tech giant also points out that the use of this uncommon LOLBin shows that keeping track of the runtime behavior of all scripts can help identify malicious code.

Organizations can mitigate the risks associated with brute force attacks by using strong and unique credentials, monitoring for compromised usernames and passwords, enabling logging, monitoring the environment for suspicious activity, implementing proper conditional access policies, employing enterprise detection tools, and keeping all software updated.

Related: National Cybersecurity Agencies Describe Commonly Used Initial Access Techniques

Related: Gh0stCringe RAT Targeting Database Servers in Recent Attacks

Related: Vollgar Campaign Targets MS-SQL Servers With Backdoors, Crypto-Miners

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

CISO Strategy

Cybersecurity-related risk is a top concern, so boards need to know they have the proper oversight in place. Even as first-timers, successful CISOs make...

Malware & Threats

Microsoft plans to improve the protection of Office users by blocking XLL add-ins from the internet.

Management & Strategy

Microsoft making a multiyear, multibillion dollar investment in the artificial intelligence startup OpenAI, maker of ChatGPT and other tools.

Risk Management

A threat-based approach to security often focuses on a checklist to meet industry requirements but overlooked the key component of security: reducing risk.

Management & Strategy

Tens of cybersecurity companies have announced cutting staff over the past year, in some cases significant portions of their global workforce.

Risk Management

CISA has published a report detailing the cybersecurity risks to the K-12 education system and recommendations on how to secure it.

Funding/M&A

Twenty-one cybersecurity-related M&A deals were announced in December 2022.