Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Mr. Meowski’s Bakery To Re-Locate In St. Charles MO

    Facebook X (Twitter) Instagram
    Tech Empire Solutions
    • Home
    • Cloud
    • Cyber Security
    • Technology
    • Business Solution
    • Tech Gadgets
    Tech Empire Solutions
    Home » Turkish hackers exploit poorly secured MS SQL servers around the world
    Cyber Security

    Turkish hackers exploit poorly secured MS SQL servers around the world

    techempireBy techempire3 Comments3 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email

    ReportJanuary 9, 2024Editorial DepartmentData Security/Cyber ​​Attack

    Turkish Hackers

    As part of an ongoing, financially motivated campaign to gain initial access, less secure Microsoft SQL (MS SQL) servers in the US, EU, and Latin America (LATAM) regions were targeted.

    “The analyzed threat campaigns appear to end in one of two ways, either selling ‘access’ to the infected host or ultimately delivering ransomware,” Securonix researchers Den Iuzvyk, Tim Peck and Oleg Kolesnikov said in a technical report. Payload.” Report shared with The Hacker News.

    The event is linked to an actor of Turkish origin, codenamed revival# By cybersecurity companies.

    Internet security

    Initial access to the server requires a brute force attack, followed by using the xp_cmdshell configuration option to execute shell commands on the compromised host. This campaign is similar to a previous campaign called DB#JAMMER that came to light in September 2023.

    This stage paves the way for extracting the PowerShell script from the remote server, which is responsible for obtaining the obfuscated Cobalt Strike beacon payload.

    The post-use toolkit then downloads the AnyDesk remote desktop application from the installed network share for accessing the computer and downloads other tools such as Mimikatz for collecting credentials and Advanced Port Scanner for performing reconnaissance.

    Microsoft SQL Server

    Lateral movement is accomplished through a legitimate system management utility called PsExec, which can execute programs on remote Windows hosts.

    The attack chain culminated in the deployment of Mimic ransomware, a variant of which was also used in the DB#JAMMER campaign.

    “The indicators and malicious TTPs used in these two campaigns are completely different, so it is very likely that these are two different campaigns,” Kolesnikov told The Hacker News.

    Internet security

    “More specifically, while the initial penetration method is similar, DB#JAMMER is slightly more sophisticated and uses tunneling techniques. RE#TURGENCE is more targeted, tending to use legitimate tools as well as remote monitoring and management, such as AnyDesk, Trying to fit in normal activities.”

    Securonix said it discovered an operational security (OPSEC) error made by the threat actor that allowed it to monitor scrapbook activity as AnyDesk’s scrapbook sharing feature was enabled.

    This makes it possible to collect their Turkish origins and online alias atseverse, which also corresponds to profiles on Steam and a Turkish hacking forum called SpyHack.

    “Critical servers should never be exposed directly to the Internet,” the researchers warned. “In the case of RE#TURGENCE, the attacker was able to brute force entry into the server directly from outside the main network.”

    Did you find this article interesting?follow us Twitter  and LinkedIn to read more exclusive content from us.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    techempire
    • Website

    Related Posts

    Ongoing campaign bombards businesses with spam emails and phone calls

    6 common mistakes organizations make when deploying advanced authentication

    New Chrome zero-day vulnerability CVE-2024-4761 is being actively exploited

    Microsoft patches 61 flaws, including two actively exploited zero-day vulnerabilities

    Dutch court sentences Tornado Cash co-founder to 5 years in prison for money laundering

    Migrate from VMware vSphere to Microsoft Azure

    Leave A Reply Cancel Reply

    Top Reviews
    Editors Picks

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Mr. Meowski’s Bakery To Re-Locate In St. Charles MO

    Pokémon Trading Card Website Making 100k!

    Legal Pages
    • About Us
    • Disclaimer
    • DMCA
    • Privacy Policy
    Our Picks

    Edufox

    Emerging Academic Education Platforms – Sponsored By Edufox

    GTA 6 Release Date

    Top Reviews

    Type above and press Enter to search. Press Esc to cancel.