Construction firms are experiencing a significant security threat due to brute force attacks targeting Foundation accounting software servers. Researchers from Huntress first identified these attacks on September 14, 2024. The attacks exploit vulnerabilities associated with Microsoft SQL Server (MSSQL) instances, which are often configured to be publicly accessible to support a companion mobile app. Attackers are leveraging these open ports and default credentials to perform aggressive brute force attacks, making thousands of login attempts in an effort to gain unauthorized access.
Huntress has reported observing extremely aggressive brute-force tactics, with up to 35,000 login attempts per hour on some servers. These attacks are primarily aimed at MSSQL accounts that have either default or weak passwords. The default accounts, such as ‘sa’ and ‘dba,’ are particularly vulnerable if users have not updated the default credentials or have chosen weak passwords. Once attackers successfully gain access, they enable the ‘xp_cmdshell’ feature in MSSQL, allowing them to execute system commands via SQL queries.
During their investigation, Huntress discovered that out of three million endpoints under their protection, approximately 500 were running the targeted Foundation software. Of these, 33 had publicly exposed MSSQL databases with default administrative credentials, making them easy targets for the attackers. The attacks have already impacted various companies within the plumbing, HVAC, and concrete sectors, causing significant concern across the construction industry.
In response, Huntress has alerted Foundation, the software vendor, which confirmed that the issue affects only the on-premise version of its application and not its cloud-based counterpart. Foundation emphasized that not all servers are vulnerable, as some do not have port 4243 open, and not all targeted accounts use the same default credentials. Huntress recommends that administrators immediately rotate account credentials and avoid exposing MSSQL servers to the internet unless absolutely necessary. This proactive approach is crucial for mitigating the risk and securing sensitive company data from these escalating attacks.