A new cyberattack campaign targets poorly managed Microsoft SQL servers to deploy malicious tools like Ammyy Admin and PetitPotato malware. Cybersecurity researchers have observed attackers exploiting vulnerabilities in these servers to gain unauthorized access, gather system information, and install malware for remote access. This campaign highlights the need for stronger security measures to protect databases, which often house sensitive organizational data.
The attackers begin by identifying misconfigured or unpatched MS-SQL servers, using weak credentials or known vulnerabilities to infiltrate systems.
Once inside, they execute commands for reconnaissance, gathering detailed system information to map out the environment for further exploitation. Tools like WGet are used to download and install malware, including Ammyy Admin and PetitPotato, which allow attackers to escalate privileges and maintain remote access. This initial foothold provides them with the means to move laterally across the network.
In addition to deploying malware, the attackers take steps to ensure continued access to the compromised systems. They enable Remote Desktop Protocol (RDP) services, often disabled by default, creating a backdoor for future access. Rogue user accounts with elevated privileges are also created to maintain persistence, even if initial access points are secured.
This multi-layered approach enables the attackers to evade detection while maintaining control over the compromised systems, enabling data theft or ransomware deployment.
The campaign serves as a reminder of the risks associated with poorly managed server environments, especially for MS-SQL servers. Organizations must prioritize regular patching, enforce strong authentication methods, and disable unnecessary services like RDP when not in use. Monitoring for suspicious account creation and network activity is also essential to detecting such attacks.