Facebook Twitter Instagram
    • Privacy Policy
    • Contact Us
    Facebook Twitter Instagram Pinterest Vimeo
    AI Home SecurityAI Home Security
    • Home
    • Home Security
    • Cyber Security
    • Biometric Technology
    Contact
    AI Home SecurityAI Home Security
    Cyber Security

    Microsoft Warns of Cyber Attacks Attempting to Breach Cloud via SQL Server Instance

    justmattgBy justmattgOctober 4, 2023No Comments3 Mins Read

    [ad_1]

    Oct 04, 2023THNCloud Security / Cyber Threat

    Microsoft

    Microsoft has detailed a new campaign in which attackers unsuccessfully attempted to move laterally to a cloud environment through a SQL Server instance.

    “The attackers initially exploited a SQL injection vulnerability in an application within the target’s environment,” security researchers Sunders Bruskin, Hagai Ran Kestenberg, and Fady Nasereldeen said in a Tuesday report.

    “This allowed the attacker to gain access and elevated permissions on a Microsoft SQL Server instance deployed in Azure Virtual Machine (VM).”

    In the next stage, the threat actors leveraged the new permissions to attempt to move laterally to additional cloud resources by abusing the server’s cloud identity, which may possess elevated permissions to likely carry out various malicious actions in the cloud that the identity has access to.

    Cybersecurity

    Microsoft said it did not find any evidence to suggest that the attackers successfully moved laterally to the cloud resources using the technique.

    “Cloud services like Azure use managed identities for allocating identities to the various cloud resources,” the researchers said. “Those identities are used for authentication with other cloud resources and services.”

    The starting point of the attack chain is an SQL injection against the database server that allows the adversary to run queries to gather information about the host, databases, and network configuration.

    In the observed intrusions, it’s suspected that the application targeted with the SQL injection vulnerability had elevated permissions, which permitted the attackers to enable the xp_cmdshell option to launch operating system commands to proceed to the next phase.

    Microsoft

    This included conducting reconnaissance, downloading executables and PowerShell scripts, and setting up persistence via a scheduled task to start a backdoor script.

    Data exfiltration is achieved by taking advantage of a publicly accessible tool called webhook[.]site in an effort to stay under the radar, since outgoing traffic to the service is deemed legitimate and unlikely to be flagged.

    “The attackers tried utilizing the cloud identity of the SQL Server instance by accessing the [instance metadata service] and obtaining the cloud identity access key,” the researchers said. “The request to IMDS identity’s endpoint returns the security credentials (identity token) for the cloud identity.”

    Cybersecurity

    The ultimate goal of the operation appears to have been to abuse the token to perform various operations on cloud resources, including lateral movement across the cloud environment, although it ended in failure due to an unspecified error.

    The development underscores the growing sophistication of cloud-based attack techniques, with bad actors constantly on the lookout for over-privileged processes, accounts, managed identities, and database connections to conduct further malicious activities.

    “This is a technique we are familiar with in other cloud services such as VMs and Kubernetes cluster but haven’t seen before in SQL Server instances,” the researchers concluded.

    “Not properly securing cloud identities can expose SQL Server instances and cloud resources to similar risks. This method provides an opportunity for the attackers to achieve greater impact not only on the SQL Server instances but also on the associated cloud resources.”

    Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.



    [ad_2]

    Source link

    Previous ArticleRussian Hacktivism Takes a Toll on Organizations in Ukraine, EU, US
    Next Article ‘Looney Tunables’ Bug Opens Millions of Linux Systems to Root Takeover
    justmattg
    • Website

    Related Posts

    Cyber Security

    Name That Toon: Last Line of Defense

    April 16, 2024
    Cyber Security

    OpenJS Foundation Targeted in Potential JavaScript Project Takeover Attempt

    April 16, 2024
    Cyber Security

    Middle East Cyber Ops Intensify, With Israel the Main Target

    April 16, 2024
    Add A Comment

    Leave A Reply Cancel Reply

    Facebook Twitter Instagram Pinterest
    • Privacy Policy
    • Contact Us
    AI Home Security © 2025 All rights reserved | Designed By ESmartsSolution

    Type above and press Enter to search. Press Esc to cancel.

    ↑