Technology NewsTechnology NewsTechnology News
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Reading: Hackers Target MS-SQL Servers to Breach Windows Systems
Share
Font ResizerAa
Technology NewsTechnology News
Font ResizerAa
Search
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Follow US
  • Cookie Policy (EU)
  • Contact
  • About
© 2025 NEWSLINKER - Powered by LK SOFTWARE
Cybersecurity

Hackers Target MS-SQL Servers to Breach Windows Systems

Highlights

  • Hackers target MS-SQL servers for data theft and ransomware attacks.

  • Poor credentials and public exposure increase server vulnerabilities.

  • Strong security measures and monitoring can mitigate these risks.

Kaan Demirel
Last updated: 6 June, 2024 - 11:45 am 11:45 am
Kaan Demirel 11 months ago
Share
SHARE

MS-SQL Servers, housing a significant amount of sensitive information, have become frequent targets for hackers aiming to infiltrate crucial systems. Exploiting the vulnerabilities of these servers, cybercriminals can execute unauthorized commands, potentially taking over entire networks to facilitate data theft and ransomware attacks. Recent findings by cybersecurity researchers at ASEC have shown that hackers are actively exploiting MS-SQL servers to compromise Windows servers. These attacks often stem from poor credential management and public internet exposure, making them a popular target for threat actors.

Contents
Exploiting MS-SQL VulnerabilitiesProtective Measures

MS-SQL, short for Microsoft SQL Server, is a relational database management system developed by Microsoft. The product first launched in 1989 and has since evolved into a widely used database solution, offering a range of tools for data storage, retrieval, and management. Known for its robust performance and integration capabilities, MS-SQL Server is commonly deployed in both small and large enterprises to support various applications.

Earlier reports have indicated that MS-SQL servers with open port 1433 are prone to attacks, as hackers use brute-force methods to gain SQL admin access. This information aligns with the most recent findings by ASEC, which discovered that malware like LemonDuck can self-propagate in poorly secured MS-SQL environments. While LemonDuck uses predefined password lists, other malware like Kingminer and Vollgar deploy brute-force attacks on externally exposed servers.

Previously, researchers observed the use of xp_cmdshell and OLE automation procedures within MS-SQL servers to execute operating system commands. This trend continues as hackers exploit these functionalities to download and run malicious components. Unique methodologies include LemonDuck’s use of CLR .NET procedures and MyKings’ use of extended stored procedures to load harmful DLLs.

Exploiting MS-SQL Vulnerabilities

Threat actors install various forms of malware such as ransomware, remote access Trojans (RATs), and backdoors to gain deeper control after securing admin access via brute-force attacks. Early detection of suspicious activities through a robust Endpoint Detection and Response (EDR) solution can significantly mitigate these threats. EDR solutions with behavior-based monitoring engines allow administrators to identify root causes and take appropriate countermeasures.

Protective Measures

Administrators should implement strong credentials, regular patching, and restrictions on external access to reduce the risks associated with MS-SQL instances. Often found alongside ERP and business solutions, these servers require meticulous management to prevent unauthorized access.

– Poor credential management and public exposure heighten MS-SQL server vulnerability.
– Xp_cmdshell and OLE automation procedures in MS-SQL facilitate OS command execution.
– Early detection and strong security measures are essential for protecting MS-SQL instances.

Mitigating these attacks involves taking proactive steps such as using strong, unique passwords and limiting external access to MS-SQL servers. Regular patching and continuous monitoring using EDR solutions can detect and respond to suspicious activities swiftly, reducing the risk of successful breaches. As hacking methods evolve, organizations must stay updated on the latest threats and continuously enhance their cybersecurity measures to protect sensitive data and critical systems.

You can follow us on Youtube, Telegram, Facebook, Linkedin, Twitter ( X ), Mastodon and Bluesky

You Might Also Like

DHS Faces Scrutiny for Withholding CISA Workforce Details

MITRE’s CVE Program Faces Funding Shake-up and Future Alternatives

Microsoft Tackles 72 Vulnerabilities in May Security Update

Apple Boosts Security With Extensive Software Updates

US Authorities Dismantle Botnets and Indict Foreign Nationals

Share This Article
Facebook Twitter Copy Link Print
Kaan Demirel
By Kaan Demirel
Kaan Demirel is a 28-year-old gaming enthusiast residing in Ankara. After graduating from the Statistics department of METU, he completed his master's degree in computer science. Kaan has a particular interest in strategy and simulation games and spends his free time playing competitive games and continuously learning new things about technology and game development. He is also interested in electric vehicles and cyber security. He works as a content editor at NewsLinker, where he leverages his passion for technology and gaming.
Previous Article Chinese Nationals Admit to Cyber Crimes in Zambia
Next Article Assassin’s Creed Mirage Now Available on iOS and iPadOS

Stay Connected

6.2kLike
8kFollow
2.3kSubscribe
1.7kFollow

Latest News

OpenAI Targets UAE for New Data Center
AI Technology
Waymo Recalls 1,200 Robotaxis Over Software Glitch
Robotics
Intel Excites GPU Enthusiasts with Hint at New Arc B770 Launch
Computing
Tesla VP Shares Insight Into Stunning Robot Dance
Electric Vehicle
US Stops AI Rule, Tightens Chip Export Measures
AI
NEWSLINKER – your premier source for the latest updates in ai, robotics, electric vehicle, gaming, and technology. We are dedicated to bringing you the most accurate, timely, and engaging content from across these dynamic industries. Join us on our journey of discovery and stay informed in this ever-evolving digital age.

ARTIFICAL INTELLIGENCE

  • Can Artificial Intelligence Achieve Consciousness?
  • What is Artificial Intelligence (AI)?
  • How does Artificial Intelligence Work?
  • Will AI Take Over the World?
  • What Is OpenAI?
  • What is Artifical General Intelligence?

ELECTRIC VEHICLE

  • What is Electric Vehicle in Simple Words?
  • How do Electric Cars Work?
  • What is the Advantage and Disadvantage of Electric Cars?
  • Is Electric Car the Future?

RESEARCH

  • Robotics Market Research & Report
  • Everything you need to know about IoT
  • What Is Wearable Technology?
  • What is FANUC Robotics?
  • What is Anthropic AI?
Technology NewsTechnology News
Follow US
About Us   -  Cookie Policy   -   Contact

© 2025 NEWSLINKER. Powered by LK SOFTWARE
Welcome Back!

Sign in to your account

Register Lost your password?