-->
Hackers Targeting Servers Running Database Services For Mining Cryptocurrency

Hackers Targeting Servers Running Database Services For Mining Cryptocurrency

Hackers Targeting Servers Running Database Services For Mining Cryptocurrency

 Security researchers stimulate got discovered multiple laid on campaigns conducted yesteryear an establishe Hackers Targeting Servers Running Database Services for Mining Cryptocurrency
Security researchers stimulate got discovered multiple laid on campaigns conducted yesteryear an established Chinese criminal grouping that operates worldwide, targeting database servers for mining cryptocurrencies, exfiltrating sensitive information in addition to edifice a DDoS botnet.

The researchers from safety theater GuardiCore Labs stimulate got analyzed thousands of attacks launched inwards recent months in addition to identified at to the lowest degree iii laid on variants—Hex, Hanako, in addition to Taylor—targeting dissimilar MS SQL in addition to MySQL servers for both Windows in addition to Linux.

The goals of all the iii variants are different—Hex installs cryptocurrency miners in addition to remote access trojans (RATs) on infected machines, Taylor installs a keylogger in addition to a backdoor, in addition to Hanako uses infected devices to construct a DDoS botnet.

So far, researchers stimulate got recorded hundreds of Hex in addition to Hanako attacks in addition to tens of thousands of Taylor attacks each calendar month in addition to found that close compromised machines are based inwards China, in addition to around inwards Thailand, the United States, Nippon in addition to others.

To make unauthorized access to the targeted database servers, the attackers role animal strength attacks in addition to thus run a serial of predefined SQL commands to make persistent access in addition to evade audit logs.

What's interesting? To launch the attacks against database servers in addition to serve malicious files, attackers role a network of already compromised systems, making their laid on infrastructure modular in addition to preventing takedown of their malicious activities.
 Security researchers stimulate got discovered multiple laid on campaigns conducted yesteryear an establishe Hackers Targeting Servers Running Database Services for Mining Cryptocurrency
For achieving persistent access to the victim's database, all iii variants (Hex, Hanko, in addition to Taylor) exercise backdoor users inwards the database in addition to opened upwards the Remote Desktop port, allowing attackers to remotely download in addition to install their adjacent phase attack—a cryptocurrency miner, Remote Access Trojan (RAT) or a DDoS bot.
"Later inwards the attack, the assailant stops or disables a multifariousness of anti-virus in addition to monitoring applications yesteryear running rhythm out commands," the researchers wrote inwards their weblog ship service published Tuesday. 
"The anti-virus targeted is a mixture of well-known products such every bit Avira in addition to Panda Security in addition to niche software such every bit Quick Heal in addition to BullGuard."
Finally, to comprehend their tracks, the attackers deletes whatever unnecessary Windows registry, file, in addition to folder entry using pre-defined batch files in addition to Visual Basic scripts.

Administrators should depository fiscal establishment gibe for the beingness of the next usernames inwards their database or systems inwards club to put if they stimulate got been compromised yesteryear the Chinese criminal hackers.
  • hanako
  • kisadminnew1
  • 401hk$
  • Guest
  • Huazhongdiguo110

To foreclose compromise of your systems, researchers advised administrators to e'er follow the databases hardening guides (provided yesteryear both MySQL in addition to Microsoft), rather than simply having a potent password for your databases.
"While defending against this type of attacks may audio slowly or trivial—'patch your servers in addition to role potent passwords'—we know that 'in existent life' things are much to a greater extent than complicated. The best agency to minimize your exposure to campaigns targeting databases is to command the machines that stimulate got access to the database," the researchers advised. 
"Routinely review the listing of machines that stimulate got access to your databases, dice along this listing to a minimum in addition to pay especial attending to machines that are accessible straight from the internet. Every connecter travail from an IP or domain that does non belong to this listing should last blocked in addition to investigated."
Blogger
Disqus
Pilih Sistem Komentar

No comments

Advertiser