Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
China Databases Security

Attack Campaign Hits Thousands of MS-SQL Servers For Two Years (csoonline.com) 33

"In December, security researchers noticed an uptick in brute-force attacks against publicly exposed Microsoft SQL servers," reports CSOnline.

"It turns out the attacks go as far back as May 2018 and infect on average a couple thousand database servers every day with remote access Trojans and cryptominers."

Slashdot reader itwbennett writes: While the primary goal of the attack seems to be cryptocurrency mining, "what makes these database servers appealing for attackers apart from their valuable CPU power is the huge amount of data they hold," say researchers from Guardicore who investigated the attacks. The researchers also note that most machines (60%) stay infected only briefly, but "almost 20% of all breached servers remained infected for more than a week and even longer than two weeks," and 10% become reinfected...

[T]he attackers aggressively remove malware from competitors from targeted machines.

Many of the infected machines are located in America, India, South Korea, and Turkey, according to the article, which adds that the researchers traced the campaign back to China.

"The scans and attacks originate from Chinese IP addresses -- likely associated with infected and hijacked machines -- and the command-and-control servers are also hosted in China and use Chinese language for their web-based management interfaces."
This discussion has been archived. No new comments can be posted.

Attack Campaign Hits Thousands of MS-SQL Servers For Two Years

Comments Filter:
  • Comment removed based on user account deletion
  • by phantomfive ( 622387 ) on Saturday April 04, 2020 @10:45PM (#59909420) Journal
    Never put your database (any database) on the open internet. You can be 100% invulnerable to these kinds of attacks with a simple firewall.
    • Databases (Score:3, Informative)

      by JBMcB ( 73720 )

      Here's the setup I've seen used that's pretty secure:

      DMZ - Reverse proxy into the data center through a firewall. Only 443 traffic allowed, the proxy handles the redirect from 80, so nothing unencrypted is outside of the datacenter. Ideally the proxy just runs nginix or Apache, and ssh allowed only from the data center.

      Data center: Separate App/Web and Database servers with an optional caching/static server. These sit in their own subnet firewalled off from the rest of the intranet - you have to log into a

      • by Anonymous Coward

        And block all Chinese and Russian subnets at your firewall. Not guaranteed to stop anything but also makes attacks much less likely.

        • And block all Chinese and Russian subnets at your firewall. Not guaranteed to stop anything but also makes attacks much less likely.

          An excellent idea. Unless your business does business in China or Russia. Then you have to go into whack-a-mole mode where you allow some networks/IP's in while blocking the rest.

          Worst case would be a retail provider with consumers directly connecting to your webheads from their home.

        • by Z00L00K ( 682162 )

          And this is what the Chinese government want - they don't have to do the "great firewall of China" if they can make sites block China due to various kinds of attacks.

        • On my site, the median IQ went up by 30 pointy.

        • by Bert64 ( 520050 )

          Many attacks come from china and russia because there are lots of insecure servers there. That doesn't mean these countries are the ultimate source of the attack (ie where the hacker himself is located)... Machines in these countries are often highly insecure because piracy is rampant and installing updates can overwrite cracks and cause outages, so systems are never updated. Also many operating systems are primarily designed to run in english, which makes it harder for people in these countries to understa

      • by Bert64 ( 520050 )

        Unless you design your jump server very well, it will become a prime target... Compromise that box and you get access to everything, plus copies of everyone's credentials..

        Compromising the database is not miraculous, SQL injection vulnerabilities are fairly common and will allow them to compromise the database server even without compromising the appserver...
        If the attacker is after your data then this is already enough, if they want to compromise the appserver there are potential routes from the database (

        • by JBMcB ( 73720 )

          Unless you design your jump server very well, it will become a prime target... Compromise that box and you get access to everything, plus copies of everyone's credentials.

          True, though securing one server is much easier than securing all the clients on the intranet. That's the idea. The internet facing data center is segregated from the rest of the internal network, minimizing attack vectors. Also, the credentials used for the jump server are different than the credentials used to log in to the backend servers, and users are only given permission to access the servers they need. These are all separate from the regular corporate credentials.

          Compromising the database is not miraculous, SQL injection vulnerabilities are fairly common and will allow them to compromise the database server even without compromising the appserver...

          Of course. The idea here is to minim

          • by Bert64 ( 520050 )

            True, though securing one server is much easier than securing all the clients on the intranet. That's the idea. The internet facing data center is segregated from the rest of the internal network, minimizing attack vectors.

            You still have to secure all the clients, if a client device is compromised and the user logs into the jump server from it then you now have credentials for the jump server and potentially for any system beyond depending on the user.
            You also have to secure any systems used to manage the clients, such as a domain controller etc - as if you compromise that, you gain access to all the clients anyway.
            Then you also have to secure the hypervisors if you're using virtual machines.
            If your workstations are all stand

    • A web server (especially with server-side scripts) or e-mail server is also publicly exposed. But the interfaces are designed for it.
      You could just as well design your SQL server and configuration that way.

      It is not SQL per se, that is the problem. It is an API that was not designed for it.

      E.g. if each client gets a fully separate isolated process with his own database storage directory, and the OS can enforce those rules, then it's not much different than e.g. a PHP web page, and all you need, is tell the

      • Yeah, if SQL servers were written securely, then there would be no need to keep it off the open internet.
        • Yeah, if SQL servers were written securely, then there would be no need to keep it off the open internet.

          If this is only SQL Servers, it implies that the infection is through the DB server process itself.

          The fact that the DB server process can install programs and alter configuration settings is really bad. Is Windows missing mandatory access controls similar to SELinux?

          Then, as others have pointed out: the DB server should not be exposed to the Internet. It should be behind a firewall and access should be

      • by Anne Thwacks ( 531696 ) on Sunday April 05, 2020 @01:23AM (#59909656)
        It is not SQL per se

        No indeedy - large numbers of people realise that the problem is Microsoft SQL.

        Sane people do not use Microsoft products. There are other SQL products on the market (although you might want to avoid Oracle) - and they work better too.

      • It is not SQL per se, that is the problem. It is an API that was not designed for it.

        It's a stream protocol not an API.

        E.g. if each client gets a fully separate isolated process with his own database storage directory

        You can install as many instances of SQL Server as you want on a single system all during initial installation where each runs as a separate unprivileged user.

        Don't expect MS to ever get that right though. :)

        I don't understand how poor configuration and guessable passwords are the vendors fault. You have to take explicit steps to enable TCP protocol access to SQL server database AND reconfigure the local firewall to allow it thru.

        These exact same brute force attacks have been going on for decades on SSH enabled Linux sys

    • Code Red [wikipedia.org]: why on earth does anybody put their DB server directly on the internet?

    • Never put your database (any database) on the open internet.

      Anyone smart enough to know that isn't going to be using MS-SQL in the first place.

    • Never put your database (any database) on the open internet. You can be 100% invulnerable to these kinds of attacks with a simple firewall.

      At least until someone clicks that email attachment from "HR".

  • You can set them up once and they keep at it till told otherwise... The original programmer might already be incarcerated or dead
  • Oh wait, you said *MS*-SQL. ... Yeah, competency-wise, that sounds about right.

  • Looks like two problems to me: 1) MS-SQL servers can be hacked and their data extracted 2) MS-SQL servers have bugs whereby the attacker take over the host. Both of which are not uncommon for Microsoft services.

You know you've landed gear-up when it takes full power to taxi.

Working...