,

SELECT XMRig FROM SQLServer

Detecteam Avatar

TLP

TLP CLEAR

Author

David Deflache

Summary

The attack on the Microsoft SQL Server involved a series of sophisticated techniques employed by the adversaries. It began with the initial stage of reconnaissance, where the attackers sought to identify vulnerabilities and potential entry points. They then proceeded to exploit a known vulnerability in the server software, gaining unauthorized access. Once inside, they executed a privilege escalation technique to obtain higher privileges and control over the system. With elevated access, they deployed a backdoor, allowing them to maintain persistence and remotely control the compromised server. This attack showcased the attackers’ proficiency in reconnaissance, exploitation, privilege escalation, and persistence, underscoring the importance of robust security measures.

DATA

TIMELINE

CATEGORY

Miner

references

https://thedfirreport.com/2022/07/11/select-xmrig-from-sqlserver/

MITRE ATT&CK