Agent 1433: remote attack on Microsoft SQL Server
#1
Exclamation 
Quote:
[Image: malicious-tasks-in-ms-sql-server-1.png]

All over the world companies large and small use Microsoft SQL Server for database management. Highly popular yet insufficiently protected, this DBMS is a target of choice for hacking. One of the most common attack on Microsoft SQL Server — the remote attack based on malicious jobs — has been around for a long time, but it is still used to get access to workstations through less-than-strong administrator password.

According to our statistics, the majority of such attacks fall on Vietnam (>16%), Russia (~12%), India (~7%), China (~6%), Turkey and Brazil (5% each).

Attack description

Microsoft SQL Server attacks are normally massive in nature and have no particular target: the attackers scan sub-networks in search of a server with a weak password. The attack begins with a remote check of whether the system has MS SQL Server installed; next the intruders proceed to brute-force the account password to access the system. In addition to password brute-forcing, they may also resort to authorization via a user account token, authorized on a previously infected machine.
Continue Reading
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
AnyViewer 3.6.0 for macOS
AnyViewer 3.6.0 fo...harlan4096 — 10:44
AnyViewer 5.7.0 for Windows
AnyViewer 5.7.0 fo...harlan4096 — 10:42
Open-source project brings NVIDIA Reflex...
Reflex support wit...harlan4096 — 08:22
uBOLite 2026.516.1652
uBOLite 2026.516.1...harlan4096 — 07:26
Sandboxie 1.17.6 / 5.72.6
Sandboxie-Plus ver...harlan4096 — 07:24

[-]
Birthdays
Today's Birthdays
avatar (28)akiratoriyama
avatar (48)Jerrycix
avatar (40)awedoli
avatar (82)WinRARHowTo
Upcoming Birthdays
avatar (39)axuben
avatar (40)ihijudu
avatar (50)Mirzojap
avatar (36)idilysaju
avatar (40)GregoryRog
avatar (40)odukoromu
avatar (46)Joanna4589

[-]
Online Staff
There are no staff members currently online.

>