Sunday, February 5, 2023
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Glossary
  • Community Forum
  • Web Hosting Directory
  • Login
  • Register
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Network/Internet
    • Windows
    • Software
    • Hardware
    • Blockchain
    • Policy/Legislation
    • How-Tos
    • Troubleshooting
No Result
View All Result
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Network/Internet
    • Windows
    • Software
    • Hardware
    • Blockchain
    • Policy/Legislation
    • How-Tos
    • Troubleshooting
No Result
View All Result
Cloud7 News
No Result
View All Result

Home > Cybersecurity > Backdoor malware uses ‘Magic Password’ to connect MSSQL accounts

Backdoor malware uses ‘Magic Password’ to connect MSSQL accounts


Seda Nur Cinar Seda Nur Cinar
October 29, 2019
2 min read

“Winnti”, a Chinese hacking group, used a new malware called Skip 2.0 in order to access Microsoft SQL (MSSQL) Servers. This group was infamous for making targeted attacks to Gaming studios and IT companies since 2012.

Malware installing itself in the memory

Security researchers from IT Security firm Eset discovered a new malware installing itself in the memory. At the beginning of 2019, Eset received a sample of this new backdoor and they called it Skip 2.0. This was a backdoor targeting malware using Microsoft SQL (MSSQL)’s undocumented calls.

This backdoor was very similar to another, namely the PortReuse. This was another tool Winnti Group had used in the past cluing the Eset researchers that this backdoor is linked to them. According to Eset researchers, skip-2.0 is the first MSSQL Server backdoor to be documented publicly.

“We observed multiple similarities between skip-2.0 and other tools from the Winnti Group’s arsenal. Its VMProtected launcher, custom packer, Inner-Loader injector, and hooking framework are part of the already known toolset of the Winnti Group. This leads us to think that skip-2.0 is also part of that toolset,”

Eset said in a statement.

Attackers use a magic password

By providing attackers with a magic password, it allows attackers to reach any MSSQL account running MSSQL Server version 11 or 12. According to Censys’s data, even though MSSQL Server 11 and 12 are not the most recent versions, they are the most commonly used ones in the IT world.

While connecting any MSSQL account by using a magic password, the attackers automatically hide these connections from the logs. Moreover, it allows you to copy, modify or delete database content. The IT security firm summarized the backdoor:

The skip-2.0 backdoor is an interesting addition to the Winnti Group’s arsenal, sharing many similarities with the group’s already known toolset, and allowing the attacker to achieve persistence on an MSSQL Server. Considering that administrative privileges are required for installing the hooks, skip-2.0 must be used on already compromised MSSQL Servers to achieve persistence and stealthiness.

See more Cybersecurity News


Tags: MalwareMSSQLPortReuseVulnerability
Seda Nur Cinar

Seda Nur Cinar

Seda Nur Cinar is the news editor of the Cloud7 News. With more than 8 years of Linux and cloud experience, Seda is a Linux and opensource enthusiast, security researcher and a web application developer.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

Next Post
Apple and Google removed over 50 malicious apps stealing data

Apple and Google removed over 50 malicious apps stealing data

Related News

Total of 310,855,487 accounts were leaked in 2022

Total of 310,855,487 accounts were leaked in 2022

February 5, 2023 6:00 pm
Almond announces the acquisition of Amossys

Almond announces the acquisition of Amossys

February 5, 2023 12:00 pm
LockBit encryptor source code is updated

LockBit encryptor source code is updated

February 3, 2023 4:40 pm
Fortinet is expanding its SOC offerings portfolio

Fortinet is expanding its SOC offerings portfolio

February 3, 2023 2:00 pm
Get free daily newsletters from Cloud7 News Get the Cloud7 Newsletter
Select list(s):

Check your inbox or spam folder to confirm your subscription.

By subscribing, you agree to our
Copyright Policy and Privacy Policy

Get the free newsletter

Subscribe to receive the latest IT business updates straight to your inbox.

Select list(s):

Check your inbox or spam folder to confirm your subscription.

Editor's Choice

What’s new in Linux kernel 6.2 rc6?

10 Best Web Hosting Services of 2023

Ubuntu 22.04 LTS is available for download. What is new?

CERN and Fermilab recommend AlmaLinux

7 best hosting control panels of 2023

How to update Linux Kernel without rebooting?

7 best Linux mail servers of 2023

7 best cPanel alternatives for 2023

7 best Linux web browsers for 2023

7 best CentOS alternatives

7 best Linux server distros of 2023

Interview with Igor Seletskiy on AlmaLinux

How to create a VM on VMware Workstation

Recent News

  • Total of 310,855,487 accounts were leaked in 2022
  • HostPapa signs deal with Deluxe Corporation
  • Noventiq closes DigiTech acquisition
  • Almond announces the acquisition of Amossys
  • Keepit announced the launch of its backup and recovery solution for Power BI

Cloud7 News
Cloud7 is a news source that publishes the latest news, reviews, comparisons, opinions, and exclusive interviews to help tech users of high-experience levels in the IT industry.

EXPLORE

  • Web Hosting
  • Cloud Computing
  • Data Center
  • Cybersecurity
  • Linux
  • Network/Internet
  • Software
  • Hardware
  • How-Tos
  • Troubleshooting

RESOURCES

  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Glossary
  • Community Forum
  • Web Hosting Directory

Get the Cloud7 Newsletter

Get FREE daily newsletters from Cloud7 delivering the latest news and reviews.

  • About
  • Privacy & Policy
  • Copyright Policy
  • Contact

© 2023, Cloud7 News. All rights reserved.

No Result
View All Result
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Network/Internet
    • Windows
    • Software
    • Hardware
    • Blockchain
    • Policy/Legislation
    • How-Tos
    • Troubleshooting
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Glossary
  • Community Forum
  • Web Hosting Directory

© 2023, Cloud7 News. All rights reserved.

Welcome Back!

Sign In with Facebook
Sign In with Google
Sign In with Linked In
OR

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Sign Up with Facebook
Sign Up with Google
Sign Up with Linked In
OR

Fill the forms below to register

*By registering into our website, you agree to the Terms & Conditions and Privacy Policy.
All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.