Cybersecurity researchers claim to have discovered a previously undocumented backdoor specifically designed for Microsoft SQL servers that could allow a remote attacker to control an already compromised system stealthily.
Dubbed Skip-2.0, the backdoor malware is a post-exploitation tool that runs in the memory and lets remote attackers connect to any account on the server running MSSQL version 11 and version 12 by using a “magic password.”
What’s more? The malware manages to remain undetected on the victim’s MSSQL Server by disabling the compromised machine’s logging functions, event publishing, and audit mechanisms every time the “magic password” is used.
With these capabilities, an attacker can stealthily copy, modify, or delete the content stored in a database, the impact of which varies from application to application integrated with targeted servers.
images from Hacker News
Recent Comments