Article Details
Scrape Timestamp (UTC): 2024-01-09 14:00:54.847
Source: https://thehackernews.com/2024/01/turkish-hackers-exploiting-poorly.html
Original Article Text
Click to Toggle View
Turkish Hackers Exploiting Poorly Secured MS SQL Servers Across the Globe. Poorly secured Microsoft SQL (MS SQL) servers are being targeted in the U.S., European Union, and Latin American (LATAM) regions as part of an ongoing financially motivated campaign to gain initial access. "The analyzed threat campaign appears to end in one of two ways, either the selling of 'access' to the compromised host, or the ultimate delivery of ransomware payloads," Securonix researchers Den Iuzvyk, Tim Peck, and Oleg Kolesnikov said in a technical report shared with The Hacker News. The campaign, linked to actors of Turkish origin, has been codenamed RE#TURGENCE by the cybersecurity firm. Initial access to the servers entails conducting brute-force attacks, followed by the use of xp_cmdshell configuration option to run shell commands on the compromised host. This activity mirrors that of a prior campaign dubbed DB#JAMMER that came to light in September 2023. This stage paves the way for the retrieval of a PowerShell script from a remote server that's responsible for fetching an obfuscated Cobalt Strike beacon payload. The post-exploitation toolkit is then used to download the AnyDesk remote desktop application from a mounted network share for accessing the machine and downloading additional tools such as Mimikatz to harvest credentials and Advanced Port Scanner to carry out reconnaissance. Lateral movement is accomplished by means of a legitimate system administration utility called PsExec, which can execute programs on remote Windows hosts. That attack chain, ultimately, culminates with the deployment of Mimic ransomware, a variant of which was also used in the DB#JAMMER campaign. Securonix said it uncovered an operational security (OPSEC) blunder made by the threat actors that allowed it to monitor clipboard activity owing to the fact that the clipboard sharing feature of AnyDesk was enabled. This made it possible to glean their Turkish origins and their online alias atseverse, which also corresponds to a profile on Steam and a Turkish hacking forum called SpyHack. "Always refrain from exposing critical servers directly to the internet," the researchers cautioned. "With the case of RE#TURGENCE attackers were directly able to brute force their way into the server from outside the main network." The Ultimate Enterprise Browser Checklist Download a Concrete and Actionable Checklist for Finding a Browser Security Platform. Master Cloud Security - Get FREE eBook Comprehensive eBook covering cloud security across infrastructure, containers, and runtime environments for security professionals
Daily Brief Summary
Turkish threat actors are exploiting poorly secured Microsoft SQL servers in the U.S., EU, and LATAM, potentially leading to the sale of server access or ransomware attacks.
The cyberattack campaign, named RE#TURGENCE, employs brute-force methods and utilizes the xp_cmdshell option for initial access.
These attacks mirror a previous campaign, DB#JAMMER, and involve the retrieval of a PowerShell script that delivers an obfuscated Cobalt Strike beacon payload.
Attackers use AnyDesk, Mimikatz, and Advanced Port Scanner for system access, credential harvesting, and reconnaissance, followed by lateral movement with PsExec.
The RE#TURGENCE campaign's end goal includes deploying Mimic ransomware, with operational security errors revealing the hackers’ Turkish origins.
Researchers urge organizations not to expose critical servers directly to the internet to prevent such brute-force attacks and unauthorized access.