Threat IntelHIGH

Threat Intel - Continuous Attacks on MS-SQL Servers Unveiled

CSCyber Security News·Reporting by Tushar Subhra Dutta
Summary by CyberPings Editorial·AI-assisted·Reviewed by Rohit Rana
Ingested:
🎯

Basically, hackers are attacking poorly protected MS-SQL servers to install new malware.

Quick Summary

A persistent threat actor is targeting MS-SQL servers using new malware. This ongoing campaign risks extensive data exposure due to poor database security practices. Administrators must act now to secure their systems.

The Threat

The threat actor known as Larva-26002 has been relentlessly targeting Microsoft SQL (MS-SQL) servers since January 2024. This campaign has evolved from a ransomware operation to a more sophisticated strategy involving the deployment of a new scanner malware called ICE Cloud Client. The attacks, which are ongoing into 2026, utilize various tools and techniques to exploit poorly managed servers, indicating a long-term commitment to this malicious endeavor.

Initially, the group deployed Trigona and Mimic ransomware on exposed MS-SQL servers with weak credentials. They exploited the Bulk Copy Program (BCP) utility to install malware directly onto compromised hosts. Over time, they have upgraded their tools, including the introduction of a Rust-based scanner in 2025, and now the Go-based ICE Cloud Client in 2026. This progression shows the attackers' adaptability and determination to exploit vulnerabilities in database infrastructure.

Who's Behind It

Larva-26002 has demonstrated a clear pattern of targeting the same MS-SQL servers repeatedly. Their attacks are characterized by a shift from ransomware to scanning, which suggests they are building a network of compromised servers. The ICE Cloud Client malware collects data from these servers and sends it back to the attacker's command and control (C&C) server, allowing them to map out exposed database assets across the internet. This strategic approach raises concerns about the potential for larger, more damaging attacks in the future.

The use of Turkish binary strings within the malware hints at the attackers' origins or operational base, further linking them to previous incidents involving Mimic ransomware. This connection emphasizes the importance of recognizing patterns in cyber threats to better defend against them.

Tactics & Techniques

The attack mechanism begins when Larva-26002 identifies an MS-SQL server that is poorly secured. They gain access through brute force or dictionary attacks, then execute system commands to profile the host. Malware is created using the BCP utility, which exports malicious binaries from the database. In cases where BCP fails, they utilize tools like Curl or Bitsadmin via PowerShell to download the malware.

Once the ICE Cloud Launcher is executed, it connects to the C&C server to authenticate and download the core ICE Cloud Client. This client is disguised under random filenames to evade detection. It registers with the C&C server, receiving a list of MS-SQL addresses to target, along with credential pairs for login attempts. The entire process showcases the attackers' technical proficiency and their ability to adapt their strategies over time.

Defensive Measures

To mitigate the risks posed by Larva-26002, database administrators must take proactive measures. Here are some recommended actions:

  • Enforce strong passwords for all MS-SQL accounts and change them regularly.
  • Implement firewalls to restrict internet access to MS-SQL servers, allowing only authorized connections.
  • Regularly update endpoint security software to catch known malware before it executes.
  • Monitor for unusual BCP activity or unexpected files like api.exe in the system directories.

By following these guidelines, organizations can better protect themselves against the ongoing threats posed by Larva-26002 and similar actors. Vigilance and proactive security measures are essential in the ever-evolving landscape of cyber threats.

🔒 Pro insight: The shift from ransomware to scanning indicates a strategic pivot, suggesting Larva-26002 aims to build a robust infrastructure for future attacks.

Original article from

CSCyber Security News· Tushar Subhra Dutta
Read Full Article

Related Pings

MEDIUMThreat Intel

Researchers Roast Cybercriminals to Diminish Their Glamour

Researchers are roasting cybercriminals to diminish their glamor. This humorous approach aims to expose their failures and fracture trust within criminal networks. It's a fresh take on cybersecurity, focusing on education and awareness.

The Register Security·
HIGHThreat Intel

Node.js Maintainers Targeted - Sophisticated Social Engineering Scheme

A coordinated social engineering scheme is targeting Node.js developers, risking the integrity of widely used software packages. This alarming trend highlights the need for vigilance in the open-source community.

Cyber Security News·
HIGHThreat Intel

Transparent Tribe Targets India's Startup Ecosystem - New Threat

Acronis reveals that Transparent Tribe is now targeting India's startup sector, especially cybersecurity firms. This shift raises concerns about espionage and data security risks. Startups must bolster their defenses against these sophisticated attacks.

CyberWire Daily·
HIGHThreat Intel

Gaming Industry - High-Stakes Cybersecurity Threats Explained

Cybercriminals are increasingly targeting the gaming industry, driven by financial transactions and sensitive data. As casinos go digital, understanding these threats is vital for operators to safeguard their assets.

Cyber Security News·
HIGHThreat Intel

China-Linked TA416 Targets European Governments with Phishing

TA416, a China-aligned threat actor, is targeting European governments with sophisticated phishing campaigns using PlugX malware. This poses significant risks to diplomatic security. Stay informed to safeguard your organization.

The Hacker News·
HIGHThreat Intel

Spear-Phishing Campaign Neutralizes MFA for Executives

A new spear-phishing campaign is targeting senior executives, neutralizing MFA protections. This poses serious risks to corporate security. Organizations must enhance their defenses against such sophisticated threats.

SC Media·