Oasis Ticket Sales Scams: How to Stay Safe
During our weekly meetings with the banking industry and Police Scotland, we continue to see a significant increase in ticket scams over the last three…
A concerning campaign known as “DB#JAMMER” has recently emerged, drawing the attention of security researchers. In this evolving threat landscape, hackers are capitalising on insecurely configured Microsoft SQL (MS SQL) servers to execute attacks that deliver both Cobalt Strike and FreeWorld ransomware. Securonix initially identified this campaign, noting its distinctive use of tooling infrastructure and payloads, coupled with remarkable speed in execution. Furthermore, DB#JAMMER’s threat level is assessed as medium to high due to indications that the hackers are targeting more than just MS SQL servers.
The hackers’ arsenal includes enumeration tools, credential theft utilities, and ransomware and remote access trojan (RAT) payloads. The initial breach involves brute-force attacks directed at MS SQL servers. Once inside, the attackers enumerate databases and exploit the xp_cmdshell configuration option to gather reconnaissance data and execute shell commands. Subsequently, the hackers disable system firewalls and establish persistence by employing remote SMB shares for file transfers, along with the installation of malicious tools, such as Cobalt Strike. This groundwork lays the foundation for the deployment of AnyDesk software, which, in turn, facilitates the installation of FreeWorld ransomware. Lateral movement is also a part of their strategy, as they attempt to spread malicious software throughout the target network. Of note are the hackers’ unsuccessful attempts to establish Remote Desktop Protocol (RDP) persistence via Ngrok.
To safeguard against the “DB#JAMMER” campaign and similar threats, consider the following recommendations, including those from the Securonix research team:
The success of the malicious “DB#JAMMER” campaign underscores the vital importance of robust password management, especially for publicly exposed services. Strong, unique passwords are a fundamental defence against brute-force attacks on MS SQL servers. By following the recommendations provided by Securonix and adhering to general security best practices, organisations can fortify their defences and better shield themselves against the ever-evolving threat landscape of cyber attacks.