{"id":5355,"date":"2023-09-07T19:21:28","date_gmt":"2023-09-07T17:21:28","guid":{"rendered":"https:\/\/sajberinfo.com\/?p=5355"},"modified":"2023-09-07T19:21:28","modified_gmt":"2023-09-07T17:21:28","slug":"ransomware-napad-na-mssql-baze-podataka","status":"publish","type":"post","link":"https:\/\/sajberinfo.com\/en\/2023\/09\/07\/ransomware-napad-na-mssql-baze-podataka\/","title":{"rendered":"Ransomware napad na MSSQL baze podataka"},"content":{"rendered":"<p><span style=\"font-size: 14pt;\"><em>Securonix Threat Research<\/em> tim je <a href=\"https:\/\/www.securonix.com\/blog\/securonix-threat-labs-security-advisory-threat-actors-target-mssql-servers-in-dbjammer-to-deliver-freeworld-ransomware\/\" target=\"_blank\" rel=\"noopener\">primijetio zanimljivu kampanju<\/a> u kojoj <a href=\"https:\/\/sajberinfo.com\/en\/2022\/03\/19\/hakeri-crni-sesiri-epizoda-3\/\" target=\"_blank\" rel=\"nofollow noopener\">napada\u010di<\/a> ciljaju izlo\u017eene <em>Microsoft SQL<\/em> (<em>MSSQL<\/em>) servise koriste\u0107i<a href=\"https:\/\/sajberinfo.com\/en\/2023\/09\/07\/brute-force-attack\/\" target=\"_blank\" rel=\"nofollow noopener\"> napade grube sile<\/a> (eng. <em>Brute-force<\/em>).<\/span><\/p>\n<div id=\"attachment_5358\" style=\"width: 1034px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-5358\" class=\"size-full wp-image-5358\" src=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2023\/09\/wp11146537-sql-server-wallpapers.jpg\" alt=\"MSSQL\" width=\"1024\" height=\"252\" srcset=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2023\/09\/wp11146537-sql-server-wallpapers.jpg 1024w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2023\/09\/wp11146537-sql-server-wallpapers-300x74.jpg 300w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2023\/09\/wp11146537-sql-server-wallpapers-768x189.jpg 768w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2023\/09\/wp11146537-sql-server-wallpapers-18x4.jpg 18w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><p id=\"caption-attachment-5358\" class=\"wp-caption-text\"><em>Microsoft SQL; Source: <a href=\"https:\/\/wallpapercave.com\/w\/wp11146537\" target=\"_blank\" rel=\"nofollow noopener\">Wallpapercave<\/a><\/em><\/p><\/div>\n<h2><span style=\"font-size: 14pt;\"><strong>Kampanja<\/strong><\/span><\/h2>\n<p><span style=\"font-size: 14pt;\">Zlonamjerni akteri koji su dio <em>DB#JAMMER<\/em> kampanje kompromituju izlo\u017eene <em>MSSQL<\/em> baze podataka koriste\u0107i napade grube sile i izgleda da su dobro opremljeni o spremni da isporu\u010de\u00a0 <em>ransomvare<\/em> i <em>Cobalt<\/em> <em>Strike<\/em> <a href=\"https:\/\/sajberinfo.com\/en\/2023\/04\/11\/payload\/\" target=\"_blank\" rel=\"nofollow noopener\">korisni dio virusa<\/a>. Neki od alata koji koriste za ove napade su softver za evidentiranje, <em>RAT<\/em> aktivne dijelove virusa, softvere za eksploataciju i kra\u0111u akreditiva, i na kraju <em>ransomvare<\/em>, koji se izgleda novija varijanta <em>Mimic ransomware<\/em> pod nazivom <em>FreeWorld<\/em>.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"font-size: 14pt;\"><strong>Funkcionisanje <em>MSSQL<\/em> napada<\/strong><\/span><\/h3>\n<p><span style=\"font-size: 14pt;\">Nakon uspje\u0161ne autentifikacije, napada\u010di po\u010dinju da evidentiraju bazu podataka, a \u010desto omogu\u0107ena funkcija <em>xp_cmdshell<\/em> omogu\u0107ava napada\u010dima da pokrenu komandno okru\u017eenje na ure\u0111aju i da pokrenu nekoliko aktivnih dijelova virusa. Nakon toga dolazi do kreiranja novih korisnika na ure\u0111aju, izmjena u bazi registra kako bi se osigurala uspje\u0161na veza i onemogu\u0107avanje mre\u017ene barijere (eng. <em>firewall<\/em>).<\/span><\/p>\n<p><span style=\"font-size: 14pt;\">Sljede\u0107i korak je povezivanje na udaljeni dijeljeni <em>SMB<\/em> koji napada\u010dima omogu\u0107ava instalaciju dodatnih alata, uklju\u010duju\u0107i <em>Cobalt<\/em> <em>Strike<\/em> okru\u017eenje i <em>AnyDesk<\/em> alat za daljinsku kontrolu. Tako\u0111e su upotrebljava napredni skener portova koji napada\u010dima omogu\u0107ava bo\u010dno kretanje (eng. <em>lateral movement<\/em>), kao i <em>Mimikatz<\/em> aplikacija otvorenog k\u00f4da koja napada\u010dima omogu\u0107ava preuzimanje akreditiva. Na kraju dolazi do pokretanja <em>FreeWorld<\/em> <em>ransomware<\/em> zlonamjernog softvera koji enkriptovanim dokumentima daje \u201c<em>.FreeWorldEncryption<\/em>\u201d ekstenziju i po zavr\u0161etku enkripcije korisnici dobijaju poruku o otkupnini sa uputstvima o tome kako da platite da bi se datoteke de\u0161ifrovale.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h4><span style=\"font-size: 14pt;\"><strong>Za\u0161tita<\/strong><\/span><\/h4>\n<p><span style=\"font-size: 14pt;\">Uspjeh samog napada zavisi od uspjeha primjene napad grube sile na <em>MSSQL<\/em> servere. Iako jo\u0161 uvije nije jasno da li su napada\u010di koristili poku\u0161aje uno\u0161enja <a href=\"https:\/\/sajberinfo.com\/en\/2019\/02\/24\/lozinka-password-sifra\/\" target=\"_blank\" rel=\"nofollow noopener\">lozinke<\/a> zasnovane na rje\u010dniku ili nasumi\u010dne poku\u0161aje, veoma je va\u017eno naglasiti upotrebu jakih lozinki, posebno na javno izlo\u017eenim uslugama. Kako bi se za\u0161titi, korisnici bi trebalo primijeniti slijede\u0107e preporuke:<\/span><\/p>\n<ul>\n<li><span style=\"font-size: 14pt;\">Korisiti\u00a0 jake, slo\u017eene lozinke, posebno na uslugama koje su izlo\u017eene Internetu.<\/span><\/li>\n<li><span style=\"font-size: 14pt;\">U <em>MSSQL<\/em> okru\u017eenjima ograni\u010dite upotrebu uskladi\u0161tene procedure <em>xp_cmdshell.<\/em><\/span><\/li>\n<li><span style=\"font-size: 14pt;\">Umjesto da usluge izla\u017eete Internetu, iskoristite pouzdanu platformu kao \u0161to je <em><a href=\"https:\/\/sajberinfo.com\/en\/2021\/10\/17\/vpn-sigurno-mrezno-povezivanje\/\" target=\"_blank\" rel=\"nofollow noopener\">VPN<\/a>.<\/em><\/span><\/li>\n<li><span style=\"font-size: 14pt;\">Nadgledati uobi\u010dajene direktorijume za postavljanje zlonamjernog softvera, posebno \u201c<em>C:\\Windows\\Temp<\/em>\u201d koji se upotrebljava u ovom napadu.<\/span><\/li>\n<\/ul>","protected":false},"excerpt":{"rendered":"<p>Securonix Threat Research tim je primijetio zanimljivu kampanju u kojoj napada\u010di ciljaju izlo\u017eene Microsoft SQL (MSSQL) servise koriste\u0107i napade grube sile (eng. Brute-force). Kampanja Zlonamjerni akteri koji su dio DB#JAMMER kampanje kompromituju izlo\u017eene MSSQL&#46;&#46;&#46;<\/p>","protected":false},"author":1,"featured_media":5358,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[156,521,523,524,520,522,145],"class_list":["post-5355","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-hronike","tag-cobalt-strike","tag-dbjammer","tag-freeworld","tag-mimikatz","tag-mssql","tag-ransomvare","tag-rat"],"_links":{"self":[{"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/posts\/5355","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/comments?post=5355"}],"version-history":[{"count":0,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/posts\/5355\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/media\/5358"}],"wp:attachment":[{"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/media?parent=5355"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/categories?post=5355"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/tags?post=5355"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}