Vollgar Botnet Launches Brute-Force Attacks Against MSSQL DB’s to Install Vollar Cryptocurrency Miners

Government staff mine cryptocurrency

A malware botnet has been launching brute-force attacks against Microsoft SQL (MSSQL) databases since May 2018, which used to take over administration accounts and then to install crypto-monetary scripts in the network.

The Botnet is still active and infects approximately 3,000 new MSSQL databases every day, as defined in a study published by cybersecurity company Guardicore.

Guardicore called Botnet Vollger, which has been de-facto alt-coin mined by most of today’s botnets based on its predisposition to mining the Vollger crypto-currency (VDS) alongside Monero (XMR).

mssql-botnet-dailies
Image: Guardicore

“During its two years of activity, the campaign’s attack flow has remained similar – thorough, well-planned and noisy,” said Ophir Harpaz, a cybersecurity researcher for Guardicore.

The brute attacks aimed at divining the MSSQL servers password have flooded the entire internet. Guardicore claims they have over 120 IPs used to launch attacks since May 2018, and most IPs are from China.

“These are most likely compromised machines, repurposed to scan and infect new victims,” Harpaz said. “While some of them were short-lived and responsible for only several incidents, a couple of source IPs were active for over three months.”

Harpaz said the Botnet was continuously churning, with the Botnet losing servers and adding new servers every day. More than 60% of all secret MSSQL servers remain with the Vollgar crypto-mining malware for short periods of up to two days, depending on Guardicore.

SEE ALSO:
Bitcoin Transactions Led FBI to Hackers Twitter

Nearly 20% of all MSSQL systems are infected for more than a week, and even longer, Harpaz states. However. This is because either Vollgar malware tends to cover itself from social security tools, or the database does not start with one.

But Guardicore also states that 10 percent of all victims get reinfected with the malware. Another vital statistic is the truth.

Harpaz says it typically occurs because the administrators do not correctly uninstall all malware modules, leaving the door to reinstall the malware.

mssql-botnet-overall
Image: Guardicore (supplied)

Guardicore has released a GitHub repository with file and backdoor accounts created by Vollgar malware on infected host systems to support victims with MSSQL administrations.

Total
0
Shares
Leave a Reply

Your email address will not be published. Required fields are marked *

Previous Post
Wordpress

Major WordPress Plugin Bug Lets Hackers to Change Users Into Admins Access

Next Post
Marriott Hackers

Marriott International Discloses Second Security Breach

Related Posts