Poorly secured databases targeted by 'Gh0stCringe' backdoor

By
Follow google news

MySQL and MS SQL Server instances attacked.

Database administrators need to tighten up the security on their installations, with attackers seen abusing weak login credentials to install the "Gh0stCringe" remote access tool (RAT) on them.

Poorly secured databases targeted by 'Gh0stCringe' backdoor
Source: AhnLab

Security vendor AhnLab said Oracle's open source MySQL and Microsoft's SQL Server have been attacked by the malware, which is also known as CirenegRAT and is based on the older Gh0st RAT backdoor.

Gh0stCringe supports multiple commands along with functions that can be enabled after the malware contacts its command and control server, or through settings data during deployment.

Attackers can command Gh0stCringe to download payloads such as cryptominers from C2 servers, connect to specific websites through the Internet Explorer web browser, and also  destroy the Master Boot Record (MBR) on the start up disk.

The malware comes with a keylogger that if activated stores user input in the Default.key file in the Windows System directory.

It can also collect Windows system and security product information that is sent on to the C2 server, AhnLab noted.

AhnLab said it's mainly database servers with poorly managed account credentials which are subject to Gh0stCringe attacks, although in some cases unpatched vulnerabilities are also used to deploy the malware.

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © iTnews.com.au . All rights reserved.
Tags:

Most Read Articles

Euro cops take down cybercrime network with 49 million fake accounts

Euro cops take down cybercrime network with 49 million fake accounts

QLD government retires CISO position title

QLD government retires CISO position title

Hidden "Glassworm" malware spreads through infected VS Code extensions

Hidden "Glassworm" malware spreads through infected VS Code extensions

Windows Server Update Services bug exploited in the wild

Windows Server Update Services bug exploited in the wild

Log In

  |  Forgot your password?