Skip to main content

Statistics Report on Malware Targeting Windows Database Servers in Q2 2025

Medium
Published: Fri Aug 08 2025 (08/08/2025, 17:08:29 UTC)
Source: AlienVault OTX General

Description

The analysis team has categorized attacks on MS-SQL and MySQL servers installed on Windows systems during Q2 2025. While the number of targeted systems remains stable, attacks on MS-SQL servers have been decreasing. MySQL servers saw a significant spike in attacks in June 2025. The report provides detailed statistics on attack trends, including graphs illustrating the attack status for both server types. It also includes a list of MD5 hashes, URLs, FQDNs, and IP addresses associated with the malicious activities. The analysis covers various types of malware and tools used in these attacks, ranging from backdoors and miners to ransomware and remote access trojans.

AI-Powered Analysis

AILast updated: 08/08/2025, 21:18:20 UTC

Technical Analysis

The provided report details a campaign of malware attacks targeting Windows-based database servers, specifically MS-SQL and MySQL, during the second quarter of 2025. The analysis highlights a stable number of targeted systems overall, with a notable decrease in attacks against MS-SQL servers but a significant spike in attacks targeting MySQL servers in June 2025. The malware involved encompasses a broad spectrum of threats, including backdoors, cryptocurrency miners, ransomware, and remote access trojans (RATs). The campaign leverages various tools and malware families such as ShadowForce, JuicyPotato, Cobalt Strike, Remcos, Loveminer, and MyKings, indicating a multi-faceted attack approach. Techniques referenced by MITRE ATT&CK IDs (e.g., T1133, T1082, T1190, T1486) suggest exploitation of network services, credential dumping, lateral movement, persistence, and ransomware deployment. Indicators of compromise (IOCs) include multiple IP addresses, domain names, and file hashes associated with malicious payloads and command-and-control infrastructure. The absence of known exploits in the wild implies that the attacks may rely on a combination of credential theft, misconfigurations, and possibly zero-day or unpatched vulnerabilities. The report also references external analysis by AhnLab, providing further technical insights. Overall, this campaign represents a persistent and evolving threat to Windows database servers, with a shift in attacker focus from MS-SQL to MySQL environments.

Potential Impact

For European organizations, this threat poses significant risks to the confidentiality, integrity, and availability of critical database assets. Compromise of MS-SQL or MySQL servers can lead to unauthorized data access, data exfiltration, and disruption of business operations. The presence of ransomware capabilities (e.g., T1486) can result in data encryption and operational downtime, with potential financial losses and reputational damage. Cryptocurrency miners embedded in infected servers may degrade performance and increase operational costs. The use of remote access trojans and backdoors facilitates persistent attacker presence, enabling further lateral movement within networks and potential escalation to other critical systems. Given the widespread use of Windows-based database servers across European industries—including finance, healthcare, manufacturing, and public sector—the impact can be broad and severe. Additionally, the spike in MySQL attacks suggests that organizations relying on this database platform may face increased targeting, necessitating heightened vigilance. The campaign's use of diverse malware and attack techniques complicates detection and response efforts, increasing the risk of prolonged compromise.

Mitigation Recommendations

European organizations should implement targeted mitigation strategies beyond generic best practices: 1) Conduct thorough inventory and segmentation of database servers, isolating them from general network access to reduce exposure. 2) Enforce strict access controls and multi-factor authentication (MFA) for database administrative accounts to prevent credential abuse. 3) Regularly audit and harden database configurations, disabling unused services and enforcing least privilege principles. 4) Deploy advanced endpoint detection and response (EDR) solutions capable of identifying behaviors associated with known malware families and attack techniques referenced (e.g., lateral movement, credential dumping). 5) Monitor network traffic for communications with known malicious IPs and domains listed in the indicators of compromise, integrating threat intelligence feeds for real-time alerts. 6) Apply timely patches and updates to database software and underlying Windows OS, even though no known exploits are reported, to mitigate potential vulnerabilities. 7) Implement robust backup and recovery procedures, ensuring offline and immutable backups to mitigate ransomware impact. 8) Conduct regular threat hunting exercises focusing on signs of persistence mechanisms such as backdoors and RATs. 9) Educate IT and security teams on the specific tactics and malware families involved to improve detection and incident response readiness. 10) Restrict use of remote administration tools like AnyDesk unless strictly necessary and monitored.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://asec.ahnlab.com/en/88920"]
Adversary
null
Pulse Id
68962f0d3f4895c81350d372
Threat Score
null

Indicators of Compromise

Ip

ValueDescriptionCopy
ip154.204.177.54
ip103.101.178.170
ip154.222.24.186
ip39.108.132.22

Hash

ValueDescriptionCopy
hash2cd59cff23a2e0f98e710bf52b799154
hash33096e0bc0785ffb2094054bebb9be26
hash3ee3a5fef87b72a024bd0f45e6f6039f
hash454ff880e99d5777276bdee1a3e078d9
hash9d098864bc5746b9ff00432686d59b9f
hash93100ba55fcbb8e572ad231eec24e02fa744244a
hash960efb1f961ce6c8fbd4dfb09ba76f32882a5225
hasha56ccf64692edca0c60a68e0c374e23d13ce0111
hash046c011bbf14fa5d187bd4d5ac2a7cf1317f103ae2ba46769a451add5735c8e8
hash3389a0a7e2f8bee5fe7b4a9d8e45d75c6e3b75af5cec244ebdfb36699d29d89d
hashfb7b3b5fa40d52639a0932c474cab05f1394e35c55a29a3238c9641344e79230

Domain

ValueDescriptionCopy
domainyyinfo8999.fit
domainstar.zcnet.net

Threat ID: 689665faad5a09ad0006b454

Added to database: 8/8/2025, 9:02:50 PM

Last enriched: 8/8/2025, 9:18:20 PM

Last updated: 8/10/2025, 7:08:12 AM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats