Statistics Report on Malware Targeting Windows Database Servers in Q2 2025
The analysis team has categorized attacks on MS-SQL and MySQL servers installed on Windows systems during Q2 2025. While the number of targeted systems remains stable, attacks on MS-SQL servers have been decreasing. MySQL servers saw a significant spike in attacks in June 2025. The report provides detailed statistics on attack trends, including graphs illustrating the attack status for both server types. It also includes a list of MD5 hashes, URLs, FQDNs, and IP addresses associated with the malicious activities. The analysis covers various types of malware and tools used in these attacks, ranging from backdoors and miners to ransomware and remote access trojans.
AI Analysis
Technical Summary
The provided report details a campaign of malware attacks targeting Windows-based database servers, specifically MS-SQL and MySQL, during the second quarter of 2025. The analysis highlights a stable number of targeted systems overall, with a notable decrease in attacks against MS-SQL servers but a significant spike in attacks targeting MySQL servers in June 2025. The malware involved encompasses a broad spectrum of threats, including backdoors, cryptocurrency miners, ransomware, and remote access trojans (RATs). The campaign leverages various tools and malware families such as ShadowForce, JuicyPotato, Cobalt Strike, Remcos, Loveminer, and MyKings, indicating a multi-faceted attack approach. Techniques referenced by MITRE ATT&CK IDs (e.g., T1133, T1082, T1190, T1486) suggest exploitation of network services, credential dumping, lateral movement, persistence, and ransomware deployment. Indicators of compromise (IOCs) include multiple IP addresses, domain names, and file hashes associated with malicious payloads and command-and-control infrastructure. The absence of known exploits in the wild implies that the attacks may rely on a combination of credential theft, misconfigurations, and possibly zero-day or unpatched vulnerabilities. The report also references external analysis by AhnLab, providing further technical insights. Overall, this campaign represents a persistent and evolving threat to Windows database servers, with a shift in attacker focus from MS-SQL to MySQL environments.
Potential Impact
For European organizations, this threat poses significant risks to the confidentiality, integrity, and availability of critical database assets. Compromise of MS-SQL or MySQL servers can lead to unauthorized data access, data exfiltration, and disruption of business operations. The presence of ransomware capabilities (e.g., T1486) can result in data encryption and operational downtime, with potential financial losses and reputational damage. Cryptocurrency miners embedded in infected servers may degrade performance and increase operational costs. The use of remote access trojans and backdoors facilitates persistent attacker presence, enabling further lateral movement within networks and potential escalation to other critical systems. Given the widespread use of Windows-based database servers across European industries—including finance, healthcare, manufacturing, and public sector—the impact can be broad and severe. Additionally, the spike in MySQL attacks suggests that organizations relying on this database platform may face increased targeting, necessitating heightened vigilance. The campaign's use of diverse malware and attack techniques complicates detection and response efforts, increasing the risk of prolonged compromise.
Mitigation Recommendations
European organizations should implement targeted mitigation strategies beyond generic best practices: 1) Conduct thorough inventory and segmentation of database servers, isolating them from general network access to reduce exposure. 2) Enforce strict access controls and multi-factor authentication (MFA) for database administrative accounts to prevent credential abuse. 3) Regularly audit and harden database configurations, disabling unused services and enforcing least privilege principles. 4) Deploy advanced endpoint detection and response (EDR) solutions capable of identifying behaviors associated with known malware families and attack techniques referenced (e.g., lateral movement, credential dumping). 5) Monitor network traffic for communications with known malicious IPs and domains listed in the indicators of compromise, integrating threat intelligence feeds for real-time alerts. 6) Apply timely patches and updates to database software and underlying Windows OS, even though no known exploits are reported, to mitigate potential vulnerabilities. 7) Implement robust backup and recovery procedures, ensuring offline and immutable backups to mitigate ransomware impact. 8) Conduct regular threat hunting exercises focusing on signs of persistence mechanisms such as backdoors and RATs. 9) Educate IT and security teams on the specific tactics and malware families involved to improve detection and incident response readiness. 10) Restrict use of remote administration tools like AnyDesk unless strictly necessary and monitored.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Belgium, Sweden, Switzerland
Indicators of Compromise
- ip: 154.204.177.54
- hash: 2cd59cff23a2e0f98e710bf52b799154
- hash: 33096e0bc0785ffb2094054bebb9be26
- hash: 3ee3a5fef87b72a024bd0f45e6f6039f
- hash: 454ff880e99d5777276bdee1a3e078d9
- hash: 9d098864bc5746b9ff00432686d59b9f
- hash: 93100ba55fcbb8e572ad231eec24e02fa744244a
- hash: 960efb1f961ce6c8fbd4dfb09ba76f32882a5225
- hash: a56ccf64692edca0c60a68e0c374e23d13ce0111
- hash: 046c011bbf14fa5d187bd4d5ac2a7cf1317f103ae2ba46769a451add5735c8e8
- hash: 3389a0a7e2f8bee5fe7b4a9d8e45d75c6e3b75af5cec244ebdfb36699d29d89d
- hash: fb7b3b5fa40d52639a0932c474cab05f1394e35c55a29a3238c9641344e79230
- ip: 103.101.178.170
- ip: 154.222.24.186
- ip: 39.108.132.22
- domain: yyinfo8999.fit
- domain: star.zcnet.net
Statistics Report on Malware Targeting Windows Database Servers in Q2 2025
Description
The analysis team has categorized attacks on MS-SQL and MySQL servers installed on Windows systems during Q2 2025. While the number of targeted systems remains stable, attacks on MS-SQL servers have been decreasing. MySQL servers saw a significant spike in attacks in June 2025. The report provides detailed statistics on attack trends, including graphs illustrating the attack status for both server types. It also includes a list of MD5 hashes, URLs, FQDNs, and IP addresses associated with the malicious activities. The analysis covers various types of malware and tools used in these attacks, ranging from backdoors and miners to ransomware and remote access trojans.
AI-Powered Analysis
Technical Analysis
The provided report details a campaign of malware attacks targeting Windows-based database servers, specifically MS-SQL and MySQL, during the second quarter of 2025. The analysis highlights a stable number of targeted systems overall, with a notable decrease in attacks against MS-SQL servers but a significant spike in attacks targeting MySQL servers in June 2025. The malware involved encompasses a broad spectrum of threats, including backdoors, cryptocurrency miners, ransomware, and remote access trojans (RATs). The campaign leverages various tools and malware families such as ShadowForce, JuicyPotato, Cobalt Strike, Remcos, Loveminer, and MyKings, indicating a multi-faceted attack approach. Techniques referenced by MITRE ATT&CK IDs (e.g., T1133, T1082, T1190, T1486) suggest exploitation of network services, credential dumping, lateral movement, persistence, and ransomware deployment. Indicators of compromise (IOCs) include multiple IP addresses, domain names, and file hashes associated with malicious payloads and command-and-control infrastructure. The absence of known exploits in the wild implies that the attacks may rely on a combination of credential theft, misconfigurations, and possibly zero-day or unpatched vulnerabilities. The report also references external analysis by AhnLab, providing further technical insights. Overall, this campaign represents a persistent and evolving threat to Windows database servers, with a shift in attacker focus from MS-SQL to MySQL environments.
Potential Impact
For European organizations, this threat poses significant risks to the confidentiality, integrity, and availability of critical database assets. Compromise of MS-SQL or MySQL servers can lead to unauthorized data access, data exfiltration, and disruption of business operations. The presence of ransomware capabilities (e.g., T1486) can result in data encryption and operational downtime, with potential financial losses and reputational damage. Cryptocurrency miners embedded in infected servers may degrade performance and increase operational costs. The use of remote access trojans and backdoors facilitates persistent attacker presence, enabling further lateral movement within networks and potential escalation to other critical systems. Given the widespread use of Windows-based database servers across European industries—including finance, healthcare, manufacturing, and public sector—the impact can be broad and severe. Additionally, the spike in MySQL attacks suggests that organizations relying on this database platform may face increased targeting, necessitating heightened vigilance. The campaign's use of diverse malware and attack techniques complicates detection and response efforts, increasing the risk of prolonged compromise.
Mitigation Recommendations
European organizations should implement targeted mitigation strategies beyond generic best practices: 1) Conduct thorough inventory and segmentation of database servers, isolating them from general network access to reduce exposure. 2) Enforce strict access controls and multi-factor authentication (MFA) for database administrative accounts to prevent credential abuse. 3) Regularly audit and harden database configurations, disabling unused services and enforcing least privilege principles. 4) Deploy advanced endpoint detection and response (EDR) solutions capable of identifying behaviors associated with known malware families and attack techniques referenced (e.g., lateral movement, credential dumping). 5) Monitor network traffic for communications with known malicious IPs and domains listed in the indicators of compromise, integrating threat intelligence feeds for real-time alerts. 6) Apply timely patches and updates to database software and underlying Windows OS, even though no known exploits are reported, to mitigate potential vulnerabilities. 7) Implement robust backup and recovery procedures, ensuring offline and immutable backups to mitigate ransomware impact. 8) Conduct regular threat hunting exercises focusing on signs of persistence mechanisms such as backdoors and RATs. 9) Educate IT and security teams on the specific tactics and malware families involved to improve detection and incident response readiness. 10) Restrict use of remote administration tools like AnyDesk unless strictly necessary and monitored.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://asec.ahnlab.com/en/88920"]
- Adversary
- null
- Pulse Id
- 68962f0d3f4895c81350d372
- Threat Score
- null
Indicators of Compromise
Ip
Value | Description | Copy |
---|---|---|
ip154.204.177.54 | — | |
ip103.101.178.170 | — | |
ip154.222.24.186 | — | |
ip39.108.132.22 | — |
Hash
Value | Description | Copy |
---|---|---|
hash2cd59cff23a2e0f98e710bf52b799154 | — | |
hash33096e0bc0785ffb2094054bebb9be26 | — | |
hash3ee3a5fef87b72a024bd0f45e6f6039f | — | |
hash454ff880e99d5777276bdee1a3e078d9 | — | |
hash9d098864bc5746b9ff00432686d59b9f | — | |
hash93100ba55fcbb8e572ad231eec24e02fa744244a | — | |
hash960efb1f961ce6c8fbd4dfb09ba76f32882a5225 | — | |
hasha56ccf64692edca0c60a68e0c374e23d13ce0111 | — | |
hash046c011bbf14fa5d187bd4d5ac2a7cf1317f103ae2ba46769a451add5735c8e8 | — | |
hash3389a0a7e2f8bee5fe7b4a9d8e45d75c6e3b75af5cec244ebdfb36699d29d89d | — | |
hashfb7b3b5fa40d52639a0932c474cab05f1394e35c55a29a3238c9641344e79230 | — |
Domain
Value | Description | Copy |
---|---|---|
domainyyinfo8999.fit | — | |
domainstar.zcnet.net | — |
Threat ID: 689665faad5a09ad0006b454
Added to database: 8/8/2025, 9:02:50 PM
Last enriched: 8/8/2025, 9:18:20 PM
Last updated: 8/10/2025, 7:08:12 AM
Views: 9
Related Threats
Phishing Attack: Deploying Malware on Indian Defense BOSS Linux
MediumExposed JDWP Exploited in the Wild: What Happens When Debug Ports Are Left Open
Medium650 Attack Tools, One Coordinated Campaign
MediumStatistics Report on Malware Targeting Windows Web Servers in Q2 2025
MediumUnmasking SocGholish: The Malware Web Behind the 'Pioneer of Fake Updates' and Its Operator, TA569
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.