Attacks using Microsoft SQL Server increased by 56% in September 2022 compared to the same period last year, according to Kaspersky’s latest Managed Detection and Response report.

Microsoft SQL Server is used worldwide by corporations, medium and small businesses for database management. Kaspersky researchers found an increase in attacks that utilise Microsoft SQL Server’s processes. In September 2022, the number of SQL servers hit amounted to more than 3 000 units, growing by 56% compared to the same period last year. These attacks were successfully detected by Kaspersky Endpoint Security for Business and Managed Detection and Response.

The number of these attacks have been increasing gradually over the past year and have stayed above 3 000 since April 2022, except for a slight decrease in July and August.

“Despite Microsoft SQL Server’s popularity, companies may not be giving sufficient priority to protect against threats associated with the software. Attacks using malicious SQL Server jobs have been known for a long time, but it is still used by perpetrators to gain access to a company’s infrastructure,” says Sergey Soldatov, head of Security Operations Center at Kaspersky.

In the new report, devoted to the most interesting Managed Detection and Response incidents, Kaspersky experts describe an attack employing Microsoft SQL Server jobs – a sequence of commands executed by the server agent.

“Attackers attempted to modify the server configuration to gain access to the shell to run malware via PowerShell,” explains Soldatov. “The compromised SQL Server was trying to run malicious PowerShell scripts that generated a connection to external IP addresses. This PowerShell script runs the malware disguised as .png files from that external IP address using the ‘MsiMake’ attribute, which is very similar to the behaviour of PurpleFox malware.”