Threat actors exploit inadequately secured Microsoft SQL (MS SQL) servers to deliver Cobalt Strike and a type of ransomware known as FreeWorld.
“Some of these tools include enumeration software, RAT payloads, exploitation and credential stealing software, and finally, ransomware payloads,” noted security researchers.
Modus Operandi
Security firm Securonix named this campaign DB#JAMMER, highlighting the distinctive approach to utilizing the toolset and infrastructure.
Initial Stage
The initial entry to the victim’s system involves brute-forcing the MS SQL server, utilizing it to explore the database, and using the xp_cmdshell configuration option to execute shell commands and gather information.
Next Stage
The subsequent phase involves efforts to disable the system firewall and establish persistence by connecting to a remote SMB share for file transfers between the victim’s system and installing malicious tools like Cobalt Strike.
Final Stage
This sequence of events then sets the stage for the deployment of AnyDesk software, ultimately leading to the installation of FreeWorld ransomware with an intermediate lateral movement step. The unidentified attackers also made unsuccessful attempts to establish RDP persistence via Ngrok.
“The attack succeeded initially due to a brute force attack on an MS SQL server,” emphasized the researchers. “It’s crucial to stress the importance of robust passwords, especially for publicly exposed services.”
Do we have the past of FreeWorld?
“The tools include enumeration software, RAT payloads, exploitation and credential-stealing software, and finally, ransomware payloads.”
“The ransomware payload of choice appears to be a newer variant of Mimic ransomware called FreeWorld. The FreeWorld text was present in the binary file names and ransomware extensions.”
Ransomware on rise
The year 2023 has witnessed a significant surge in ransomware attacks. Ransomware threat actors are evolving their extortion methods, including sharing specifics of their attack techniques to argue that victims aren’t eligible for cyber insurance compensation.
The right way to keep a guard on ransomware is the multi-layered approach in end-points. E-mail, web and network. Choose the right tools and correct approach. Being safe is the best!