Ad End 1 August 2025
Ad Ends 13 July 2025
ad End 25 October 2025
Ad Ends 20 April 2025
Ad expire at 5 August 2024
banner Expire 9 June 2025
banner Expire 25 October 2025
banner Expire 10 May 2025
What's new
Wizard's shop 2.0
Money Club cc shop
banner Expire 15 January 2025
banner Expire 20 October 2024
UniCvv
Yale Lodge
Kfc CLub
adv exp at 30 July 2025
Carding.pw carding forum
BidenCash Shop

KingMiner botnet operators hack MSSQL databases

File_closed07

TRUSTED VERIFIED SELLER
Staff member
Joined
Jun 13, 2020
Messages
7,907
Reaction score
942
Points
212
Awards
2
  • trusted user
  • Rich User
Criminals install a cryptocurrency miner that uses server resources.

48694eb620105a59223862def05075ae.jpg



Sophos experts reported a malicious campaign in which KingMiner botnet operators hack into MSSQL database administrator accounts using brute force. As soon as criminals break into a vulnerable MSSQL system, they create another user with the name “dbhelp” and install the Monero cryptocurrency miner using server resources.

KingMiner operators used to carry out attacks - at the end of 2018 and in July 2019. Although most malicious botnets cease to exist after several weeks or months of activity, KingMiner seems to have brought enough fraudsters to continue the attacks.

KingMiner operators continue to refine malware code by periodically adding new features. For example, a malware can exploit vulnerabilities (CVE-2017-0213 or CVE-2019-0803 ) to increase privileges on the system and execute code with administrator rights.

KingMiner operators have added this feature to prevent crashes in its operation due to security solutions or other botnets that could infect the same server.

In addition, KingMiner operators are currently experimenting with the EternalBlue exploit, which allows attackers to gain access to remote Windows systems through vulnerabilities in Server Message Block (SMB) protocol implementations. Although patches were released back in 2017, not all companies have applied them.

According to experts, the botnet is also capable of downloading other tools and malware to infected MSSQL servers. These include the Mimikatz tool, the Gh0st remote access trojan, and the Gates backdoor trojan. KingMiner operators use them to steal passwords from other systems to which the database server can be connected.

According to experts, one of the interesting features of the campaign was that KingMiner operators scanned the infected system for BlueKeep vulnerabilities in the remote desktop protocol. If the system turns out to be vulnerable, criminals turned off RDP access to the database in order to prevent other malware from breaking into the server.
 
Ad End 1 February 2024
Top