Threat IntelHIGH

Threat Intel - Continuous Attacks on MS-SQL Servers Unveiled

CSCyber Security News
Larva-26002ICE Cloud ClientMS-SQLMimic ransomwareTrigona
🎯

Basically, hackers are attacking poorly protected MS-SQL servers to install new malware.

Quick Summary

A persistent threat actor is targeting MS-SQL servers using new malware. This ongoing campaign risks extensive data exposure due to poor database security practices. Administrators must act now to secure their systems.

The Threat

The threat actor known as Larva-26002 has been relentlessly targeting Microsoft SQL (MS-SQL) servers since January 2024. This campaign has evolved from a ransomware operation to a more sophisticated strategy involving the deployment of a new scanner malware called ICE Cloud Client. The attacks, which are ongoing into 2026, utilize various tools and techniques to exploit poorly managed servers, indicating a long-term commitment to this malicious endeavor.

Initially, the group deployed Trigona and Mimic ransomware on exposed MS-SQL servers with weak credentials. They exploited the Bulk Copy Program (BCP) utility to install malware directly onto compromised hosts. Over time, they have upgraded their tools, including the introduction of a Rust-based scanner in 2025, and now the Go-based ICE Cloud Client in 2026. This progression shows the attackers' adaptability and determination to exploit vulnerabilities in database infrastructure.

Who's Behind It

Larva-26002 has demonstrated a clear pattern of targeting the same MS-SQL servers repeatedly. Their attacks are characterized by a shift from ransomware to scanning, which suggests they are building a network of compromised servers. The ICE Cloud Client malware collects data from these servers and sends it back to the attacker's command and control (C&C) server, allowing them to map out exposed database assets across the internet. This strategic approach raises concerns about the potential for larger, more damaging attacks in the future.

The use of Turkish binary strings within the malware hints at the attackers' origins or operational base, further linking them to previous incidents involving Mimic ransomware. This connection emphasizes the importance of recognizing patterns in cyber threats to better defend against them.

Tactics & Techniques

The attack mechanism begins when Larva-26002 identifies an MS-SQL server that is poorly secured. They gain access through brute force or dictionary attacks, then execute system commands to profile the host. Malware is created using the BCP utility, which exports malicious binaries from the database. In cases where BCP fails, they utilize tools like Curl or Bitsadmin via PowerShell to download the malware.

Once the ICE Cloud Launcher is executed, it connects to the C&C server to authenticate and download the core ICE Cloud Client. This client is disguised under random filenames to evade detection. It registers with the C&C server, receiving a list of MS-SQL addresses to target, along with credential pairs for login attempts. The entire process showcases the attackers' technical proficiency and their ability to adapt their strategies over time.

Defensive Measures

To mitigate the risks posed by Larva-26002, database administrators must take proactive measures. Here are some recommended actions:

  • Enforce strong passwords for all MS-SQL accounts and change them regularly.
  • Implement firewalls to restrict internet access to MS-SQL servers, allowing only authorized connections.
  • Regularly update endpoint security software to catch known malware before it executes.
  • Monitor for unusual BCP activity or unexpected files like api.exe in the system directories.

By following these guidelines, organizations can better protect themselves against the ongoing threats posed by Larva-26002 and similar actors. Vigilance and proactive security measures are essential in the ever-evolving landscape of cyber threats.

🔒 Pro insight: The shift from ransomware to scanning indicates a strategic pivot, suggesting Larva-26002 aims to build a robust infrastructure for future attacks.

Original article from

Cyber Security News · Tushar Subhra Dutta

Read Full Article

Related Pings

HIGHThreat Intel

Silver Fox Cyber Campaigns - Shift to Dual Espionage Tactics

Silver Fox's cyber campaigns are evolving, merging espionage with phishing tactics. Organizations in South Asia are at risk as the group targets them with sophisticated methods. This shift highlights the growing overlap between state-linked cyber activities and financial cybercrime.

Infosecurity Magazine·
HIGHThreat Intel

Threat Intel - Cybercrime Groups Enhance Access Handoff Tactics

Cybercrime groups are enhancing their tactics for stealing access to systems. A surge in voice phishing is alarming, making individuals and organizations more vulnerable. Staying informed and proactive is crucial to combat these threats.

Cybersecurity Dive·
HIGHThreat Intel

DDoS Attacks - Surge in Frequency and Volume Reported

DDoS attacks have doubled in the second half of 2025, reaching record highs. Technology, finance, and gaming sectors are the most affected. Understanding these trends is crucial for effective defense strategies.

CSO Online·
HIGHThreat Intel

Threat Intel - Russian Broker Sentenced for Ransomware Role

Aleksei Volkov was sentenced to 81 months for facilitating ransomware attacks, causing millions in losses. His case highlights a crackdown on cybercriminal enablers. Companies must enhance their defenses against such threats.

Help Net Security·
HIGHThreat Intel

Threat Intel - Rogue IP KVMs Exposed by Researchers

Researchers have uncovered vulnerabilities in IP KVMs, revealing their use by criminals, including North Korean operatives. This poses serious risks to security. Organizations must act to secure their systems.

SANS ISC·
HIGHThreat Intel

Cyber Warfare - Dmytro Kuleba Addresses New Frontline

Dmytro Kuleba will address the new cyber frontline at Infosecurity Europe. His insights on Ukraine's hybrid war are crucial for understanding modern cyber threats. This discussion highlights the urgent need for improved cybersecurity collaboration amid rising geopolitical tensions.

Infosecurity Magazine·