A recent report has shed light on the activities of a sophisticated threat group, STAC6451, which has been targeting Microsoft SQL servers. Identified primarily by Sophos Managed Detection and Response (MDR) teams, this cluster has been exploiting vulnerabilities in SQL servers to compromise organizations.
The attackers behind STAC6451 have utilized various techniques such as brute-force attacks, command execution, and lateral movement to infiltrate and compromise networks. By delving into these intricate details, it becomes evident that the implications of these attacks are far-reaching and pose a significant threat to organizations globally.
One of the primary ways in which STAC6451 gains initial access and exploits SQL servers is by targeting those exposed to the internet with weak or default credentials. This vulnerability allows the attackers to execute commands through the SQL service, enabling them to implant malicious payloads into the SQL database. By exploiting the default TCP/IP port (1433) of SQL servers, the attackers can easily infiltrate these systems using brute-force attacks, underscoring the importance of securing these servers with strong passwords and limiting exposure to the internet.
Once access is secured, the attackers move on to the discovery and staging phase, where they gather information about the system using automated commands. This level of automation demonstrates a high degree of sophistication in the attack. They also leverage the Bulk Copy Program (BCP) utility to stage additional payloads and tools, including AnyDesk for remote access, batch scripts, and PowerShell scripts.
Creating user accounts across victim environments is another key tactic employed by the attackers to facilitate lateral movement and maintain persistence. By adding these accounts to local administrator and remote desktop groups, the attackers gain elevated privileges, allowing them to carry out their malicious activities undetected. The simultaneous creation of these accounts across multiple networks points to a coordinated effort to compromise numerous victims.
The attackers also deploy tools like PrintSpoofer for privilege escalation and Cobalt Strike for command and control operations, enabling them to establish C2 connections and execute malicious payloads. Their ultimate goal is to deploy ransomware, utilizing the BCP utility to write ransomware launchers to disk and executing batch scripts through AnyDesk to encrypt victim files and demand ransom for decryption.
Specifically targeting organizations in India, STAC6451 has been observed deploying Mimic ransomware and engaging in data collection and likely exfiltration activities. This financially motivated operation poses a significant risk to organizations, highlighting the importance of implementing robust security measures to protect against such threats.
Recommendations for organizations include securing SQL servers, implementing monitoring and detection systems, and conducting regular security audits to identify and address potential vulnerabilities. By understanding the tactics, techniques, and procedures employed by threat actors like STAC6451, organizations can better protect themselves and mitigate the impact of such attacks.
As cyber threats continue to evolve, maintaining vigilance and staying informed is crucial in safeguarding digital assets and operational integrity. By taking proactive measures and adopting a holistic approach to cybersecurity, organizations can defend against sophisticated threats like STAC6451 and safeguard their valuable data and networks.

