{"id":25429,"date":"2022-10-07T00:58:07","date_gmt":"2022-10-07T00:58:07","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=25429"},"modified":"2022-10-07T00:58:10","modified_gmt":"2022-10-07T00:58:10","slug":"mssql-backdoor-maggie","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/threats\/mssql-backdoor-maggie\/","title":{"rendered":"New MSSQL Backdoor &#8216;Maggie&#8217; Infects Hundreds of Servers Worldwide"},"content":{"rendered":"\n<p>DCSO CyTec researchers Johann Aydinbas and Axel Wauer are warning of new backdoor <a href=\"https:\/\/www.esecurityplanet.com\/threats\/malware-types\/\" target=\"_blank\" rel=\"noreferrer noopener\">malware<\/a> they\u2019re calling &#8220;Maggie,&#8221; which targets Microsoft SQL servers. Maggie, the researchers say, has already affected at least 285 servers in 42 countries, with a particular focus on South Korea, India, Vietnam, China, and Taiwan.<\/p>\n\n\n\n<p>The malware offers a wide range of functionality, including the ability to change file permissions, run commands, and act as a network bridge into the infected server. \u201cIn addition, the backdoor has capabilities to bruteforce logins to other MSSQL servers while adding a special hardcoded backdoor user in the case of successfully bruteforcing admin logins,\u201d the researchers wrote in a <a href=\"https:\/\/medium.com\/@DCSO_CyTec\/mssql-meet-maggie-898773df3b01\" target=\"_blank\" rel=\"noreferrer noopener\">blog post<\/a> earlier this week.<\/p>\n\n\n\n<p>The DLL file, which offers a single export called <em>maggie <\/em>(hence DCSO\u2019s name for the malware), is an Extended Stored Procedure (ESP) designed to fetch user-supplied arguments and return unstructured data. \u201c<em>Maggie<\/em> utilizes this message-passing interface to implement a fully functional backdoor controlled only using SQL queries,\u201d the researchers wrote.<\/p>\n\n\n\n<p>While it\u2019s unclear how an attack with the malware is performed in the real world, Aydinbas and Wauer said the attacker has to have valid credentials to load it into the server.<\/p>\n\n\n\n<p>See the <a href=\"https:\/\/www.esecurityplanet.com\/products\/database-security-tools\/\" target=\"_blank\" rel=\"noreferrer noopener\">Top Database Security Solutions<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>TCP Redirection<\/strong><\/h2>\n\n\n\n<p>Maggie\u2019s functionality includes simple TCP redirection. \u201cWhen enabled,&nbsp;<em>Maggie<\/em>&nbsp;redirects any incoming connection (on any port the MSSQL server is listening on) to a previously set IP and port, if the source IP address matches a user-specified IP mask,\u201d the researchers wrote. \u201cThe implementation enables port reuse, making the redirection transparent to authorized users, while any other connecting IP is able to use the server without any interference or knowledge of&nbsp;<em>Maggie<\/em>.\u201d<\/p>\n\n\n\n<p>Aydinbas and Wauer also noted that <em>Maggie<\/em>\u2019s command list includes four that suggest exploit usage: <em>Exploit AddUser, Exploit Run, Exploit Clone, <\/em>and <em>Exploit TS<\/em>. \u201cIt appears that the actual implementation of all four exploit commands depends on a DLL not included with <em>Maggie <\/em>directly,\u201d they wrote. \u201cInstead, the caller provides a DLL name as well as an additional parameter when calling each function. We therefore assume the caller manually uploads the exploit DLL prior to issuing any exploit commands.\u201d<\/p>\n\n\n\n<p>Still, the researchers weren\u2019t able to uncover any potential exploit DLLs that <em>Maggie <\/em>might be referencing in order to do so.<\/p>\n\n\n\n<p>Also read: <a href=\"https:\/\/www.esecurityplanet.com\/networks\/database-security-best-practices\/\" target=\"_blank\" rel=\"noreferrer noopener\">7 Database Security Best Practices<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Top China-Exploited Vulnerabilities Revealed<\/strong><\/h2>\n\n\n\n<p>It&#8217;s been quite a week for Microsoft vulnerabilities. In addition to Maggie and <a href=\"https:\/\/www.esecurityplanet.com\/threats\/microsofts-fix-fails-to-patch-proxynotshell-rce-flaws\/\" target=\"_blank\" rel=\"noreferrer noopener\">ProxyNotShell<\/a>, four Microsoft vulnerabilities &#8211; including well-known ones like ProxyLogon &#8211; made a <a href=\"https:\/\/www.cisa.gov\/uscert\/ncas\/alerts\/aa22-279a\" target=\"_blank\" rel=\"noreferrer noopener\">list<\/a> of the 19 vulnerabilities most exploited by China state-sponsored hackers. The U.S. cybersecurity agencies list includes other well-known vulnerabilities like <a href=\"https:\/\/www.esecurityplanet.com\/threats\/log4j-vulnerability-ai-big-data-threat\/\" target=\"_blank\" rel=\"noreferrer noopener\">Log4j<\/a>. ProxyLogon also figured prominently in a 2021 defense organization hack <a href=\"https:\/\/www.cisa.gov\/uscert\/ncas\/alerts\/aa22-277a\" target=\"_blank\" rel=\"noreferrer noopener\">revealed<\/a> this week.<\/p>\n\n\n\n<p>For organizations struggling with patch management, lists like these and CISA&#8217;s <a href=\"https:\/\/www.cisa.gov\/known-exploited-vulnerabilities-catalog\" target=\"_blank\" rel=\"noreferrer noopener\">Known Exploited Vulnerabilities<\/a> are very good places to focus patching efforts.<\/p>\n\n\n\n<p>Read next: <a href=\"https:\/\/www.esecurityplanet.com\/products\/patch-management-software\/\">The Best Patch Management Software &amp; Tools for 2022<\/a><\/p>\n\n\n<div id=\"ta-campaign-widget-66d701632b719-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d701632b719\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d701632b719\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d701632b719\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d701632b719\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d701632b719\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d701632b719\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>DCSO CyTec researchers Johann Aydinbas and Axel Wauer are warning of new backdoor malware they\u2019re calling &#8220;Maggie,&#8221; which targets Microsoft SQL servers. Maggie, the researchers say, has already affected at least 285 servers in 42 countries, with a particular focus on South Korea, India, Vietnam, China, and Taiwan. The malware offers a wide range of [&hellip;]<\/p>\n","protected":false},"author":166,"featured_media":25431,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[15],"tags":[2369,3790,12817,532,3414,730,5277],"b2b_audience":[33,35],"b2b_industry":[],"b2b_product":[382,429,31780,379],"class_list":["post-25429","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-threats","tag-cloud-security","tag-cybersecurity","tag-database-security","tag-microsoft","tag-network-security","tag-security","tag-web-security","b2b_audience-awareness-and-consideration","b2b_audience-implementation-and-support","b2b_product-application-security-vulnerability-management","b2b_product-database-security","b2b_product-patch-management","b2b_product-threats-and-vulnerabilities"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>New MSSQL Backdoor &#039;Maggie&#039; Infects Hundreds of Servers Worldwide | eSecurity Planet<\/title>\n<meta name=\"description\" content=\"In an active week for Microsoft vulnerabilities, the latest hits SQL Server - and U.S. agencies disclosed attacks by China too.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/threats\/mssql-backdoor-maggie\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"New MSSQL Backdoor &#039;Maggie&#039; Infects Hundreds of Servers Worldwide | eSecurity Planet\" \/>\n<meta property=\"og:description\" content=\"In an active week for Microsoft vulnerabilities, the latest hits SQL Server - and U.S. agencies disclosed attacks by China too.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/threats\/mssql-backdoor-maggie\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-07T00:58:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-10-07T00:58:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/maggie-sql-server.png\" \/>\n\t<meta property=\"og:image:width\" content=\"772\" \/>\n\t<meta property=\"og:image:height\" content=\"272\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Jeff Goldman\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jeff Goldman\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/mssql-backdoor-maggie\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/mssql-backdoor-maggie\/\"},\"author\":{\"name\":\"Jeff Goldman\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/814377f0182cc43200a4581fba4ec795\"},\"headline\":\"New MSSQL Backdoor &#8216;Maggie&#8217; Infects Hundreds of Servers Worldwide\",\"datePublished\":\"2022-10-07T00:58:07+00:00\",\"dateModified\":\"2022-10-07T00:58:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/mssql-backdoor-maggie\/\"},\"wordCount\":496,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/mssql-backdoor-maggie\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/maggie-sql-server.png\",\"keywords\":[\"cloud security\",\"cybersecurity\",\"database security\",\"Microsoft\",\"network security\",\"security\",\"Web security\"],\"articleSection\":[\"Threats\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/mssql-backdoor-maggie\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/threats\/mssql-backdoor-maggie\/\",\"name\":\"New MSSQL Backdoor 'Maggie' Infects Hundreds of Servers Worldwide | eSecurity Planet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/mssql-backdoor-maggie\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/mssql-backdoor-maggie\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/maggie-sql-server.png\",\"datePublished\":\"2022-10-07T00:58:07+00:00\",\"dateModified\":\"2022-10-07T00:58:10+00:00\",\"description\":\"In an active week for Microsoft vulnerabilities, the latest hits SQL Server - and U.S. agencies disclosed attacks by China too.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/mssql-backdoor-maggie\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/threats\/mssql-backdoor-maggie\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/mssql-backdoor-maggie\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/maggie-sql-server.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/maggie-sql-server.png\",\"width\":772,\"height\":272,\"caption\":\"maggie sql server vulnerability\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/mssql-backdoor-maggie\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"New MSSQL Backdoor &#8216;Maggie&#8217; Infects Hundreds of Servers Worldwide\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/814377f0182cc43200a4581fba4ec795\",\"name\":\"Jeff Goldman\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/jeff-goldman-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/jeff-goldman-150x150.jpg\",\"caption\":\"Jeff Goldman\"},\"description\":\"eSecurity Planet contributor Jeff Goldman has been a technology journalist for more than 20 years and an eSecurity Planet contributor since 2009. He's also written extensively about wireless and broadband infrastructure and semiconductor engineering. He started his career at MTV, but soon decided that technology writing was a more promising path.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/jeff-goldman\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"New MSSQL Backdoor 'Maggie' Infects Hundreds of Servers Worldwide | eSecurity Planet","description":"In an active week for Microsoft vulnerabilities, the latest hits SQL Server - and U.S. agencies disclosed attacks by China too.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/threats\/mssql-backdoor-maggie\/","og_locale":"en_US","og_type":"article","og_title":"New MSSQL Backdoor 'Maggie' Infects Hundreds of Servers Worldwide | eSecurity Planet","og_description":"In an active week for Microsoft vulnerabilities, the latest hits SQL Server - and U.S. agencies disclosed attacks by China too.","og_url":"https:\/\/www.esecurityplanet.com\/threats\/mssql-backdoor-maggie\/","og_site_name":"eSecurity Planet","article_published_time":"2022-10-07T00:58:07+00:00","article_modified_time":"2022-10-07T00:58:10+00:00","og_image":[{"width":772,"height":272,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/maggie-sql-server.png","type":"image\/png"}],"author":"Jeff Goldman","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Jeff Goldman","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/threats\/mssql-backdoor-maggie\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/mssql-backdoor-maggie\/"},"author":{"name":"Jeff Goldman","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/814377f0182cc43200a4581fba4ec795"},"headline":"New MSSQL Backdoor &#8216;Maggie&#8217; Infects Hundreds of Servers Worldwide","datePublished":"2022-10-07T00:58:07+00:00","dateModified":"2022-10-07T00:58:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/mssql-backdoor-maggie\/"},"wordCount":496,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/mssql-backdoor-maggie\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/maggie-sql-server.png","keywords":["cloud security","cybersecurity","database security","Microsoft","network security","security","Web security"],"articleSection":["Threats"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/threats\/mssql-backdoor-maggie\/","url":"https:\/\/www.esecurityplanet.com\/threats\/mssql-backdoor-maggie\/","name":"New MSSQL Backdoor 'Maggie' Infects Hundreds of Servers Worldwide | eSecurity Planet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/mssql-backdoor-maggie\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/mssql-backdoor-maggie\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/maggie-sql-server.png","datePublished":"2022-10-07T00:58:07+00:00","dateModified":"2022-10-07T00:58:10+00:00","description":"In an active week for Microsoft vulnerabilities, the latest hits SQL Server - and U.S. agencies disclosed attacks by China too.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/mssql-backdoor-maggie\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/threats\/mssql-backdoor-maggie\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/threats\/mssql-backdoor-maggie\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/maggie-sql-server.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/maggie-sql-server.png","width":772,"height":272,"caption":"maggie sql server vulnerability"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/threats\/mssql-backdoor-maggie\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"New MSSQL Backdoor &#8216;Maggie&#8217; Infects Hundreds of Servers Worldwide"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/814377f0182cc43200a4581fba4ec795","name":"Jeff Goldman","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/jeff-goldman-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/jeff-goldman-150x150.jpg","caption":"Jeff Goldman"},"description":"eSecurity Planet contributor Jeff Goldman has been a technology journalist for more than 20 years and an eSecurity Planet contributor since 2009. He's also written extensively about wireless and broadband infrastructure and semiconductor engineering. He started his career at MTV, but soon decided that technology writing was a more promising path.","url":"https:\/\/www.esecurityplanet.com\/author\/jeff-goldman\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/25429"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/166"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=25429"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/25429\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/25431"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=25429"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=25429"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=25429"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=25429"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=25429"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=25429"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}