Honeypots focused on tracking the activity on database servers in Russia, Ukraine, Poland, the UK, China, and the US revealed that Microsoft SQL (MSSQL) composed 93 percent of all attack activity. SpiderLabs of Trustwave noted in a blog post that its study calls for security teams to treat database security seriously by using strong passwords, disabling default accounts, enabling multi-factor authentication (MFA), and more. In addition to keeping software up-to-date and conducting frequent security audits, the SpiderLabs researchers recommended that security teams keep a close watch on who is attempting to access the system and with what privileges. They added that the results regarding MSSQL prompted them to conduct another study on MSSQL, which will be published later this month. While the UK had the highest number of MSSQL attacks (21.84 percent), China was a close second (21.49 percent), followed by Ukraine (19.52 percent), Russia (17.54 percent), Poland (11.54 percent), and the US (8.04 percent). MSSQL instances were subjected to highly intense attacks. According to Shodan, there are more than 450,000 MSSQL instances accessible on the Internet, with more than 133,000 instances located in China. This article continues to discuss MSSQL making up 93 percent of all attack activity on honeypots tracking 10 databases.
SC Magazine reports "MSSQL Makes up 93% Of All Activity on Honeypots Tracking 10 Databases"