Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
MS-SQL Servers Under Persistent Threat by ICE Cloud Scanner

MS-SQL Servers Under Persistent Threat by ICE Cloud Scanner

Posted on March 24, 2026 By CWS

A sophisticated cyber threat actor, identified as Larva-26002, is relentlessly targeting inadequately secured Microsoft SQL (MS-SQL) servers. This time, they are deploying a novel malware known as ICE Cloud Client.

Ongoing Campaign and Evolution

Since January 2024, this campaign has persisted, evolving continually with each phase. Initially focused on ransomware attacks, the group has shifted towards extensive scanning of vulnerable database systems. The campaign has been active and adapting through 2026, consistently upgrading its tools.

In early 2024, Larva-26002 made its initial impact by deploying ransomware like Trigona and Mimic on MS-SQL servers with weak passwords. The attackers used the Bulk Copy Program (BCP), a legitimate MS-SQL feature, to transfer malware onto compromised systems.

Transition to Advanced Scanning Techniques

Alongside BCP, tools such as AnyDesk were installed to facilitate remote access, and port forwarding for RDP was enabled. By 2025, the group had incorporated Teramind, a remote monitoring tool, and transitioned to a Rust-based scanner.

In 2026, analysts identified a renewed attack wave where the same threat actor targeted previously compromised MS-SQL servers. This time, they employed ICE Cloud, a scanner malware written in Go, marking a shift from their 2025 Rust-based approach. The malware’s binary strings, written in Turkish, establish a connection to the 2024 Mimic ransomware attacks.

Implications and Prevention Measures

The campaign’s shift from ransomware to scanning poses significant concerns. By amassing compromised servers to probe for weak credentials, the attackers are potentially laying the groundwork for a larger operation. Data collected is sent to the attacker’s command and control (C&C) server, providing insight into exposed database assets globally.

The incursion begins when Larva-26002 identifies an exposed MS-SQL server with poor password protocols. After initial access through brute force or dictionary attacks, they execute system commands to assess the host and create malware using the BCP utility. This involves exporting a malicious binary to a local path, a tactic unchanged since 2024.

Defensive Strategies for Administrators

Database administrators need to ensure robust, complex passwords for all MS-SQL accounts, with regular updates to prevent unauthorized access. Servers exposed to the internet should be secured behind firewalls with restricted access. Maintaining updated endpoint security software is crucial to intercept known malware before it executes.

Monitoring for unusual BCP activity, unexpected files like api.exe in C:ProgramData, and unrecognized outbound connections can indicate potential compromises requiring immediate investigation.

Stay connected with us on Google News, LinkedIn, and X for the latest updates. Set CSN as a preferred source in Google for more insights.

Cyber Security News Tags:C&C server, cyber threats, Cybersecurity, database security, Go programming, Hacking, ICE Cloud Scanner, IT security, Larva-26002, Malware, MS-SQL, Ransomware, remote access, Rust programming, server security

Post navigation

Previous Post: TeamPCP’s Kubernetes Wiper Escalates Threat in Iran

Related Posts

Critical BeyondTrust Flaw Exploited by Hackers Critical BeyondTrust Flaw Exploited by Hackers Cyber Security News
Europol‑Backed Operation Leads to 34 Arrests in Black Axe Crime Network Bust Europol‑Backed Operation Leads to 34 Arrests in Black Axe Crime Network Bust Cyber Security News
New Smartwatch Wi-Fi Injection, Android Radio and Hacking Tools New Smartwatch Wi-Fi Injection, Android Radio and Hacking Tools Cyber Security News
Google Finalizes Historic  Billion Wiz Acquisition Google Finalizes Historic $32 Billion Wiz Acquisition Cyber Security News
10 Best Cloud Penetration Testing Companies in 2025 10 Best Cloud Penetration Testing Companies in 2025 Cyber Security News
Coruna Exploit Kit Threatens Thousands of iPhones Coruna Exploit Kit Threatens Thousands of iPhones Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • MS-SQL Servers Under Persistent Threat by ICE Cloud Scanner
  • TeamPCP’s Kubernetes Wiper Escalates Threat in Iran
  • Resilient Tycoon2FA Phishing Platform Bounces Back Rapidly
  • Poland Sees Spike in Cyberattacks Targeting Energy Sector
  • Critical Dell Wyse Security Flaws Threaten Systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • MS-SQL Servers Under Persistent Threat by ICE Cloud Scanner
  • TeamPCP’s Kubernetes Wiper Escalates Threat in Iran
  • Resilient Tycoon2FA Phishing Platform Bounces Back Rapidly
  • Poland Sees Spike in Cyberattacks Targeting Energy Sector
  • Critical Dell Wyse Security Flaws Threaten Systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark