Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
MS-SQL Servers Under Persistent Threat by ICE Cloud Scanner

MS-SQL Servers Under Persistent Threat by ICE Cloud Scanner

Posted on March 24, 2026 By CWS

A sophisticated cyber threat actor, identified as Larva-26002, is relentlessly targeting inadequately secured Microsoft SQL (MS-SQL) servers. This time, they are deploying a novel malware known as ICE Cloud Client.

Ongoing Campaign and Evolution

Since January 2024, this campaign has persisted, evolving continually with each phase. Initially focused on ransomware attacks, the group has shifted towards extensive scanning of vulnerable database systems. The campaign has been active and adapting through 2026, consistently upgrading its tools.

In early 2024, Larva-26002 made its initial impact by deploying ransomware like Trigona and Mimic on MS-SQL servers with weak passwords. The attackers used the Bulk Copy Program (BCP), a legitimate MS-SQL feature, to transfer malware onto compromised systems.

Transition to Advanced Scanning Techniques

Alongside BCP, tools such as AnyDesk were installed to facilitate remote access, and port forwarding for RDP was enabled. By 2025, the group had incorporated Teramind, a remote monitoring tool, and transitioned to a Rust-based scanner.

In 2026, analysts identified a renewed attack wave where the same threat actor targeted previously compromised MS-SQL servers. This time, they employed ICE Cloud, a scanner malware written in Go, marking a shift from their 2025 Rust-based approach. The malware’s binary strings, written in Turkish, establish a connection to the 2024 Mimic ransomware attacks.

Implications and Prevention Measures

The campaign’s shift from ransomware to scanning poses significant concerns. By amassing compromised servers to probe for weak credentials, the attackers are potentially laying the groundwork for a larger operation. Data collected is sent to the attacker’s command and control (C&C) server, providing insight into exposed database assets globally.

The incursion begins when Larva-26002 identifies an exposed MS-SQL server with poor password protocols. After initial access through brute force or dictionary attacks, they execute system commands to assess the host and create malware using the BCP utility. This involves exporting a malicious binary to a local path, a tactic unchanged since 2024.

Defensive Strategies for Administrators

Database administrators need to ensure robust, complex passwords for all MS-SQL accounts, with regular updates to prevent unauthorized access. Servers exposed to the internet should be secured behind firewalls with restricted access. Maintaining updated endpoint security software is crucial to intercept known malware before it executes.

Monitoring for unusual BCP activity, unexpected files like api.exe in C:ProgramData, and unrecognized outbound connections can indicate potential compromises requiring immediate investigation.

Stay connected with us on Google News, LinkedIn, and X for the latest updates. Set CSN as a preferred source in Google for more insights.

Cyber Security News Tags:C&C server, cyber threats, Cybersecurity, database security, Go programming, Hacking, ICE Cloud Scanner, IT security, Larva-26002, Malware, MS-SQL, Ransomware, remote access, Rust programming, server security

Post navigation

Previous Post: TeamPCP’s Kubernetes Wiper Escalates Threat in Iran
Next Post: Kali Linux 2026.1 Launches with New Pentesting Tools

Related Posts

Massive Supply Chain Attack Hijacks ctrl/tinycolor With 2 Million Downloads Massive Supply Chain Attack Hijacks ctrl/tinycolor With 2 Million Downloads Cyber Security News
Authorities Dismanteled Major Credit Card Fraud Operation Impacting 4.3 Million Cardholders Authorities Dismanteled Major Credit Card Fraud Operation Impacting 4.3 Million Cardholders Cyber Security News
Notepad++ DLL Hijacking Vulnerability Let Attackers Execute Malicious Code Notepad++ DLL Hijacking Vulnerability Let Attackers Execute Malicious Code Cyber Security News
Microsoft Warns of Active Directory Domain Services Vulnerability, Let Attackers Escalate Privileges Microsoft Warns of Active Directory Domain Services Vulnerability, Let Attackers Escalate Privileges Cyber Security News
How Businesses Stop Complex Social Engineering Attacks Early How Businesses Stop Complex Social Engineering Attacks Early Cyber Security News
Role of Threat Intelligence in Proactive Defense Strategies Role of Threat Intelligence in Proactive Defense Strategies Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Urgent: cPanel and WHM Security Updates Released
  • TCLBANKER Trojan Expands Through WhatsApp and Outlook
  • Critical Microsoft 365 Copilot Flaws Resolved by Microsoft
  • NVIDIA Data Breach Exposes GeForce Users’ Personal Info
  • Let’s Encrypt Temporarily Stops Certificate Issuance After Issue

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Urgent: cPanel and WHM Security Updates Released
  • TCLBANKER Trojan Expands Through WhatsApp and Outlook
  • Critical Microsoft 365 Copilot Flaws Resolved by Microsoft
  • NVIDIA Data Breach Exposes GeForce Users’ Personal Info
  • Let’s Encrypt Temporarily Stops Certificate Issuance After Issue

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark