Posted in

Threat Actors Continuously Attacking MS-SQL Servers to Deploy ICE Cloud Scanner

A persistent threat actor known as Larva-26002 is actively targeting poorly secured Microsoft SQL servers to deploy a new scanner malware called ICE Cloud Client. The campaign represents a strategic shift from ransomware deployment to large-scale reconnaissance of vulnerable database infrastructure. ⚠️

Security analysts observed that the attackers repeatedly compromise the same exposed systems, indicating a long-term strategy focused on building a network of scanning nodes.


Evolution of the Campaign

The activity dates back to early 2024, when the group deployed ransomware on exposed database servers. Initial operations included:

  • Trigona ransomware
  • Mimic ransomware
  • Remote access tools
  • RDP port forwarding

Over time, the attackers transitioned from encryption attacks to infrastructure scanning.


Shift to Scanner Malware

In 2026, researchers observed the deployment of ICE Cloud, a scanner written in the Go programming language.

This replaces:

  • Rust-based scanner used in 2025
  • Earlier ransomware payloads

The new malware focuses on identifying additional vulnerable MS-SQL servers.


Long-Term Targeting Strategy

The group repeatedly attacks:

  • Internet-exposed SQL servers
  • Weak credential configurations
  • Unpatched database systems

Compromised systems are then used to scan other databases, creating a growing reconnaissance network.


Infection Mechanism

The attack begins when exposed MS-SQL servers are identified.

The attacker:

  1. Performs brute-force login attempts
  2. Runs system profiling commands
  3. Deploys malware using SQL utilities

Common reconnaissance commands include:

  • hostname
  • whoami
  • netstat -an

These help attackers understand system privileges and network connectivity.


Abuse of BCP Utility

Attackers exploit the legitimate Bulk Copy Program utility to drop malware.

The process:

  • Malware stored in database table
  • Exported using BCP command
  • Saved locally as api.exe
  • Executed on host

This technique helps bypass some security controls.


Alternative Delivery Methods

If BCP fails, attackers use:

  • PowerShell
  • Curl
  • Bitsadmin

These tools download the payload directly from remote infrastructure.


ICE Cloud Malware Execution

The infection chain includes two stages:

  • ICE Cloud Launcher
  • ICE Cloud Client

The launcher:

  • Connects to command server
  • Downloads scanner component
  • Executes client under random filename

This helps evade detection.


Scanner Functionality

Once active, ICE Cloud:

  • Registers with command server
  • Receives target SQL server list
  • Attempts credential login
  • Reports successful access

Example credentials used include default combinations like:

  • ecomm / ecomm

This indicates automated brute-force scanning.


Indicators of Attribution

Researchers observed:

  • Turkish-language strings
  • Emoji characters in binary
  • Similar infrastructure to earlier campaigns

These clues link the activity to previous Mimic ransomware operations.


Why This Campaign Is Dangerous

The shift to scanning suggests attackers are:

  • Mapping vulnerable databases
  • Building access inventory
  • Preparing future attacks
  • Expanding botnet-like infrastructure

This reconnaissance phase could precede ransomware or data theft campaigns.


Indicators of Compromise

Security teams should watch for:

  • Unexpected BCP activity
  • api.exe in ProgramData directory
  • Suspicious outbound connections
  • Unusual SQL authentication attempts
  • Random executable filenames

Mitigation Recommendations

Database administrators should:

  • Use strong SQL credentials
  • Restrict internet exposure
  • Implement firewall rules
  • Monitor SQL login attempts
  • Update endpoint protection

Additional Defensive Steps

Organizations should:

  • Disable unnecessary SQL features
  • Monitor PowerShell execution
  • Audit database access logs
  • Block unknown outbound traffic
  • Apply regular patching

Key Takeaways

  • Larva-26002 targeting exposed MS-SQL servers
  • ICE Cloud scanner deployed
  • Shift from ransomware to reconnaissance
  • BCP utility abused for malware delivery
  • Immediate database hardening required

Conclusion

The Larva-26002 campaign highlights a growing trend where attackers pivot from ransomware to stealthy reconnaissance. By compromising poorly secured MS-SQL servers and deploying ICE Cloud scanners, threat actors are building a foundation for future attacks. Organizations must secure database infrastructure and monitor for unusual SQL activity to reduce exposure. 

Leave a Reply

Your email address will not be published. Required fields are marked *