Statistics Report on Malware Targeting Windows Database Servers in Q1 2026

Statistics Report on Malware Targeting Windows Database Servers in Q1 2026

Description.


analysis of ASEC’s ASD logs for Q1 2026 showed a consistent trend of attacks against MS-SQL and MySQL. the number of attacks tended to decrease temporarily in February before increasing again in March.

Purpose and Scope.


this report summarizes the statistics of attacks targeting MS-SQL and MySQL servers installed on Windows and the malware used based on ASD logs for the first quarter of 2026.

Key statistics.


  • in Q1 2026, among the attacks targeting MS-SQL servers, we observed a case of Larva-26002 threat actor installing ICE Cloud scanner. The Larva-26002 threat actor has previously distributed the Trigona and Mimic ransomware, and has since seized control of infected systems and installed scanners. in the latest confirmed attack, the scanner malware ICE Cloud Client, written in Go language, is being used.
  • as in previous cases, the threat actors attacked a mismanaged MS-SQL server and exploited BCP to create malware. the final installation of the scanner malware is the same, except that it uses a scanner named ICE Cloud, which was recently written in Go language. The strings used in ICE Cloud are Turkish, which is also known to have been used by threat actors in the Mimic ransomware attack in the past.

Conclusion.


the main attack techniques are brute force and dictionary attacks and exploitation of unpatched and misconfigured accounts due to improper account management. recommendations include making account passwords difficult to guess and changing them regularly. database servers should be kept up to date with the latest patches and external public services should be access controlled with firewalls. reduce the attack surface by minimizing unnecessary extensions and remote command execution capabilities.

MD5

0a9f2e2ff98e9f19428da79680e80b77
28847cb6859b8239f59cbf2b8f194770
5200410ec674184707b731b697154522
7fbbf16256c7c89d952fee47b70ea759
89bf428b2d9214a66e2ea78623e8b5c9
URL

http[:]//109[.]205[.]211[.]13/api[.]exe
FQDN

hostroids[.]com