Cyber Threat Intelligence

Discover malicious IPs and domains with Akamai Guardicore Segmentation

IP Address: 45.123.221.210Previously Malicious

IP Address: 45.123.221.210Previously Malicious

This IP address attempted an attack on a machine in our threat sensors network

Threat Information

Role

Attacker, Scanner

Services Targeted

MSSQL

Tags

Execute MsSql Shell Command MSSQL Brute Force MSSQL Access Suspicious Domain Outgoing Connection IDS - Attempted User Privilege Gain Successful MSSQL Login Bulk Files Tampering PowerShell CMD

Associated Attack Servers

pignet.net.br

177.137.96.14

Basic Information

IP Address

45.123.221.210

Domain

-

ISP

Classic Tech Pvt.

Country

Nepal

WHOIS

Created Date

-

Updated Date

-

Organization

-

First seen in Akamai Guardicore Segmentation

2021-05-18

Last seen in Akamai Guardicore Segmentation

2021-05-18

What is Akamai Guardicore Segmentation
Akamai Guardicore Segmentation is a data center and cloud security solution that protects the organization's core assets, using flexible, quickly deployed and easy to understand micro-segmentation controls. Akamai Guardicore Segmentation generates in-context security incidents, with details on attacker tools and techniques, that help IR teams prioritize incident investigation and reduce dwell time. Learn More

Attack Flow

A user logged in using MSSQL with the following credentials: admin / ***** - Authentication policy: White List (Part of a Brute Force Attempt)

MSSQL Brute Force Successful MSSQL Login

A user logged in using MSSQL with the following credentials: admin / ***** - Authentication policy: Previously Approved User (Part of a Brute Force Attempt) 3 times

MSSQL Brute Force Successful MSSQL Login

IDS detected Attempted User Privilege Gain : SQL sp_configure - configuration change

IDS - Attempted User Privilege Gain

IDS detected Attempted User Privilege Gain : xp_cmdshell - program execution

IDS - Attempted User Privilege Gain

IDS detected Attempted User Privilege Gain : xp_reg* - registry access

IDS - Attempted User Privilege Gain

IDS detected Attempted User Privilege Gain : sp_start_job - program execution

IDS - Attempted User Privilege Gain

PowerShell session started by c:\windows\system32\windowspowershell\v1.0\powershell.exe 3 times

Process c:\windows\system32\windowspowershell\v1.0\powershell.exe generated outgoing network traffic to: 177.137.96.14:12264 3 times

Outgoing Connection

Process c:\windows\system32\windowspowershell\v1.0\powershell.exe attempted to access suspicious domains: pignet.net.br 3 times

Access Suspicious Domain Outgoing Connection

MSSQL executed 1 shell commands

Execute MsSql Shell Command

Connection was closed due to user inactivity

Process c:\windows\system32\windowspowershell\v1.0\powershell.exe performed bulk changes in {c:\users\administrator\appdata\local\microsoft\windows\powershell\commandanalysis} on 55 files

Bulk Files Tampering