Construction Industry Under Siege: Brute Force Attacks Target Foundation Accounting Software

Cybercriminals are intensifying efforts to breach corporate networks of construction firms by targeting exposed Foundation accounting servers. This particular software, extensively used within the construction industry, has become a prime target for hackers due to weak security measures on privileged accounts.
Attack Overview
- Researchers from Huntress detected malicious activity on Foundation accounting software servers starting on September 14, 2024.
- Attackers are brute-forcing passwords on accounts with highly privileged access to exposed servers, specifically targeting plumbing, HVAC, concrete, and other construction sub-industries.
Open Ports and Weak Passwords
- The Microsoft SQL Server (MSSQL) used by Foundation is publicly exposed via TCP port 4243 to support a companion mobile app.
- Two default admin accounts, 'sa' and 'dba', are frequently targeted. Servers with default or weak passwords on these accounts are vulnerable to hijacking.
Aggressive Brute-Force Attacks
- Some servers experienced up to 35,000 brute force attempts per hour, overwhelming defenses and eventually cracking passwords.
- Once inside, attackers activate the xp_cmdshell feature, allowing them to run system commands like ‘ipconfig’ and ‘wmic’, collecting network and system data.
Widespread Impact
- Huntress monitored three million endpoints and identified 500 hosts running the vulnerable software, of which 33 publicly exposed MSSQL databases with default credentials.
- While the cloud-based version of Foundation remains secure, the on-premise variant has been the primary target of these attacks.
Defensive Measures
- Foundation Software has acknowledged the issue and recommended steps to mitigate the risks, advising users to rotate credentials and close unnecessary public ports.
- Huntress further recommends not exposing MSSQL servers unless necessary and to disable default accounts or enforce stronger password policies.
This attack serves as a stark reminder that strong password practices and secure configurations are critical in preventing breaches. Net Protector Cyber Security offers advanced solutions to safeguard organizations against such threats by hardening security and monitoring for brute force attempts across vulnerable systems.
Comment(s)
Categories
- Other (43)
- Ransomware (153)
- Events and News (27)
- Features (45)
- Security (484)
- Tips (79)
- Google (28)
- Achievements (11)
- Products (35)
- Activation (7)
- Dealers (1)
- Bank Phishing (50)
- Malware Alerts (230)
- Cyber Attack (295)
- Data Backup (13)
- Data Breach (125)
- Phishing (164)
- Securty Tips (2)
- Browser Hijack (19)
- Adware (15)
- Email And Password (70)
- Android Security (76)
- Knoweldgebase (38)
- Botnet (17)
- Updates (4)
- Alert (71)
- Hacking (70)
- Social Media (8)
- vulnerability (71)
- Hacker (38)
- Spyware (12)
- Windows (8)
- Microsoft (24)
- Uber (1)
- YouTube (1)
- Trojan (4)
- Website hacks (10)
- Paytm (1)
- Credit card scam (2)
- Telegram (3)
- RAT (8)
- Bug (3)
- Twitter (2)
- Facebook (8)
- Banking Trojan (9)
- Mozilla (2)
- COVID-19 (5)
- Instagram (3)
- NPAV Announcement (9)
- IoT Security (2)
- Deals and Offers (2)
- Cloud Security (12)
- Offers (5)
- Gaming (1)
- FireFox (2)
- LinkedIn (3)
- WhatsApp (5)
- Amazon (2)
- DMart (1)
- Payment Risk (5)
- Occasion (3)
- firewall (3)
- Cloud malware (2)
- Cloud storage (2)
- Financial fraud (37)
- Impersonation phishing (1)
- DDoS (7)
- Smishing (2)
- Whale (0)
- Whale phishing (4)
- WINRAR (2)
- ZIP (2)
- Fraud Protector (25)
Recent Posts
Archive
Tags
cybercrime
cyber attack
cybersecurity
phishing
phishing attacks
data breach
cyber threats
phishing attack
malware
android malware
ransomware
data theft
credential theft
cybersecurity threats
financial fraud
ransomeware
#cybersecurity
financial security
cyber security
cyber fraud
social engineering
network security
phishingattack
cyberthreats
data protection
security vulnerabilities
phishing scam
data stealing
identity theft
cert-in
cyber crime
online fraud
data security
ddos attack
digital safety
cyberattack
critical vulnerability
remote access trojan
cybersecurity awareness
india
phishing email
twitter
microsoft
cyber threat
cyber attacks
cybercriminals
ddos
trojan
malware attack
malware distribution