SQL stands for structured query language; it’s a programming language used to communicate with databases. Many of the servers that store critical data for websites and services use SQL to manage the data in their databases. A SQL injection attack specifically targets this kind of server, using malicious code to get the server to divulge information it normally wouldn’t. This is especially problematic if the server stores private customer information from the website, such as credit card numbers, usernames and passwords (credentials), or other personally identifiable information, which are tempting and lucrative targets for an attacker.

Malware/Threat actors

Name Type Years Source
Operation Cleaver threat actor 2012-2013 Cylance_Operation_Cleaver_Report.pdf

stamp.jsp?tp=&arnumber=7460498&tag=1

HURRICANE PANDA threat actor 2014 GlobalThreatIntelReport.pdf

ICIT-Brief-China-Espionage-Dynasty.pdf

Threat%20Group%20Cards.pdf

GlobalThreatIntelReport.pdf

Wild Neutro
Hidden Lynx threat actor 2009-2013 hidden_lynx.pdf

Axiom threat actor 2009-2014 ICIT-Brief-Know-Your-Enemies-2.0.pdf

Group_72.pdf

XSLCmd malware 2009-2012 XSLCmd_OSX.pdf

Rocket Kitten threat actor 2014-2015 rocket-kitten-report.pdf

Preventions

  • Prepared statements
  • Use of Prepared Statements (with Parameterized Queries)
  • Use of Stored Procedures
  • White List Input Validation
  • Escaping All User Supplied Input

Detections

  • HTTP POST requests may include common SQL injections like:1' or '1' = '1, 1' or '1' = '1

Toolkit

<Toolkit instructions, if applicable>

Similar techniques

References