Saturday, June 14, 2025
Advertisements

Threat Actors Use DB Client Tools to Steal Data from Compromised Systems

by Charline

Cybersecurity researchers have discovered that attackers are using trusted database client tools to steal sensitive data from compromised systems. This tactic helps them stay hidden during their attacks.

Tools like DBeaver, Navicat, and sqlcmd are commonly used by legitimate database administrators. Because of this, it’s hard for security teams to spot suspicious behavior.

Advertisements

To use these tools, attackers first gain access to database login details, including server addresses, ports, and passwords. This means the attackers have already gone through the early stages of an attack—such as gaining access, moving laterally, and collecting information—before using these clients.

Advertisements

How the Attack Works

Once inside a system, attackers install the database tools and start pulling sensitive data. Since these applications look normal, security tools often don’t raise any alarms.

Researchers from AhnLab Security Emergency Response Center (ASEC) found several real-world cases where attackers used Remote Desktop Protocol (RDP) to access systems. Then, they installed tools like DBeaver using a browser and exported data using default settings.

In other cases, attackers used trial versions of Navicat to avoid paying for licenses. These tools gave them the ability to run advanced queries, export entire tables, and extract data in formats like CSV, Excel, or JSON.

Detection Challenges

Because these tools are legitimate, antivirus software rarely flags them. Detecting misuse requires monitoring behavior patterns instead of just looking for known threats.

The forensic trail these tools leave behind is subtle but detectable by skilled analysts. Each application has unique logs that can help investigators understand what data was stolen and when.

Forensic Clues in DBeaver

DBeaver, an open-source tool, presents a unique case. Its detailed logs can help investigators—but can also assist attackers in understanding how their actions are recorded.

The log file is usually found at:

C:\Users\[Username]\AppData\Roaming\DBeaverData\workspace\.metadata\dbeaver-debug.log

This file includes a history of export activity. For example:

2025-05-15 14:37:08.989 - Export to the new file
'C:\Users\Administrator\Desktop\export\PRODUCTS_202505151437.csv'
2025-05-15 14:37:09.145 - Export to the new file
'C:\Users\Administrator\Desktop\export\USERS_202505151437.csv'

These log entries show exactly when data was exported and where the files were saved. The naming format often includes the table name and a timestamp, helping trace stolen content.

Additional Forensic Evidence

Even if the debug logs are missing, DBeaver keeps a record of connection history. Investigators can use this to track access to critical databases.

Another important file—.log—contains connection errors and SQL mistakes. These may reveal attackers testing commands or struggling with unknown database layouts.

This emerging method of data theft shows how attackers are adapting to security tools. Organizations must go beyond signature-based defenses and adopt behavior-based monitoring to detect unusual database activity—even when using trusted software.
Advertisements

You may also like

blank

At ProxyServerPro, we are dedicated to providing cutting-edge proxy solutions tailored to meet the diverse needs of businesses and individuals. Our platform offers a comprehensive range of high-performance proxies, including residential, datacenter, and mobile options, ensuring seamless browsing, data scraping, and online anonymity. With a focus on reliability, speed, and security, we empower users to navigate the digital landscape with confidence. Whether you’re managing ad verification, market research, or web automation, ProxyServerPro is your trusted partner for scalable, efficient, and secure proxy services. Explore our portal to discover how we can elevate your online experience.

© 2024 Copyright  proxyserverpro.com