Financially Motivated Turkish Threat Actors Target Microsoft SQL Server Databases with RE#TURGENCE Campaign

Financially motivated threat actors have been discovered engaging in a targeted attack campaign, dubbed RE#TURGENCE, aimed at compromising Microsoft SQL Server databases. This sophisticated campaign has primarily focused on organizations in the United States, Europe, and Latin America, with the end goal being the deployment of ransomware or the sale of compromised access to other threat actors.

Initial Access

To gain initial access, the threat actors employed brute-force tactics to bypass administrative credentials for the Microsoft SQL Server. Once successful, they moved on to credential harvesting and enabled a function that allowed them to execute shell commands on the host.

Cobalt Strike Payload

The attackers then executed PowerShell scripts, leading to the deployment of a heavily obfuscated Cobalt Strike payload. This payload was carefully designed to be injected into a Windows process, granting the threat actors enhanced control and stealth capabilities.

Deployment of AnyDesk

As part of their strategy, the threat actors utilized Cobalt Strike to install the legitimate remote desktop software, AnyDesk, onto compromised systems. This shift allowed them to conduct future interactions exclusively through AnyDesk, potentially evading detection.

Follow-up Activities

Following the initial compromise, the attackers employed various tools and techniques to further infiltrate the targeted environment. These included deploying Mimikatz for credential harvesting, leveraging Advanced Port Scanner for environment discovery, and utilizing the Sysinternals utility psexec for lateral movement to a domain controller.

Deployment of Mimic Ransomware

After several attempts at lateral movement, the threat actors proceeded to deploy the Mimic ransomware. This was accomplished through the execution of a self-extracting archive on the MSSQL server, domain controller, and other domain-joined hosts. The ransomware aimed to encrypt critical data, holding it hostage until a ransom was paid.

Monitoring the Attack

During the investigation of this attack, security experts were able to gain insights into the actions of the threat actors. Notably, the attackers enabled the clipboard sharing feature of AnyDesk, inadvertently allowing the cybersecurity firm Securonix to monitor the contents pasted there.

Identification of Turkish Involvement

By analyzing the pasted content, which was in Turkish, and investigating the handle “atseverse,” Securonix determined that at least one of the attackers appears to be located in Turkey. This attribution sheds light on the origin and potential motivations of the threat actors behind the RE#TURGENCE campaign.

The resurgence campaign orchestrated by financially motivated threat actors targeting Microsoft SQL Server databases has highlighted the increasing sophistication and persistence of cybercriminals. Organizations must remain vigilant in securing their SQL Server environments, employing strong access controls, regularly updating software and patches, and implementing robust monitoring solutions. Collaborative efforts between cybersecurity firms and law enforcement agencies are essential to better understanding these evolving threats and mitigating future attacks on critical infrastructure.

Explore more

How Will the 2026 Social Security Tax Cap Affect Your Paycheck?

In a world where every dollar counts, a seemingly small tweak to payroll taxes can send ripples through household budgets, impacting financial stability in unexpected ways. Picture a high-earning professional, diligently climbing the career ladder, only to find an unexpected cut in their take-home pay next year due to a policy shift. As 2026 approaches, the Social Security payroll tax

Why Your Phone’s 5G Symbol May Not Mean True 5G Speeds

Imagine glancing at your smartphone and seeing that coveted 5G symbol glowing at the top of the screen, promising lightning-fast internet speeds for seamless streaming and instant downloads. The expectation is clear: 5G should deliver a transformative experience, far surpassing the capabilities of older 4G networks. However, recent findings have cast doubt on whether that symbol truly represents the high-speed

How Can We Boost Engagement in a Burnout-Prone Workforce?

Walk into a typical office in 2025, and the atmosphere often feels heavy with unspoken exhaustion—employees dragging through the day with forced smiles, their energy sapped by endless demands, reflecting a deeper crisis gripping workforces worldwide. Burnout has become a silent epidemic, draining passion and purpose from millions. Yet, amid this struggle, a critical question emerges: how can engagement be

Leading HR with AI: Balancing Tech and Ethics in Hiring

In a bustling hotel chain, an HR manager sifts through hundreds of applications for a front-desk role, relying on an AI tool to narrow down the pool in mere minutes—a task that once took days. Yet, hidden in the algorithm’s efficiency lies a troubling possibility: what if the system silently favors candidates based on biased data, sidelining diverse talent crucial

HR Turns Recruitment into Dream Home Prize Competition

Introduction to an Innovative Recruitment Strategy In today’s fiercely competitive labor market, HR departments and staffing firms are grappling with unprecedented challenges in attracting and retaining top talent, leading to the emergence of a striking new approach that transforms traditional recruitment into a captivating “dream home” prize competition. This strategy offers new hires and existing employees a chance to win