{"id":5644,"date":"2019-11-16T14:55:52","date_gmt":"2019-11-16T06:55:52","guid":{"rendered":"https:\/\/version-2.com\/?p=5644"},"modified":"2020-11-04T13:23:12","modified_gmt":"2020-11-04T05:23:12","slug":"winnti-groups-skip%e2%80%912-0-a-microsoft-sql-server-backdoor","status":"publish","type":"post","link":"https:\/\/version-2.com\/en\/2019\/11\/winnti-groups-skip%e2%80%912-0-a-microsoft-sql-server-backdoor\/","title":{"rendered":"Winnti Group\u2019s skip\u20112.0: A Microsoft SQL Server backdoor"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"5644\" class=\"elementor elementor-5644\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-be90e74 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"be90e74\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;0fc9e66&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;],&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-42b7c9ab\" data-id=\"42b7c9ab\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d773a8c elementor-widget elementor-widget-text-editor\" data-id=\"d773a8c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Notorious cyberespionage group debases MSSQL<\/p><p>For a while, ESET researchers have been tracking the activities of the Winnti Group, active since at least 2012 and responsible for high-profile supply-chain attacks against <a href=\"https:\/\/www.welivesecurity.com\/2019\/03\/11\/gaming-industry-scope-attackers-asia\/\" target=\"_blank\" rel=\"noopener\">the video game and software industry<\/a>. Recently, we discovered a previously undocumented backdoor targeting Microsoft SQL (MSSQL) that allows attackers to maintain a very discreet foothold inside compromised organizations. This backdoor bears multiple similarities to the <em>PortReuse<\/em> backdoor, another tool used by the Winnti Group that was first <a href=\"\/wp-content\/uploads\/2020\/04\/ESET_Winnti.pdf\" target=\"_blank\" rel=\"noopener\">documented by ESET in October 2019<\/a>, such as the use of the same custom packer and VMProtected launcher, which is why we attribute this backdoor to the Winnti Group.<\/p><p>Earlier this year, we received a sample of this new backdoor called <em>skip-2.0<\/em> by its authors and part of the Winnti Group\u2019s arsenal. This backdoor targets MSSQL Server 11 and 12, allowing the attacker to connect stealthily to any MSSQL account by using a magic password \u2013 while automatically hiding these connections from the logs. Such a backdoor could allow an attacker to stealthily copy, modify or delete database content. This could be used, for example, to manipulate in-game currencies for financial gain. In-game currency database manipulations by Winnti operators have <a href=\"https:\/\/image.ahnlab.com\/global\/upload\/download\/documents\/1401223631603288.pdf\" target=\"_blank\" rel=\"noopener\">already been reported<\/a>. To the best of our knowledge, <em>skip-2.0<\/em> is the first MSSQL Server backdoor to be documented publicly. Note that even though MSSQL Server 11 and 12 are not the most recent versions (released in 2012 and 2014, respectively), they are the most commonly used ones according to <a href=\"https:\/\/censys.io\/\" target=\"_blank\" rel=\"noopener\">Censys\u2019<\/a>s data.<\/p><p>We recently published a <a href=\"\/wp-content\/uploads\/2020\/04\/ESET_Winnti.pdf\" target=\"_blank\" rel=\"noopener\">white paper<\/a> updating our understanding of the arsenal of the Winnti Group, and that exposed a previously undocumented backdoor of theirs called <em>PortReuse.<\/em> It uses an identical packer to that used with the payload embedded in compromised video games <a href=\"https:\/\/www.welivesecurity.com\/2019\/03\/11\/gaming-industry-scope-attackers-asia\/\" target=\"_blank\" rel=\"noopener\">uncovered by ESET in March 2019<\/a>. The VMProtected launcher that drops the <em>PortReuse<\/em> backdoor was also found being used to launch recent <em>ShadowPad<\/em> versions. In that context, we were able to find a new tool called <em>skip.2-0<\/em> by its developer. It uses the same VMProtected launcher as well as Winnti Group\u2019s custom packer and exhibits multiple similarities with other samples from the Winnti Group\u2019s toolset. This leads us to ascribe <em>skip-2.0 <\/em>to that toolset also.<\/p><p>This article will focus on the technical details and functionality of this MSSQL Server backdoor, as well as on exposing the technical similarities of <em>skip.2-0<\/em> with the Winnti Group\u2019s known arsenal \u2013 in particular, with the <em>PortReuse<\/em> backdoor and <em>ShadowPad<\/em>. A note on the reasons why we chose the \u201cWinnti Group\u201d naming can be found on our <a href=\"https:\/\/www.welivesecurity.com\/2019\/10\/14\/connecting-dots-exposing-arsenal-methods-winnti\/\" target=\"_blank\" rel=\"noopener\">white paper<\/a>.<\/p><h2><big>VMProtected launcher<\/big><\/h2><p>We found<em> skip-2.0<\/em> while looking for VMProtected launchers, for which the payload is usually either <em>PortReuse<\/em> or <em>ShadowPad<\/em>.<\/p><h3>Embedded payload<\/h3><p>As with the encrypted <em>PortReuse<\/em> and <em>ShadowPad<\/em> payloads<em>, skip-2.0<\/em> is embedded in the VMProtected launcher\u2019s overlay, as shown in Figure 1:<\/p><p><a href=\"\/wp-content\/uploads\/2020\/04\/Figure-1-7.png\"><img fetchpriority=\"high\" decoding=\"async\" src=\"\/wp-content\/uploads\/2020\/04\/Figure-1-7.png\" alt=\"\" width=\"525\" height=\"191\" \/><\/a><\/p><p class=\"wp-caption-text\"><i>Figure 1. VMProtected launcher\u2019s headers. The payload is embedded in the PE overlay.<\/i><\/p><h3>Encryption<\/h3><p>The payload encryption is identical to that used in the other VMProtected launchers. It is RC5-encrypted with a key derived from the VolumeID and the string f@Ukd!rCto\u00a0R$. \u2013 as described in our <a href=\"\/wp-content\/uploads\/2020\/04\/ESET_Winnti.pdf\" target=\"_blank\" rel=\"noopener\">previous white paper on the Winnti Group arsenal.<\/a><\/p><h3>Persistence<\/h3><p>As in the case of <em>PortReuse<\/em> and <em>ShadowPad<\/em>, the launcher probably persists by exploiting a <a href=\"https:\/\/posts.specterops.io\/lateral-movement-scm-and-dll-hijacking-primer-d2f61e8ab992\" target=\"_blank\" rel=\"noopener\">DLL hijacking vulnerability<\/a> by being installed at C:\\Windows\\System32\\TSVIPSrv.DLL. This results in the DLL being loaded by the standard Windows SessionEnv service at system startup.<\/p><h2>\u00a0<\/h2><h2><big>Winnti Group\u2019s custom packer<\/big><\/h2><p>Once decrypted the embedded payload is actually Winnti Group\u2019s custom packer. This packer is the same shellcode that was documented in our <a href=\"https:\/\/www.welivesecurity.com\/2019\/03\/11\/gaming-industry-scope-attackers-asia\/\" target=\"_blank\" rel=\"noopener\">previous article<\/a> and <a href=\"\/wp-content\/uploads\/2020\/04\/ESET_Winnti.pdf\" target=\"_blank\" rel=\"noopener\">white paper<\/a>. It is used to pack the <em>PortReuse<\/em> backdoor as well as the payload embedded in the compromised video games.<\/p><h3>Packer configuration<\/h3><p>As described in our previous article, the packer configuration contains the decryption key of the packed binary as well as its original filename, its size and the execution type (EXE or DLL). The payload\u2019s packer configuration is shown in Table 1.<\/p><p><img decoding=\"async\" src=\"\/wp-content\/uploads\/2020\/06\/Table-1-Payloads-packer-configuration.jpg\" alt=\"Table 1. Payload\u2019s packer configuration\" \/><br \/><br \/><em>Table 1. Payload\u2019s packer configuration<\/em><\/p><p>One can see from the packer configuration that the payload is called <em>Inner-Loader<\/em>. <em>Inner-Loader<\/em> is the name of an injector that is the part of the Winnti Group\u2019s arsenal used to inject the <em>PortReuse<\/em> backdoor into processes listening on a particular port, as described in <a href=\"\/wp-content\/uploads\/2020\/04\/ESET_Winnti.pdf\" target=\"_blank\" rel=\"noopener\">our previous publication<\/a>. Beyond that identical name, by analyzing this payload it appears that it is another variant of the <em>Inner-Loader<\/em> injector.<\/p><h2>Inner-Loader injector<\/h2><p>This variant of <em>Inner-Loader<\/em>, instead of looking for a process listening on a particular port, as in the case when injecting the <em>PortReuse<\/em> backdoor, looks for a process called sqlserv.exe, which is the conventional process name of MSSQL Server. If found, <em>Inner-Loader<\/em> then injects a payload into this process. This payload is also packed with the custom packer \u2013 the packer configuration of that payload is shown in Table 2.<\/p><p><img decoding=\"async\" src=\"\/wp-content\/uploads\/2020\/06\/Table-2-Packer-configuration-of-the-payload-embedded-in-Inner-Loader.jpg\" alt=\"Table 2. Packer configuration of the payload embedded in Inner-Loader\" \/><br \/><br \/><em>Table 2. Packer configuration of the payload embedded in Inner-Loader<\/em><\/p><p>The original filename of this injected payload is <em>skip-2.0.dll<\/em>.<br \/>\u00a0<\/p><h2><big>skip-2.0<\/big><\/h2><p>After having been injected and launched by <em>Inner-Loader<\/em>, <em>skip-2.<\/em>0 first checks whether it is executing within an sqlserv.exe process and if so, retrieves a handle to sqllang.dll, which is loaded by sqlserv.exe. It then proceeds to find and hook multiple functions from that DLL. Figure 2 depicts the <em>skip-2.0<\/em> chain of compromise.<\/p><p><a href=\"\/wp-content\/uploads\/2020\/04\/Figure-2-7.png\"><img decoding=\"async\" src=\"\/wp-content\/uploads\/2020\/04\/Figure-2-7.png\" \/><\/a><\/p><p class=\"wp-caption-text\"><i>Figure 2. skip-2.0 unpacking and injection<\/i><\/p><h3>Hooking sqllang.dll<\/h3><p>The hooking procedure used by <em>skip-2.0<\/em> is very similar to the one used by <em>NetAgent<\/em>, the <em>PortReuse<\/em> module responsible for installing the networking hook. This hooking library is based on the <a href=\"https:\/\/github.com\/gdabah\/distorm\" target=\"_blank\" rel=\"noopener\">distorm<\/a> open source disassembler that is used by multiple open source hooking frameworks. In particular, a disassembling library is needed to correctly compute the size of the instructions to be hooked. One can see in Figure 3 that the hooking procedure used by <em>NetAgent<\/em> and <em>skip-2.0<\/em> are almost identical.<\/p><p><a href=\"\/wp-content\/uploads\/2020\/04\/Figure-3a-Copy-2-e1571659768838.jpg\"><img decoding=\"async\" src=\"\/wp-content\/uploads\/2020\/04\/Figure-3a-Copy-2-e1571659768838.jpg\" \/><\/a><\/p><p class=\"wp-caption-text\"><i>Figure 3. Hex-Rays output comparison between the NetAgent (left) and skip-2.0 (right) hooking procedures<\/i><\/p><p>There is one notable difference, which is the fact that the hooking function from <em>skip-2.0<\/em> takes the address of the hook to be installed as an argument, while for <em>NetAgent<\/em>, the address of the hook to install is hardcoded. This is due to the fact that <em>skip-2.0<\/em> has to hook multiple functions in sqllang.dll to operate properly, while <em>NetAgent<\/em> targets only a single function.<\/p><p>To locate each sqllang.dll function to be hooked, <em>skip-2.0<\/em> first retrieves the size of the DLL once loaded in memory (i.e. its virtual size) by parsing its PE headers. Then an array of bytes to be matched within sqllang.dll is initialized as shown in Figure 4. Once the address of the first occurrence matching the byte array is found, the hook is installed using the procedure shown in Figure 3.<\/p><p><a class=\"fancybox\" href=\"\/wp-content\/uploads\/2020\/04\/Figure-4-4.png\" data-fancybox=\"single-post-fancybox\"><img decoding=\"async\" class=\"wp-image-131329 size-full\" src=\"\/wp-content\/uploads\/2020\/04\/Figure-4-4.png\" sizes=\"(max-width: 525px) 100vw, 525px\" srcset=\"\/wp-content\/uploads\/2020\/04\/Figure-4-4.png 525w, \/wp-content\/uploads\/2020\/04\/Figure-4-4-300x121.png 300w, \/wp-content\/uploads\/2020\/04\/Figure-4-4-340x137.png 340w\" alt=\"\" width=\"525\" height=\"211\" \/><\/a><\/p><p class=\"wp-caption-text\"><i>Figure 4. Hex-Rays output of the procedure initializing the byte array to match in<\/i> sqllang.dll<\/p><p>The success of the hook installation is then logged in cleartext in a log file located at the hardcoded path C:\\Windows\\Temp\\TS_2CE1.tmp and shown in Figure 5.<\/p><p><a href=\"\/wp-content\/uploads\/2020\/06\/Figure-5-4.png\"><img decoding=\"async\" src=\"\/wp-content\/uploads\/2020\/06\/Figure-5-4.png\" alt=\"\" \/><\/a><\/p><p class=\"wp-caption-text\"><i>Figure 5. Log generated during hooks installation<\/i><\/p><p>Should the targeted function not be found, the hook installer searches for a fallback function, with a different set of byte patterns.<\/p><p>Matching a sequence of bytes to locate the address of the targeted function instead of using a static offset, plus using a fallback sequence of bytes, allows <em>skip-2.0 <\/em>to be more resilient to MSSQL updates and to potentially target multiple sqllang.dll updates.<\/p><h3>One password to rule them all<\/h3><p>The functions targeted by<em> skip-2.0<\/em> are related to authentication and event logging. The targeted functions include:<\/p><ul><li>CPwdPolicyManager::ValidatePwdForLogin<\/li><li>CSECAuthenticate::AuthenticateLoginIdentity<\/li><li>ReportLoginSuccess<\/li><li>IssueLoginSuccessReport<\/li><li>FExecuteLogonTriggers<\/li><li>XeSqlPkg::sql_statement_completed::Publish<\/li><li>XeSqlPkg::sql_batch_completed::Publish<\/li><li>SecAuditPkg::audit_event::Publish<\/li><li>XeSqlPkg::login::Publish<\/li><li>XeSqlPkg::ual_instrument_called::Publish<\/li><\/ul><p>The most interesting function is the first one (CPwdPolicyManager::ValidatePwdForLogin), which is responsible for validating the password provided for a given user. This function\u2019s hook checks whether the password provided by the user matches the magic password; if that is the case, the original function will not be called and the hook will return 0, allowing the connection even though the correct password was not provided. A global flag is then set that will be checked by the other hooked functions responsible for event logging. The corresponding decompiled procedure is shown in Figure 6. In the case where this global flag is set, the hooked logging functions will silently return without calling their corresponding, original functions, so the action will not be logged. In the case where a different password is provided, the original function is called.<\/p><p><a class=\"fancybox\" href=\"\/wp-content\/uploads\/2020\/04\/Figure-6-1.png\" data-fancybox=\"single-post-fancybox\"><img decoding=\"async\" class=\"wp-image-131331 size-full\" src=\"\/wp-content\/uploads\/2020\/04\/Figure-6-1.png\" sizes=\"(max-width: 450px) 100vw, 450px\" srcset=\"\/wp-content\/uploads\/2020\/04\/Figure-6-1.png 450w, \/wp-content\/uploads\/2020\/04\/Figure-6-1-300x133.png 300w\" alt=\"\" width=\"450\" height=\"200\" \/><\/a><\/p><p class=\"wp-caption-text\"><i>Figure 6. Hex-Rays output of the procedure responsible for matching the password provided at login with the hardcoded string<\/i><\/p><p>A similar backdooring technique, based on hardcoded passwords, was used with <a href=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2018\/12\/ESET-The_Dark_Side_of_the_ForSSHe.pdf\" target=\"_blank\" rel=\"noopener\">SSH backdoors previously discovered by ESET.<\/a> The difference here is that <em>skip-2.0<\/em> is installed in-memory, while in the case of the SSH backdoors the sshd executable was modified prior to execution.<\/p><p>Additionally, CSECAuthenticate::AuthenticateLoginIdentity will be called from within its hook code but the hook will always return 0. The ReportLoginSucess and IssueLoginSuccessReport hooks will not call the original functions if the magic password was used to log in. The same behavior is applied to FEExecuteLogonTriggers. Other logging functions such as XeSqlPkg::sql_statement_completed::Publish or XeSqlPkg::sql_batch_completed::Publish will also be disabled in the case where the user logged in with the magic password. Multiple audit events are disabled as well, including SecAuditPkg::audit_event::Publish, XeSqlPkg::login::Publish and XeSqlPkg::ual_instrument_called::Publish.<\/p><p>This series of hooks allows the attacker not only to gain persistence in the victim\u2019s MSSQL Server through the use of a special password, but also to remain undetected thanks to the multiple log and event publishing mechanisms that are disabled when that password is used.<\/p><p>We tested <em>skip-2.0<\/em> against multiple MSSQL Server versions and found that we were able to login successfully using the special password with MSSQL Server 11 and 12. To check whether a particular sqllang.dll version is targeted by <em>skip-2.0<\/em> (i.e., that matches the byte patterns), we created a YARA rule, which can be found in our <a href=\"https:\/\/github.com\/eset\/malware-ioc\/tree\/master\/winnti_group\" target=\"_blank\" rel=\"noopener\">GitHub repository<\/a>.<\/p><h2><big>Connection with the Winnti Group<\/big><\/h2><p>We observed multiple similarities between <em>skip-2.0<\/em> and other tools from the Winnti Group\u2019s arsenal. Its VMProtected launcher, custom packer, <em>Inner-Loader<\/em> injector and hooking framework are part of the already known toolset of the Winnti Group. This leads us to think that <em>skip-2.0<\/em> is also part of that toolset.<\/p><h2><big>Conclusion<\/big><\/h2><p>The<em> skip-2.0 <\/em>backdoor is an interesting addition to the Winnti Group\u2019s arsenal, sharing a great deal of similarities with the group\u2019s already known toolset, and allowing the attacker to achieve persistence on an MSSQL Server. Considering that administrative privileges are required for installing the hooks, <em>skip-2.0 <\/em>must be used on already compromised MSSQL Servers to achieve persistence and stealthiness.<\/p><p>We will continue to monitor new activities of the Winnti Group and will publish relevant information on our blog. For any inquiries, contact us at <a href=\"mailto:threatintel@eset.com\">threatintel@eset.com<\/a>.<\/p><h2><big>Indicators of Compromise (IoCs)<\/big><\/h2><p><br \/><img decoding=\"async\" src=\"\/wp-content\/uploads\/2020\/06\/Indicators-of-Compromise.jpg\" alt=\"\" \/><\/p><h3>MITRE ATT&amp;CK techniques<\/h3><p><br \/><img decoding=\"async\" src=\"\/wp-content\/uploads\/2020\/06\/MITRE-ATT-and-CK-techniques.jpg\" alt=\"\" \/><\/p><p>\u00a0<\/p><p>\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7b6479f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7b6479f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;1f3e211&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;],&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c41e2d4\" data-id=\"c41e2d4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d135441 elementor-widget elementor-widget-shortcode\" data-id=\"d135441\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18159\" class=\"elementor elementor-18159\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-73b4cd0 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"73b4cd0\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8d19c1e\" data-id=\"8d19c1e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8865cce elementor-widget elementor-widget-text-editor\" data-id=\"8865cce\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About ESET<\/strong><br \/>For 30 years, ESET\u00ae has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET\u2019s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24\/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&amp;D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single \u201cin-the-wild\u201d malware without interruption since 2003.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Notorious cyberespionage group debases MSSQL For a whil [&hellip;]<\/p>","protected":false},"author":143524195,"featured_media":3289,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[131,40,61,100],"tags":[41,104,107],"class_list":["post-5644","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-v2","category-eset","category-press-release","category-year2019","tag-eset","tag-sql","tag-107"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Winnti Group\u2019s skip\u20112.0: A Microsoft SQL Server backdoor - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/version-2.com\/en\/2019\/11\/winnti-groups-skip\u20112-0-a-microsoft-sql-server-backdoor\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Winnti Group\u2019s skip\u20112.0: A Microsoft SQL Server backdoor - Version 2\" \/>\n<meta property=\"og:description\" content=\"Notorious cyberespionage group debases MSSQL For a whil [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/version-2.com\/en\/2019\/11\/winnti-groups-skip\u20112-0-a-microsoft-sql-server-backdoor\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2019-11-16T06:55:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-11-04T05:23:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/04\/eset-news.jpg?fit=1200%2C675&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"675\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"version2hk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"version2hk\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2019\\\/11\\\/winnti-groups-skip%e2%80%912-0-a-microsoft-sql-server-backdoor\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2019\\\/11\\\/winnti-groups-skip%e2%80%912-0-a-microsoft-sql-server-backdoor\\\/\"},\"author\":{\"name\":\"version2hk\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\"},\"headline\":\"Winnti Group\u2019s skip\u20112.0: A Microsoft SQL Server backdoor\",\"datePublished\":\"2019-11-16T06:55:52+00:00\",\"dateModified\":\"2020-11-04T05:23:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2019\\\/11\\\/winnti-groups-skip%e2%80%912-0-a-microsoft-sql-server-backdoor\\\/\"},\"wordCount\":1844,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2019\\\/11\\\/winnti-groups-skip%e2%80%912-0-a-microsoft-sql-server-backdoor\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/eset-news.jpg\",\"keywords\":[\"ESET\",\"SQL\",\"2019\"],\"articleSection\":[\"Version 2 Limited\",\"ESET\",\"Press Release\",\"2019\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2019\\\/11\\\/winnti-groups-skip%e2%80%912-0-a-microsoft-sql-server-backdoor\\\/\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2019\\\/11\\\/winnti-groups-skip%e2%80%912-0-a-microsoft-sql-server-backdoor\\\/\",\"name\":\"Winnti Group\u2019s skip\u20112.0: A Microsoft SQL Server backdoor - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2019\\\/11\\\/winnti-groups-skip%e2%80%912-0-a-microsoft-sql-server-backdoor\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2019\\\/11\\\/winnti-groups-skip%e2%80%912-0-a-microsoft-sql-server-backdoor\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/eset-news.jpg\",\"datePublished\":\"2019-11-16T06:55:52+00:00\",\"dateModified\":\"2020-11-04T05:23:12+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2019\\\/11\\\/winnti-groups-skip%e2%80%912-0-a-microsoft-sql-server-backdoor\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/version-2.com\\\/zh\\\/2019\\\/11\\\/winnti-groups-skip%e2%80%912-0-a-microsoft-sql-server-backdoor\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2019\\\/11\\\/winnti-groups-skip%e2%80%912-0-a-microsoft-sql-server-backdoor\\\/#primaryimage\",\"url\":\"https:\\\/\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/eset-news.jpg\",\"contentUrl\":\"https:\\\/\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/eset-news.jpg\",\"width\":1200,\"height\":675},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2019\\\/11\\\/winnti-groups-skip%e2%80%912-0-a-microsoft-sql-server-backdoor\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Winnti Group\u2019s skip\u20112.0: A Microsoft SQL Server backdoor\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\",\"name\":\"version2hk\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"caption\":\"version2hk\"},\"sameAs\":[\"http:\\\/\\\/version2xfortcom.wordpress.com\"],\"url\":\"https:\\\/\\\/version-2.com\\\/en\\\/author\\\/version2hk\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Winnti Group\u2019s skip\u20112.0: A Microsoft SQL Server backdoor - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/version-2.com\/en\/2019\/11\/winnti-groups-skip\u20112-0-a-microsoft-sql-server-backdoor\/","og_locale":"en_US","og_type":"article","og_title":"Winnti Group\u2019s skip\u20112.0: A Microsoft SQL Server backdoor - Version 2","og_description":"Notorious cyberespionage group debases MSSQL For a whil [&hellip;]","og_url":"https:\/\/version-2.com\/en\/2019\/11\/winnti-groups-skip\u20112-0-a-microsoft-sql-server-backdoor\/","og_site_name":"Version 2","article_published_time":"2019-11-16T06:55:52+00:00","article_modified_time":"2020-11-04T05:23:12+00:00","og_image":[{"width":1200,"height":675,"url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/04\/eset-news.jpg?fit=1200%2C675&ssl=1","type":"image\/jpeg"}],"author":"version2hk","twitter_card":"summary_large_image","twitter_misc":{"Written by":"version2hk","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/version-2.com\/zh\/2019\/11\/winnti-groups-skip%e2%80%912-0-a-microsoft-sql-server-backdoor\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/2019\/11\/winnti-groups-skip%e2%80%912-0-a-microsoft-sql-server-backdoor\/"},"author":{"name":"version2hk","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db"},"headline":"Winnti Group\u2019s skip\u20112.0: A Microsoft SQL Server backdoor","datePublished":"2019-11-16T06:55:52+00:00","dateModified":"2020-11-04T05:23:12+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/zh\/2019\/11\/winnti-groups-skip%e2%80%912-0-a-microsoft-sql-server-backdoor\/"},"wordCount":1844,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/version-2.com\/zh\/2019\/11\/winnti-groups-skip%e2%80%912-0-a-microsoft-sql-server-backdoor\/#primaryimage"},"thumbnailUrl":"https:\/\/version-2.com\/wp-content\/uploads\/2020\/04\/eset-news.jpg","keywords":["ESET","SQL","2019"],"articleSection":["Version 2 Limited","ESET","Press Release","2019"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/zh\/2019\/11\/winnti-groups-skip%e2%80%912-0-a-microsoft-sql-server-backdoor\/","url":"https:\/\/version-2.com\/zh\/2019\/11\/winnti-groups-skip%e2%80%912-0-a-microsoft-sql-server-backdoor\/","name":"Winnti Group\u2019s skip\u20112.0: A Microsoft SQL Server backdoor - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/version-2.com\/zh\/2019\/11\/winnti-groups-skip%e2%80%912-0-a-microsoft-sql-server-backdoor\/#primaryimage"},"image":{"@id":"https:\/\/version-2.com\/zh\/2019\/11\/winnti-groups-skip%e2%80%912-0-a-microsoft-sql-server-backdoor\/#primaryimage"},"thumbnailUrl":"https:\/\/version-2.com\/wp-content\/uploads\/2020\/04\/eset-news.jpg","datePublished":"2019-11-16T06:55:52+00:00","dateModified":"2020-11-04T05:23:12+00:00","breadcrumb":{"@id":"https:\/\/version-2.com\/zh\/2019\/11\/winnti-groups-skip%e2%80%912-0-a-microsoft-sql-server-backdoor\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/version-2.com\/zh\/2019\/11\/winnti-groups-skip%e2%80%912-0-a-microsoft-sql-server-backdoor\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/2019\/11\/winnti-groups-skip%e2%80%912-0-a-microsoft-sql-server-backdoor\/#primaryimage","url":"https:\/\/version-2.com\/wp-content\/uploads\/2020\/04\/eset-news.jpg","contentUrl":"https:\/\/version-2.com\/wp-content\/uploads\/2020\/04\/eset-news.jpg","width":1200,"height":675},{"@type":"BreadcrumbList","@id":"https:\/\/version-2.com\/zh\/2019\/11\/winnti-groups-skip%e2%80%912-0-a-microsoft-sql-server-backdoor\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"Winnti Group\u2019s skip\u20112.0: A Microsoft SQL Server backdoor"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db","name":"version2hk","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","caption":"version2hk"},"sameAs":["http:\/\/version2xfortcom.wordpress.com"],"url":"https:\/\/version-2.com\/en\/author\/version2hk\/"}]}},"jetpack_featured_media_url":"https:\/\/version-2.com\/wp-content\/uploads\/2020\/04\/eset-news.jpg","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-1t2","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/5644","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/users\/143524195"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/comments?post=5644"}],"version-history":[{"count":18,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/5644\/revisions"}],"predecessor-version":[{"id":18646,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/5644\/revisions\/18646"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media\/3289"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media?parent=5644"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/categories?post=5644"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/tags?post=5644"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}