Microsoft denies fault for massive SQL attack
The company insists that there were no vulnerabilities specific to Windows which could have allowed a massive database attack affecting over half a million web pages.

Microsoft has denied that there is any vulnerability in its Internet Information Services (IIS) or SQL server after reports of a massive SQL injection infecting hundreds of thousands of web pages.
The automated attack was reported by F-Secure to have infected more than half a million websites, including those of the United Nations and the UK government. These had been hacked and modified to download malware to visitor's computers, resulting in many being shut down.
Microsoft denied it was due to any new or unknown vulnerabilities in ISS or SQL. It also said the Security Advisory that was published on 17 April which flagged up vulnerability in Windows was unconnected to the incident.
"The attacks are facilitated by SQL injection and are not related to issues related to IIS 6.0, ASP, ASP.Net or Microsoft SQL technologies," said Bill Sisk, a communications manager at Microsoft's Security Response Centre on the IIS blog.
It was claimed that attackers created an automated attack which took advantage of SQL injection vulnerabilities in web pages which did not follow security best practices for web application development.
Microsoft said that even though the attacks targeted sites hosted on IIS web servers, the vulnerabilities could be found on any platform.
Data security provider Secerno claimed that this was the first database threat that was equal in size and scope with well-known PC and virus attacks.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
"What is different about this threat is that it automates attacks that were previously done by hand. This capability has increased both the threat level and the possible number of sites infected significantly," said Steve Moyle, chief technology officer at Secerno.
"The attack works by exploiting weaknesses on the web site to gain access to the website and essentially take it over. Once in control of the database, the SQL injection takes every piece of data and adds a link with a malicious Java script."
He added: "When a web visitor goes to a page and clicks on a link with the infected Java script, his computer becomes infected."
-
Bigger salaries, more burnout: Is the CISO role in crisis?
In-depth CISOs are more stressed than ever before – but why is this and what can be done?
By Kate O'Flaherty Published
-
Cheap cyber crime kits can be bought on the dark web for less than $25
News Research from NordVPN shows phishing kits are now widely available on the dark web and via messaging apps like Telegram, and are often selling for less than $25.
By Emma Woollacott Published
-
The Total Economic Impact™ of IBM Security MaaS360 with Watson
Whitepaper Cost savings and business benefits enabled by MaaS360
By ITPro Published
-
Three ways to evolve your security operations
Whitepaper Why current approaches aren’t working
By ITPro Published
-
A strategic approach to security: Intelligent, collaborative, and efficient
whitepaper How your security fabric can address the challenges of new tech investment
By ITPro Published
-
Six steps to a stronger security posture through automation
Whitepaper Boost your cyber resilience to enable ongoing technology change with confidence
By ITPro Last updated
-
Business value of ServiceNow security operations
Whitepaper Experience transformational gains from automating workflows and data-sharing among IT, security, and risk teams to rapidly remediate threats
By ITPro Published
-
Thwart cyberthreats fast with security operations + AI Ops
Whitepaper How automated collaboration saves the day
By ITPro Published
-
Three steps to transforming security operations
Whitepaper How to be more agile, effective, collaborative, and scalable
By ITPro Published
-
Automation antidotes for the top poisons in cyber security management
Whitepaper How orchestration and collaboration tools can provide a healthy defense against the most serious threats
By ITPro Published