Hackers Exploit FOUNDATION Software Defaults

Lilu Anderson
Photo: Finoracle.net

Construction Firms Targeted by Hackers via FOUNDATION Software

Emerging Threat in Construction Sector: A recent cybersecurity report by Huntress has revealed that hackers are exploiting default credentials in the FOUNDATION Accounting Software to target the construction industry. This software, widely used for financial management, is often deployed with a Microsoft SQL (MS SQL) Server for handling database operations.

How Hackers Exploit Default Credentials

The attack vector centers around the use of default credentials, which are the pre-set usernames and passwords that come with the software. In many instances, these credentials remain unchanged, allowing attackers to gain access with minimal effort. Particularly, the MS SQL Server associated with FOUNDATION software sometimes has port TCP 4243 open, which enables remote access through mobile applications.

Accounts at Risk: FOUNDATION software includes two critical accounts – "sa" and "dba". The "sa" account is a default system administrator, while "dba" is specifically created by FOUNDATION. Both accounts often retain their factory-set credentials, making them prime targets for brute-force attacks.

The Mechanics of the Attack

Brute-force attacks involve systematically trying every possible combination of passwords until the correct one is found. Once access is gained, hackers can utilize the xp_cmdshell feature, a powerful SQL command that allows them to execute system-level commands. This feature essentially gives hackers the ability to control the server as if they were directly using the system's command line.

Recorded Incidents and Impact

Huntress first detected this cyber threat on September 14, 2024, logging approximately 35,000 brute-force attempts on a single server before hackers successfully breached it. Across 500 monitored FOUNDATION installations, 33 were found vulnerable due to unchanged default credentials, highlighting a significant security oversight.

To protect against these types of attacks, experts recommend several measures:

  • Change Default Credentials: Immediately update default usernames and passwords to strong, unique combinations.
  • Restrict Public Access: Avoid exposing the software over the public internet unless absolutely necessary.
  • Disable xp_cmdshell: This configuration should be disabled to prevent unauthorized command execution.

These steps are crucial for safeguarding sensitive financial data within the construction sector against emerging cyber threats.

Understanding Terminology:

  • Default Credentials: The initial set of username and password provided by software vendors. It's crucial to change these to prevent unauthorized access.
  • Brute-force Attack: A trial-and-error method used to decode passwords or encryption keys.
  • xp_cmdshell: A feature in SQL Server that allows execution of commands directly from the SQL environment, potentially dangerous if misused.

By understanding these terms and implementing the recommended security practices, construction firms can better protect themselves from these types of cyber threats.

Share This Article
Lilu Anderson is a technology writer and analyst with over 12 years of experience in the tech industry. A graduate of Stanford University with a degree in Computer Science, Lilu specializes in emerging technologies, software development, and cybersecurity. Her work has been published in renowned tech publications such as Wired, TechCrunch, and Ars Technica. Lilu’s articles are known for their detailed research, clear articulation, and insightful analysis, making them valuable to readers seeking reliable and up-to-date information on technology trends. She actively stays abreast of the latest advancements and regularly participates in industry conferences and tech meetups. With a strong reputation for expertise, authoritativeness, and trustworthiness, Lilu Anderson continues to deliver high-quality content that helps readers understand and navigate the fast-paced world of technology.