Stealth Procedure Injection

Attack

In this attack mode, a booby-trapped procedure slips into the primary database.

Stealth Procedure

With SQL Replication

The hidden backdoor spreads everywhere.

SQL Replication spreads the problem

With RMF's Object Synchronization

Application APIs expose no DDL, so the procedure can’t propagate.

RMF limits the problem

Last updated