Injected stored procedure / trigger

Avoid propagation of stealth procedures that you did not know were present

Attack Vector

In this attack mode, a booby-trapped procedure slips into the primary database.

SQL Restore Migration

The hidden backdoor spreads to the migrated site.

XPort Migration

Application APIs expose no DDL, so the procedure can’t propagate.

Last updated