Injected stored procedure / trigger
Avoid propagation of stealth procedures that you did not know were present
Attack Vector
In this attack mode, a booby-trapped procedure slips into the primary database.

SQL Restore Migration
The hidden backdoor spreads to the migrated site.

XPort Migration
Application APIs expose no DDL, so the procedure can’t propagate.

Last updated