SQL Monitor Security Vulnerability
jstrate
Posts: 3 New member
We received an email today regarding a security vulnerability in SQL Monitor. Based on the email design, it looks like a phishing attempt. If this does exist, can someone point me towards documentation on the issue?
Tagged:
Best Answer
-
RavishingR Posts: 1 Bronze 1After looking around I followed the link to here:
https://www.red-gate.com/products/dba/sql-monitor/entrypage/security-vulnerability-october-2018?_hsenc=p2ANqtz-97lQw3tt0suK3nMLAp3VN8zzIu5Ct1J7DDYs05efPgPd4NVY3JSuZPbj02ZVKN6D94EWGgvdIJsaRapf4T1Dp9lMqotp8yO5bWEpDt2GbGSDe4Hs4&_hsmi=66718880
It was definitely bad practice hiding a download link behind a sketchy looking url router like "Hub Spot Email". The email should have said to go to the website and find it yourself.
Answers
https://documentation.red-gate.com/sm8/release-notes-and-other-versions/sql-monitor-8-0-release-notes?_ga=2.104009344.1887869072.1539701317-1721444002.1519999268
Yes, the links are legitimate - as @Russell D above indicates - they are going through our hubspot which makes these somewhat unsavory looking links. The links posted above are direct to the pages themselves and are where the hubspot links are directed.
The email is from Tony Payne COO (Chief Operations Office) which is correct; Simon Galbraith is the CEO.
We agree that the links look extremely suspicious (especially given the circumstances) and we have fed this back to our internal teams.
Also, the release notes have just been updated with the extra information now that the email has been released as seen above.
My apologies for the confusion and scare!
Kind regards,
Alex
Have you visited our Help Center?
Hey William I received this email today and to my eye it looks very suspect. I did find confirmation on your website that it is legit: https://www.red-gate.com/products/dba/sql-monitor/entrypage/security-vulnerability-october-2018?_hsenc=p2ANqtz-97lQw3tt0suK3nMLAp3VN8zzIu5Ct1J7DDYs05efPgPd4NVY3JSuZPbj02ZVKN6D94EWGgvdIJsaRapf4T1Dp9lMqotp8yO5bWEpDt2GbGSDe4Hs4&_hsmi=66718880&_ga=2.130576393.783027082.1539702323-301011559.1538759718
But let me point out some concerns:
Now when looking at the header information it does look this came from your email servers and I did find in your support forums conversations about the email which directed me to the above url.
While the below email is personalized with my name that could simply be a case of your customer db being compromised (which thankfully isn’t the case here).
I hope that you folks will give more thought into how your format these types of notifications going forward.