top of page

Oracle Database Scheduler Exploited for Command Execution and Ransomware Deployment

October 3rd, 2025

High

Our Cyber Threat Intelligence Unit has observed multiple incidents where threat actors abused Oracle Database Scheduler’s External Jobs feature to gain initial access and establish persistence inside enterprise environments. By authenticating as privileged database users (e.g., SYSDBA) and invoking the scheduler’s extjobo.exe utility, adversaries executed arbitrary OS commands directly on Windows database hosts. Observed activity included executing Base64-encoded PowerShell, creating rogue local administrator accounts (e.g., “Admine”), deploying Ngrok tunnels for encrypted remote access, staging reverse shells, and in some cases deploying ransomware. This technique minimizes disk artifacts by piping encoded payloads into memory and exploits the trusted position of database servers to gain deeper access to corporate networks. 

Technical Details

  • Attack Type: Abuse of legitimate Oracle Database Scheduler functionality for remote command execution.

  • Severity: High

  • Delivery Method:

    • Credential harvesting, brute-force, or credential stuffing against exposed Oracle listener ports (TCP/1521).

    • Successful privileged DB logins (SYSDBA or scheduler-enabled accounts).

    • Abuse of Oracle Scheduler External Jobs (extjobo.exe) to run arbitrary OS commands.

  • Technique:

    • extjobo.exe accepts commands over a named pipe, executing them under the OracleJobScheduler service account.

    • Adversaries invoke it with parameters such as: extjobo.exe -noservice -exec C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -EncodedCommand <Base64Payload>

  • Activity observed:

    • Reconnaissance and host profiling.

    • Downloading second-stage payloads (test3.bat, tfod.cmd).

    • Creation of new local administrator accounts (e.g., Admine).

    • Configuration of Ngrok tunnels (ngrok.yml with auth tokens).

    • Scheduled task creation (SCHTASKS.exe) to maintain persistence.

    • Execution of reverse shells and, in some cases, deployment of ransomware families (e.g., ProximaBlackshadow).

    • Temporary batch files were deleted post-execution to hinder forensic recovery.

  • Requirements:

    • Privileged DB authentication (SYSDBA or equivalent).

    • Scheduler privileges enabling External Job execution.

    • Network reachability to exposed Oracle listener ports if brute-forced externally.

Image by ThisisEngineering

Impact

  • Full OS-level command execution on the database host as the OracleJobScheduler service account.

  • Privilege escalation via local admin creation, enabling lateral movement.

  • Long-term access established through Ngrok tunnels and scheduled tasks without obvious inbound connections.

  • Use of the database host as a trusted pivot for data exfiltration or ransomware deployment, leading to potential data loss, disruption, and reputational damage.

Detection Method

  • Authentication monitoring:

    • Audit unusual privileged logins (SYSDBA, DBA accounts) from unfamiliar IPs.

    • Detect login storms (multiple failed attempts followed by a success).

  • Process & commandline monitoring

    • Alert on extjobo.exe executions with -exec and -EncodedCommand arguments.

    • Monitor PowerShell processes spawned under the OracleJobScheduler service context.

  • File & account indicators

    • Unexpected creation of local admin accounts (e.g., Admine).

    • Detection of transient files such as test3.bat, tfod.cmd.

    • Presence of ngrok.yml or Ngrok tokens on database hosts.

  • Network indicators

    • Outbound connections to known Ngrok infrastructure (*.ngrok.io).

    • Unusual tunnels or encrypted traffic originating from database servers.

  • Scheduler telemetry

    • Review Oracle Scheduler job history for unexpected external job executions.

    • Audit named-pipe activity associated with extjobo.exe.

Indicators of Compromise

Type 

Value 

Filename 

test3.bat 

Filename 

tfod.cmd 

Local account 

Admine (unexpected admin user) 

Domain / Network 

*.ngrok.io (Ngrok endpoints) 

Process commandline 

extjobo.exe -noservice -exec powershell.exe -EncodedCommand <Base64> 

Config file 

ngrok.yml containing auth tokens 

Scheduler abuse 

Invocation of Oracle Database Scheduler External Jobs (extjobo.exe) 

Persistence 

Creation of scheduled tasks via SCHTASKS.exe 

Anti-forensics 

Deletion of temporary batch files after execution 

Credential access pattern 

Multiple failed SYSDBA login attempts followed by success (brute force / stuffing) 


mix of red, purple, orange, blue bubble shape waves horizontal for cybersecurity and netwo

Recommendations

  • Network controls

    • Restrict Oracle listener ports (TCP/1521) to trusted subnets.

    • Block external exposure of Oracle listener services by default.

  • Account hardening

    • Audit privileged DB accounts; rotate SYSDBA and service credentials.

    • Apply least-privilege to Scheduler roles; restrict who can run External Jobs.

  • Host & service hardening

    • Limit access to extjobo.exe and harden named-pipe permissions.

    • Alert on encoded PowerShell execution and suspicious scheduler job creation.

    • Restrict installation and execution of tunneling tools (Ngrok, FRP, etc.).

  • Incident response readiness

    • If compromise is suspected, isolate affected database hosts immediately.

    • Collect memory images, Scheduler job history, named-pipe traces, and forensic artifacts before remediation.

    • Rotate affected credentials and verify host integrity before reconnecting to production networks.

Conclusion

Abuse of Oracle Database Scheduler External Jobs represents a stealthy and increasingly prevalent attacker technique. By chaining privileged DB access with extjobo.exe invocation, adversaries achieve in-memory execution of malicious payloads, evading disk-based detection and leveraging database hosts as high-trust pivot points. We urge organizations to treat Scheduler privileges as highly sensitive, restrict listener access, and continuously monitor for anomalous Scheduler, PowerShell, and tunneling activity. Rapid isolation and forensic investigation are essential upon detecting suspicious extjobo.exe usage.

bottom of page