Just in:
Lee Chong Wei Shows Up On Chinese Hot cultural Talk Show “SHEDE Wisdom Talents”, Talking About “Crossing The Hill” // PolyU forms global partnership with ZEISS Vision Care to expand impact and accelerate market penetration of patented myopia control technology // Lai & Turner Law Firm PLLC Welcomes Eric Strocen as Director of Family Law Division // Sharjah Census Gears Up for Final Enumeration Phase // ESG Achievement Awards 2023/2024 is Open for Application, Celebrating Innovative Sustainable Practices and Responsible Risk Management // Empty Promises Haunt DAO Maker Hack Victims After Three Years // Booming Region Fuels Innovation Surge // UAE President, Spanish Prime Minister Hold Phone Talks // ZUHYX Exchange: Embracing Social Responsibility for a Sustainable Future // New Dynamics in Cryptocurrency Security: ZUHYX Builds the Strongest Fund Protection System // Cairo Recognizes Arab World’s Creative Luminaries at Award Ceremony // Astana International Exchange Connects with Regional Markets Through Tabadul Hub // Etihad Airways Announces Paris Service with A380 // Quality HealthCare Partners with eHealth to Enhance Patient Treatment Efficiency // Election Commission Has A Dismal Record On Acting Against Modi’s Breaches Of Poll Code // Telecom Giant Du Eyes Crypto Integration for FinTech Platform // Dubai Gears Up for Second FinTech Summit as Funding Surges // Octa crypto snapshot: investors behavior predictions after Bitcoin halving // NetApp’s 2024 Cloud Complexity Report Reveals AI Disrupt or Die Era Unfolding Globally // Hong Kong Unveils April 30 Launch for Landmark Crypto ETFs //

MongoDB ransacked: Now 27,000 databases hit in mass ransom attacks

1483961813 mongodbvictorgevers770x455

mongodbvictorgevers770x455.jpg

Attackers claim to hold a copy of the data that can be restored for between 0.2BTC and 1BTC, but there’s no guarantee it’s actually available.


Image: Victor Gevers/Twitter

Tens of thousands of poorly-configured MongoDB databases have been compromised over the past week, with attackers wiping data and demanding up to one bitcoin to return it.

Victor Gevers, from Netherlands-based GDI Foundation, and Niall Merrigan, a Norway-based developer, have been tracking a surge in attacks on MongoDB installations in which a handful of groups are wiping vulnerable databases and replacing them with an empty database with names such as a ‘WARNING’, ‘PWNED’, and ‘PLEASE_READ’.

ADVERTISEMENT

The attackers claim to hold a copy that can be purchased for between 0.2BTC and 1BTC, but there’s no guarantee the data is actually available if a payment is made.

According to Merrigan, some 27,000 MongoDB servers have been compromised in the past day, up from an estimated 2,000 on January 3 and 8,542 on January 5.

MongoDB is a popular open-source NoSQL database, widely used for big data and analytics. On the DB-Engines Ranking of database popularity it stands in fourth spot out of 315 systems, behind only Oracle, MySQL and Microsoft SQL Server.

At the current count, more than a quarter of the 99,000 MongoDB instances open to the internet have been compromised.

The ransom attackers are targeting low-hanging fruit, namely MongoDB instances that don’t have password-protected admin accounts.

The sudden spike in attacks may be attributed to copycat groups jostling for a slice of the action. The first recorded attacks occurred in mid-December with payments appearing to have been made to someone using the name, Harak1r1.

Now there are over a dozen groups using their own email address and bitcoin wallets, according to a spreadsheet maintained by Gevers and Merrigan. The most active attacker, Kraken0, has compromised 15,482 databases and is demanding 1BTC to return the wiped data.

The two researchers say they have assisted more than 100 organizations whose database have been hit by ransom attackers.

Merrigan told Bleeping Computer the MongoDB attacks were a “gold rush”, with different groups replacing each others’ ransom notes.

MongoDB’s director of product security, Andreas Nilsson, has published a list of actions admins can use to prevent the attacks. As with most ransomware attacks, Nilsson stressed the importance of backing up data.

“If you take regular backups of the compromised database, you can restore the most recent backup… If you don’t have a backup or are otherwise unable to restore the data, unfortunately your data may be permanently lost,” he wrote.

“You should assume that the attacker has a copy of all data from the affected database,” he added.

(via PCMag)

ADVERTISEMENT

ADVERTISEMENT
Just in:
Telecom Giant Du Eyes Crypto Integration for FinTech Platform // Dubai Gears Up for Second FinTech Summit as Funding Surges // Hong Kong Unveils April 30 Launch for Landmark Crypto ETFs // ESG Achievement Awards 2023/2024 is Open for Application, Celebrating Innovative Sustainable Practices and Responsible Risk Management // Congress in firefighting mode amid row over Pitroda remarks // UAE Scrutinizes Report on Racial Discrimination Treaty // Andertoons by Mark Anderson for Thu, 25 Apr 2024 // Quality HealthCare Partners with eHealth to Enhance Patient Treatment Efficiency // NetApp’s 2024 Cloud Complexity Report Reveals AI Disrupt or Die Era Unfolding Globally // Booming Region Fuels Innovation Surge // ZUHYX Exchange: Embracing Social Responsibility for a Sustainable Future // Election Commission Has A Dismal Record On Acting Against Modi’s Breaches Of Poll Code // Prince Holding Group’s Chen Zhi Scholarship Clinches Silver Stevie for CSR Excellence at Asia-Pacific Stevie Awards // Abu Dhabi Secures US$5 Billion in Fresh Funding // CBN Targets User Accounts // Cobb’s Game-Changer: Introducing One-Stop Event Transport Management Solution // UAE and Ecuador Set Course for Economic Pact // Lai & Turner Law Firm PLLC Welcomes Eric Strocen as Director of Family Law Division // Sharjah Census Gears Up for Final Enumeration Phase // PolyU forms global partnership with ZEISS Vision Care to expand impact and accelerate market penetration of patented myopia control technology //