Administrators should check their MongoDB deployments before they’re wiped clean Credit: Thinkstock Security researcher Victor Gevers, co-founder of the GDI Foundation, a non-profit dedicated to making the internet safer, is urging administrators to check their MongoDB installations, after finding nearly two hundred of them wiped and being held for ransom.Currently, as of Monday morning, Gevers says he’s discovered 196 instances of a MongoDB installation exposed to the public that’s been erased and held for ransom. Update: The count has reached nearly 2,000 databases as of 4:00 p.m.Update 2: As of 1/6/2017 the total count of compromised databases has surpassed 10,000.Two researchers are working on tracking the victims and the people responsible for the attacks. MongoDB has acknowledged the issue, and posted advice on their blog for administrators.Update 3: As of 1/8/2017 the total count of compromised databases has risen to 27,663 based on the counts in the tracker.Update 4: More than 100TB of data has been deleted from targeted MongoDB installs, according to John Matherly, the founder of Shodan and one of the researchers who has been following these attacks. The latest count is 28,698 databases compromised.Update 5: Looking at the stats, only seven of the 119 victims who have been assisted have paid the ransom. Of the victims who have been assisted, 85 of them were dealing with the loss of production assets and only 13 had recent backups.There are multiple actors conducting attacks on exposed databases, which serve a number of markets including broadcast media, gaming, financial services, healthcare, real estate, telecommunications, education, and more.As of 1:56 PM ET on January 10, there are 28,193 victims recorded in the tracking spreadsheet. This is slightly lower than it was earlier in the day, but the counts are fluid as new compromised installs emerge and the older ones are fixed.Update 6: As of 12:01 PM on January 11, the count is 32,820. Based on the Shodan numbers for public faced MongoDB installations (as of 1/09/17), 68.5 percent of them have been hacked since the start of the month. The person behind the attacks is demanding 0.2 BTC ($202.89 USD) as payment, and requiring system administrators email proof of ownership before the files are restored. Those without backups are left in a bind.Gevers has sent dozens of notifications to affected victims and on Twitter has responded to at least two requests for assistance after administrators learned of the issue. In each observed attack, the message remains the same – pay up or lose your data. It’s possible the attacker is finding open MongoDB installs via basic scanning or Shodan, Gevers said. It’s also possible they’re finding MongoDB installs that are vulnerable to various exploits, including one that allows remote authenticated users to obtain internal system privileges. If so, then administrators are caught in the middle of a rat race between Gevers and “Harak1r1” – the person responsible for the attacks. Asked for his thoughts and advice, Gevers shared the notification letter he is sending to identified victims. In it, he advises that they protect the MongoDB installs by blocking access to port 27017 or limit access to the server by binding local IPs. Administrators can also chose to restart the database with the “–auth” option, after they’ve assigned users access.In addition, he offers the following tips:Check the MongDB accounts to see if no one added a secret (admin) user. Check the GridFS to see if someone stored any files there. Check the logfiles to see who accessed the MongoDB (show log global command).“Criminals often target open databases to deploy their activities like data theft/ransom. But we also have seen cases were open servers like these are used for hosting malware (like ransomware), botnets and for hiding files in the GridFS,” the notification letter explains.In late 2015, there were approximately 35,000 MongoDB installations on the internet. Most of these installations were insecure and publicly available, and combined stored nearly 700 TB of data.Configuration errors in MongoDB have led to a number of major data breaches, including the Hello Kitty data breach that exposed 3.3 million people.A short time later, CSO Online was the first to report on the existence of an exposed MongoDB that contained 191 million voter records with the help of researcher Chris Vickery and Databreaches.net. This was followed by a story detailing the existence of a second voter database a week later. Last April, a poorly configured MongoDB installation exposed the personal details on 93 million Mexican voters.MongoDB is a favorite among some IT professionals, but if it isn’t configured properly and secured, this popular platform can be the source of a lot of pain within an organization. The official documentation for MongoDB contains a security checklist, and administrators are encouraged to follow it completely. Related content news analysis P2Pinfect Redis worm targets IoT with version for MIPS devices New versions of the worm include some novel approaches to infecting routers and internet-of-things devices, according to a report by Cado Security. By Lucian Constantin Dec 04, 2023 5 mins Botnets Botnets Botnets news Hackers book profit by scamming Booking.com customers Malicious elements are using Vidar infostealer to gain access to Booking.com’s management portal and defraud customers. By Gagandeep Kaur Dec 04, 2023 4 mins Cyberattacks Cybercrime Security opinion Proactive, not reactive: the path to ensuring operational resilience in cybersecurity The experience of the financial sector in dealing with threats is instructive to anyone in the cybersecurity space — there’s no substitute for getting out ahead of potential risks and problems. By Cameron Dicker Dec 04, 2023 6 mins Financial Services Industry Financial Services Industry Financial Services Industry feature 4 budget-savvy strategies for building an effective purple team Building a purple team is not only for organizations with a generous budget. From the shoestring one-person operation harnessing open-source power to the well-oiled machine of a comprehensive team, organizations of all sizes have a pathway to heighte By Maril Vernon Dec 04, 2023 14 mins Threat and Vulnerability Management IT Training Risk Management Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe