Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Data Protection

MongoDB Databases Actively Hijacked for Extortion

A hacker is attempting to monetize on MongoDB databases exposed to the Internet by hijacking them and demanding a ransom for the data, security researcher Victor Gevers has discovered.

A hacker is attempting to monetize on MongoDB databases exposed to the Internet by hijacking them and demanding a ransom for the data, security researcher Victor Gevers has discovered.

Going by the online handle of Harak1r1, the hacker searchers for insecure, exposed MongoDB databases and then attempts to compromise them. After accessing these databases, the attacker steals their content and denies access to it by replacing the databases with one called WARNING, containing one table with one record, both called WARNING too.

Victims are instructed to send 0.2 Bitcoins (BTC) to a specific Bitcoins address to recover their data. As it turns out, over a dozen companies have already paid the ransom.

“Send 0.2 BTC to this address 13zaxGVjj9MNc2jyvDRhLyYpkCh323MsMq and contact this email [[email protected]] with your IP of your server to recover your database!” the warning reads.

According to Victor Gevers, co-founder of GDI Foundation, a non-profit organization, the attackers might be using an automation tool, but they probably manually select the databases to target. Basically, the hackers appear interested only in those databases that contain important data, because the affected companies are more likely to pay the ransom to regain access to them.

“They use some sort of automation tool, but they also do some of the work manually. If they used a fully automated tool, we might have seen all exposed MongoDB databases being hijacked in one swift move,” Gevers told SecurityWeek.

The hijacking campaign is ongoing, with the number of attacked MongoDB databases growing fast, Gevers told us. It all started with what appeared to be an isolated incident just before Christmas, but the attack had already hit hundreds of databases several days later, and the researcher decided to post information about it online.

Yesterday, the number of compromised databases was of around 2000, but it has since grown to over 3500, the security researcher said. What’s more, Gevers discovered that companies are actually paying the ransom in an attempt to retrieve their data.

Advertisement. Scroll to continue reading.

Information available on Blockchain.info shows that the Bitcoin address used by the attacker has been constantly receiving payments for the past two weeks, and that the attackers are moving the money to other destinations. A total of 14 different payments were made to the address between December 21, 2016, and January 3, 2017.

“Searching for the compromised databases on Shodan this morning revealed that the number has grown significantly since yesterday. This is clearly a real-live attack happening right now, and companies are paying to retrieve their data” Gevers said.

Apparently, the attackers don’t care which countries the affected entites are from. Soon after the news broke, companies from the United States, United Kingdom, China, Finland, and other countries have confirmed such incidents, the researcher says. These organizations are from a variety of industries, including healthcare, Gevers also reveals.

The researcher points out that this incident once again proves that MongoDB databases exposed to the Internet represent a major vulnerability for companies. Such databases, he explains, have long been abused for malicious purposes, even vandalism.

“However, this is the first time we encounter a situation where an exposed database is held for ransom,” Gevers continued.

To put things into perspective, there are over 30,000 MongoDB installations on the web, most believed to be insecure and publicly available. Gevers, who has been searching for insecure databases for years, has sent thousands of responsible disclosure emails to the affected companies, but never before warned about their databases being used for extortion.

The exposed databases allow unauthenticated connections via port 27017, meaning that anyone can access them with full admin rights, thus being able to create, read, update and delete records. Usually, Gevers warns companies that insecure databases can be used to host malware or botnets, or for hiding files in the GridFS. Now, he also warns them that databases could be held for ransom.

“Our advice would be to protect this server with a firewall blocking port 27017 or limit the access of the service with bind_ip to only accept local connections as option in the configuration. Or you can choose to restart the database server with -auth option after you create users who can access the database,” Gerves tells affected companies.

Related: Misconfigured Database Exposed Microsoft Site to Attacks

Related: Misconfigured Database Exposes Details of 191 Million Voters

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

Professional services company Slalom has appointed Christopher Burger as its first CISO.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.

Compliance

The three primary drivers for cyber regulations are voter privacy, the economy, and national security – with the complication that the first is often...

Data Protection

While quantum-based attacks are still in the future, organizations must think about how to defend data in transit when encryption no longer works.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Cybersecurity Funding

Los Gatos, Calif-based data protection and privacy firm Titaniam has raised $6 million seed funding from Refinery Ventures, with participation from Fusion Fund, Shasta...