SlideShare uma empresa Scribd logo
1 de 3
Ignorance is bliss, but not for MongoDB
The database management system MongoDB is currently being downloaded at an impressive rate: approximately
30 000 times per day. Widely spread, this open source software is today the talk of the town because of a
hacking wave that, according to some, was to be expected sooner or later.
In 2015, the Hackernews website was the first to raise concern about and its security flaws. Over 600 TB of data
hosted by the NoSQL database were identified as being accessible without a password. Yes, you read that
correctly. « These MongoDB instances weren’t exposed due to any flaw in its software, but due to a
misconfiguration (bad security practice) that let any remote attacker access MongoDB databases without using
any special hacking tool. », added the website.
Not long after, MongoDB published a new software version of its database. The latest version 3.4 enables
administrators to actually activate the authentication feature on the unprotected systems. But, as it was to be
expected, the majority of admins most likely didn’t catch the news concerning the additional security features
of the available updates. It’s also possible that some of them find a migration process bothersome (to upgrade
from a 2.7 version to a 3.X can be delicate). Regardless of their reasons though, this particular segment of
MongoDB users is now being targeted by an unforgiving hacking pandemic.
Last December, security researcher Victor Gevers sounded the second alarm for MongoDB, announcing that the
danger had officially evolved from the state of « potential threat » to « full-blown ongoing attack ». According
to Gevers, it seems as though cybercriminals were the only ones to take his warning into account.
The outbreak all started with a group dubbed « harak1r1 » which is actively targeting all administrators having
not updated MongoDB. What remains hugely impressive in this case is just how the numbers progressed in less
than two weeks. On January 3rd, 2 000 databases had been seized by « harak1r1 ». Now, according to Gevers
and another fellow security researcher, Niall Merrigan, the stats show today almost 34 000 infected databases.
This sudden increase is also due to rising number of criminal groups seizing this opportunity. Like bees to
honey, more than 20 groups are involved today in the MongoDB heist. And who can blame them? It seems
pretty easy to exploit the software’s misconfiguration.
One the most “successful” group is Kraken. Kraken alone has managed to gather an impressive number of 21
000 MongoDB databases.
Another ransomware? Uhm, not really...
The media are advertising these incidents as ransomware attacks, but that’s not the case for all of the groups. Indeed,
Krakendoesn’tencryptyourdata,neitherdoesitlaunchamaliciouspayloadlikethe restof thisseason’smalware(read
our previousarticle onPopcornTime here).No,these hackersactuallyuse a script that replacesdatabase contentwith
the ransom request. In other words, they export the content of unsecured MongoDB instancesin order to then erase
the found data and drop instead a file containing the ransom content.
A basic script should look something like this:
> mongodump --host <targetHost> --out data
> mongo --host <targetHost> dbName
> db.dropDatabase()
> db.bitcoins.insert({"bitcoin Address": "XXXX", "message": "You have been pwned. Give us 1 BTC.", email: "btc@gift.xx"
})
Of course, we are simplifying things to a great extent here. But it remains true that, if the database can be accessed
without first logging in, one can easily launch the above mentioned script.
But all goodthingscome to those that...pay, right?False.AccordingtoGeversandMerrigan,some of the cybercriminal
groupsinvolvedare quite happywithjustdeletingthe filesfound,renderingall datahostage rescuingoperationsfutile.
Unfortunately,morethan88enterprisestodatahave alreadypaidtherequestedpriceand12of themhave yettoreceive
a response (or their data, for that matter).
Cybersecurity experts also note that these groups are also competing with each other at the same time. And what a
ruthless fight it is. Some hackers even delete existing scripts containing ransom demands. Between you and us, this
doesn’t exactly inspire trust. Victims could then easily find themselves in the situation that the bitcoins they just
transferred were sent to a hacking group that doesn’t even have their data.
However, looking over the stats, it becomes clear that cybercriminals cannot endlessly benefit from MongoDB’s
weakness. According to John Matherly, the founder of Shodan, almost 50 000 MongoDB servers are exposed to the
Internet,while more thanahalf have alreadybeeninfected.Thatbeingsaid,hackershaveagainfoundthe loopholethat
rendersthe situationintheirfavor.Take,forinstance,Kraken –thathasmade a profitof over9000 bitcoins(or7million
euro) in the last couple of weeks. The latter didn’t just stop there, it also put its script up for sale in order to make the
most out of a temporary situation.
Source:BleepingComputer
Don’t be surprised! If you leave the door cracked...
...hackers will definitely invite themselves in.
AndreasNilsson,ProductSecurityResponsible atMongoDB,explainshow administratorscanmanage to avoidthistype
of attack: “These hacks can be avoided thanks to the numerous security measures integrated within MongoDB. Our
security manual is there to help you use these safety features correctly.”
Thismightcome as a surprise to some of you,but MongoDB isno more lesssecure thana MySQL database:« It’sin the
nature of a database software torenderoptionalcertainfeatures.Thisisnottrue onlyinthe case of MongoDB »,stated
a spokesperson in New York.
Evenso, certainactorspresentinthe cyber-landscape didnothesitate toharshlycriticizethe leaf-company.Appalledat
the recent events, Chris Wysopal, Director of Technology for Veracode, doesn’t agree at all with this product
development approach. The latter attempted to underline the need to secure a software from the moment it is being
first conceived on Twitter:
It seems we’ve hit a bump in the road, as public opinion is divided: should we enable the popularization of a quick &
simple tool,despite its security shortcomings? Or should we instead focus on developing tools that are more complex,
more secure, with a restrictive configuration, disregarding the need for a fast and painless deployment?
That aside,the importantthingrightnowis to determine whetherornot you’ve alreadybeenhacked.It’seasierthanit
sounds, trust us. You can do this by simply following these 3 steps:
1. Check your MongoDB for an unknown admin account that may have been recently added;
2. CheckGridFS,the tool that enablesyouto use MongoDB as a file manager,tosee if anyunknownfileswere recently
added, not as a result of your own doing;
3. Check the logs in order to make sure that your MongoDB instances were not accessed by a foreign machine.
If,bysome strike of luck,yoursisnotamongthe 34 000 compromisedservers,youshouldknow thatthe situation(ifleft
unchanged) is subject to change in the very near future. If this chain of so-called ransomware was possible, it’s only
because there are still individuals out there in denial of the true value of cybersecurity best practices.
Here are a couple of steps you might find useful:
1. Update your MongoDB to the latest version;
2. Disconnect the remote control feature for your database (if possible);
3. Block the default port of MongoDB;
4. Configure Bind_ip in order to limit the access to the server by linking local IP addresses.
Link: https://www.reveelium.com/en/ignorance-bliss-not-for-mongodb/
https://www.reveelium.com/en/cisco-webex-vulnerability-its-a-kind-of-magic/

Mais conteúdo relacionado

Mais procurados

Big Data Startups - Top Visualization and Data Analytics Startups
Big Data Startups - Top Visualization and Data Analytics StartupsBig Data Startups - Top Visualization and Data Analytics Startups
Big Data Startups - Top Visualization and Data Analytics Startupswallesplace
 
Socialytics: Convergence of Social, Big Data, Analytics
Socialytics:   Convergence of Social, Big Data, AnalyticsSocialytics:   Convergence of Social, Big Data, Analytics
Socialytics: Convergence of Social, Big Data, AnalyticsSandy Carter
 
20 Red Hot, Pre-IPO Companies in 2014 B2B Tech
20 Red Hot, Pre-IPO Companies in 2014 B2B Tech20 Red Hot, Pre-IPO Companies in 2014 B2B Tech
20 Red Hot, Pre-IPO Companies in 2014 B2B TechIDG Connect
 
Introduction: Real-Time Analytics on Data in Motion
Introduction: Real-Time Analytics on Data in MotionIntroduction: Real-Time Analytics on Data in Motion
Introduction: Real-Time Analytics on Data in MotionAvadhoot Patwardhan
 
The New Convergence of Data; the Next Strategic Business Advantage
The New Convergence of Data; the Next Strategic Business AdvantageThe New Convergence of Data; the Next Strategic Business Advantage
The New Convergence of Data; the Next Strategic Business AdvantageJoAnna Cheshire
 
Enabling Big Data with Data-Level Security:The Cloud Analytics Reference Arch...
Enabling Big Data with Data-Level Security:The Cloud Analytics Reference Arch...Enabling Big Data with Data-Level Security:The Cloud Analytics Reference Arch...
Enabling Big Data with Data-Level Security:The Cloud Analytics Reference Arch...Booz Allen Hamilton
 
Virtual Gov Day - Introduction & Keynote - Alan Webber, IDC Government Insights
Virtual Gov Day - Introduction & Keynote - Alan Webber, IDC Government InsightsVirtual Gov Day - Introduction & Keynote - Alan Webber, IDC Government Insights
Virtual Gov Day - Introduction & Keynote - Alan Webber, IDC Government InsightsSplunk
 
Should we fear the cloud?
Should we fear the cloud?Should we fear the cloud?
Should we fear the cloud?Gabe Akisanmi
 
Cloud Computing: Big Data Technology
Cloud Computing: Big Data TechnologyCloud Computing: Big Data Technology
Cloud Computing: Big Data TechnologyBooz Allen Hamilton
 
The New Convergence of Data; The Next Strategic Business Advantage
The New Convergence of Data; The Next Strategic Business AdvantageThe New Convergence of Data; The Next Strategic Business Advantage
The New Convergence of Data; The Next Strategic Business AdvantageJoAnna Cheshire
 
Big Data and Analytics: The IBM Perspective
Big Data and Analytics: The IBM PerspectiveBig Data and Analytics: The IBM Perspective
Big Data and Analytics: The IBM PerspectiveThe_IPA
 
BBDO Proximity: Big-data May 2013
BBDO Proximity: Big-data May 2013BBDO Proximity: Big-data May 2013
BBDO Proximity: Big-data May 2013Brian Crotty
 
Big Data & Future - Big Data, Analytics, Cloud, SDN, Internet of things
Big Data & Future - Big Data, Analytics, Cloud, SDN, Internet of thingsBig Data & Future - Big Data, Analytics, Cloud, SDN, Internet of things
Big Data & Future - Big Data, Analytics, Cloud, SDN, Internet of thingsRamakant Gawande
 
Customer Centric Innovation in a World of Shiny Objects-Dallas
Customer Centric Innovation in a World of Shiny Objects-DallasCustomer Centric Innovation in a World of Shiny Objects-Dallas
Customer Centric Innovation in a World of Shiny Objects-DallasJoAnna Cheshire
 
Big Data Tutorial For Beginners | What Is Big Data | Big Data Tutorial | Hado...
Big Data Tutorial For Beginners | What Is Big Data | Big Data Tutorial | Hado...Big Data Tutorial For Beginners | What Is Big Data | Big Data Tutorial | Hado...
Big Data Tutorial For Beginners | What Is Big Data | Big Data Tutorial | Hado...Edureka!
 
Predictive Enterprise Strategic Overview
Predictive Enterprise Strategic OverviewPredictive Enterprise Strategic Overview
Predictive Enterprise Strategic OverviewSteven Gorenbergh
 
Beyond Headsets: The Rise of Augmented Business Reality
Beyond Headsets: The Rise of Augmented Business Reality Beyond Headsets: The Rise of Augmented Business Reality
Beyond Headsets: The Rise of Augmented Business Reality JoAnna Cheshire
 

Mais procurados (18)

Big data basics
Big data basicsBig data basics
Big data basics
 
Big Data Startups - Top Visualization and Data Analytics Startups
Big Data Startups - Top Visualization and Data Analytics StartupsBig Data Startups - Top Visualization and Data Analytics Startups
Big Data Startups - Top Visualization and Data Analytics Startups
 
Socialytics: Convergence of Social, Big Data, Analytics
Socialytics:   Convergence of Social, Big Data, AnalyticsSocialytics:   Convergence of Social, Big Data, Analytics
Socialytics: Convergence of Social, Big Data, Analytics
 
20 Red Hot, Pre-IPO Companies in 2014 B2B Tech
20 Red Hot, Pre-IPO Companies in 2014 B2B Tech20 Red Hot, Pre-IPO Companies in 2014 B2B Tech
20 Red Hot, Pre-IPO Companies in 2014 B2B Tech
 
Introduction: Real-Time Analytics on Data in Motion
Introduction: Real-Time Analytics on Data in MotionIntroduction: Real-Time Analytics on Data in Motion
Introduction: Real-Time Analytics on Data in Motion
 
The New Convergence of Data; the Next Strategic Business Advantage
The New Convergence of Data; the Next Strategic Business AdvantageThe New Convergence of Data; the Next Strategic Business Advantage
The New Convergence of Data; the Next Strategic Business Advantage
 
Enabling Big Data with Data-Level Security:The Cloud Analytics Reference Arch...
Enabling Big Data with Data-Level Security:The Cloud Analytics Reference Arch...Enabling Big Data with Data-Level Security:The Cloud Analytics Reference Arch...
Enabling Big Data with Data-Level Security:The Cloud Analytics Reference Arch...
 
Virtual Gov Day - Introduction & Keynote - Alan Webber, IDC Government Insights
Virtual Gov Day - Introduction & Keynote - Alan Webber, IDC Government InsightsVirtual Gov Day - Introduction & Keynote - Alan Webber, IDC Government Insights
Virtual Gov Day - Introduction & Keynote - Alan Webber, IDC Government Insights
 
Should we fear the cloud?
Should we fear the cloud?Should we fear the cloud?
Should we fear the cloud?
 
Cloud Computing: Big Data Technology
Cloud Computing: Big Data TechnologyCloud Computing: Big Data Technology
Cloud Computing: Big Data Technology
 
The New Convergence of Data; The Next Strategic Business Advantage
The New Convergence of Data; The Next Strategic Business AdvantageThe New Convergence of Data; The Next Strategic Business Advantage
The New Convergence of Data; The Next Strategic Business Advantage
 
Big Data and Analytics: The IBM Perspective
Big Data and Analytics: The IBM PerspectiveBig Data and Analytics: The IBM Perspective
Big Data and Analytics: The IBM Perspective
 
BBDO Proximity: Big-data May 2013
BBDO Proximity: Big-data May 2013BBDO Proximity: Big-data May 2013
BBDO Proximity: Big-data May 2013
 
Big Data & Future - Big Data, Analytics, Cloud, SDN, Internet of things
Big Data & Future - Big Data, Analytics, Cloud, SDN, Internet of thingsBig Data & Future - Big Data, Analytics, Cloud, SDN, Internet of things
Big Data & Future - Big Data, Analytics, Cloud, SDN, Internet of things
 
Customer Centric Innovation in a World of Shiny Objects-Dallas
Customer Centric Innovation in a World of Shiny Objects-DallasCustomer Centric Innovation in a World of Shiny Objects-Dallas
Customer Centric Innovation in a World of Shiny Objects-Dallas
 
Big Data Tutorial For Beginners | What Is Big Data | Big Data Tutorial | Hado...
Big Data Tutorial For Beginners | What Is Big Data | Big Data Tutorial | Hado...Big Data Tutorial For Beginners | What Is Big Data | Big Data Tutorial | Hado...
Big Data Tutorial For Beginners | What Is Big Data | Big Data Tutorial | Hado...
 
Predictive Enterprise Strategic Overview
Predictive Enterprise Strategic OverviewPredictive Enterprise Strategic Overview
Predictive Enterprise Strategic Overview
 
Beyond Headsets: The Rise of Augmented Business Reality
Beyond Headsets: The Rise of Augmented Business Reality Beyond Headsets: The Rise of Augmented Business Reality
Beyond Headsets: The Rise of Augmented Business Reality
 

Destaque

What is A Cloud Stack in 2017
What is A Cloud Stack in 2017What is A Cloud Stack in 2017
What is A Cloud Stack in 2017Gaurav Roy
 
Design in Tech Report 2017
Design in Tech Report 2017Design in Tech Report 2017
Design in Tech Report 2017John Maeda
 
AgensGraph: a Multi-model Graph Database based on PostgreSql
AgensGraph: a Multi-model Graph Database based on PostgreSqlAgensGraph: a Multi-model Graph Database based on PostgreSql
AgensGraph: a Multi-model Graph Database based on PostgreSqlKisung Kim
 
Mobile Finance: 2017 Trends and Innovations
Mobile Finance: 2017 Trends and InnovationsMobile Finance: 2017 Trends and Innovations
Mobile Finance: 2017 Trends and InnovationsCorporate Insight
 
Startup Sales Stack Report 2017
Startup Sales Stack Report 2017Startup Sales Stack Report 2017
Startup Sales Stack Report 2017Nic Poulos
 
A project report on awareness of mutual funds 1
A project report on awareness of mutual funds 1A project report on awareness of mutual funds 1
A project report on awareness of mutual funds 1Nirali Nayi
 
IBM Storage for Analytics, Cognitive and Cloud
IBM Storage for Analytics, Cognitive and CloudIBM Storage for Analytics, Cognitive and Cloud
IBM Storage for Analytics, Cognitive and CloudTony Pearson
 
Comparing 30 MongoDB operations with Oracle SQL statements
Comparing 30 MongoDB operations with Oracle SQL statementsComparing 30 MongoDB operations with Oracle SQL statements
Comparing 30 MongoDB operations with Oracle SQL statementsLucas Jellema
 
Europe ai scaleups report 2016
Europe ai scaleups report 2016Europe ai scaleups report 2016
Europe ai scaleups report 2016Omar Mohout
 
Sudhir hadoop and Data warehousing resume
Sudhir hadoop and Data warehousing resume Sudhir hadoop and Data warehousing resume
Sudhir hadoop and Data warehousing resume Sudhir Saxena
 
Europa AI startup scaleups report 2016
Europa AI startup scaleups report 2016 Europa AI startup scaleups report 2016
Europa AI startup scaleups report 2016 Ian Beckett
 
DATA SCIENCE IS CATALYZING BUSINESS AND INNOVATION
DATA SCIENCE IS CATALYZING BUSINESS AND INNOVATION DATA SCIENCE IS CATALYZING BUSINESS AND INNOVATION
DATA SCIENCE IS CATALYZING BUSINESS AND INNOVATION Elvis Muyanja
 
Comparing approaches: Running database workloads on Dell EMC and Microsoft hy...
Comparing approaches: Running database workloads on Dell EMC and Microsoft hy...Comparing approaches: Running database workloads on Dell EMC and Microsoft hy...
Comparing approaches: Running database workloads on Dell EMC and Microsoft hy...Principled Technologies
 
Best Practices for Reaching and Engaging Your Mobile Audience
Best Practices for Reaching and Engaging Your Mobile AudienceBest Practices for Reaching and Engaging Your Mobile Audience
Best Practices for Reaching and Engaging Your Mobile AudienceOrigami Logic
 
Lessons & Use-Cases at Scale - Dr. Pete Stanski
Lessons & Use-Cases at Scale - Dr. Pete StanskiLessons & Use-Cases at Scale - Dr. Pete Stanski
Lessons & Use-Cases at Scale - Dr. Pete StanskiAmazon Web Services
 

Destaque (20)

What is A Cloud Stack in 2017
What is A Cloud Stack in 2017What is A Cloud Stack in 2017
What is A Cloud Stack in 2017
 
Design in Tech Report 2017
Design in Tech Report 2017Design in Tech Report 2017
Design in Tech Report 2017
 
The Benefits of Cloud Computing
The Benefits of Cloud ComputingThe Benefits of Cloud Computing
The Benefits of Cloud Computing
 
AgensGraph: a Multi-model Graph Database based on PostgreSql
AgensGraph: a Multi-model Graph Database based on PostgreSqlAgensGraph: a Multi-model Graph Database based on PostgreSql
AgensGraph: a Multi-model Graph Database based on PostgreSql
 
Mobile Finance: 2017 Trends and Innovations
Mobile Finance: 2017 Trends and InnovationsMobile Finance: 2017 Trends and Innovations
Mobile Finance: 2017 Trends and Innovations
 
Startup Sales Stack Report 2017
Startup Sales Stack Report 2017Startup Sales Stack Report 2017
Startup Sales Stack Report 2017
 
Getting Started with AWS
Getting Started with AWSGetting Started with AWS
Getting Started with AWS
 
A project report on awareness of mutual funds 1
A project report on awareness of mutual funds 1A project report on awareness of mutual funds 1
A project report on awareness of mutual funds 1
 
IBM Storage for Analytics, Cognitive and Cloud
IBM Storage for Analytics, Cognitive and CloudIBM Storage for Analytics, Cognitive and Cloud
IBM Storage for Analytics, Cognitive and Cloud
 
Comparing 30 MongoDB operations with Oracle SQL statements
Comparing 30 MongoDB operations with Oracle SQL statementsComparing 30 MongoDB operations with Oracle SQL statements
Comparing 30 MongoDB operations with Oracle SQL statements
 
S4 1610 business value l1
S4 1610 business value l1S4 1610 business value l1
S4 1610 business value l1
 
Europe ai scaleups report 2016
Europe ai scaleups report 2016Europe ai scaleups report 2016
Europe ai scaleups report 2016
 
Sudhir hadoop and Data warehousing resume
Sudhir hadoop and Data warehousing resume Sudhir hadoop and Data warehousing resume
Sudhir hadoop and Data warehousing resume
 
Europa AI startup scaleups report 2016
Europa AI startup scaleups report 2016 Europa AI startup scaleups report 2016
Europa AI startup scaleups report 2016
 
Databases
DatabasesDatabases
Databases
 
DATA SCIENCE IS CATALYZING BUSINESS AND INNOVATION
DATA SCIENCE IS CATALYZING BUSINESS AND INNOVATION DATA SCIENCE IS CATALYZING BUSINESS AND INNOVATION
DATA SCIENCE IS CATALYZING BUSINESS AND INNOVATION
 
Comparing approaches: Running database workloads on Dell EMC and Microsoft hy...
Comparing approaches: Running database workloads on Dell EMC and Microsoft hy...Comparing approaches: Running database workloads on Dell EMC and Microsoft hy...
Comparing approaches: Running database workloads on Dell EMC and Microsoft hy...
 
Best Practices for Reaching and Engaging Your Mobile Audience
Best Practices for Reaching and Engaging Your Mobile AudienceBest Practices for Reaching and Engaging Your Mobile Audience
Best Practices for Reaching and Engaging Your Mobile Audience
 
Keynote & Introduction
Keynote & IntroductionKeynote & Introduction
Keynote & Introduction
 
Lessons & Use-Cases at Scale - Dr. Pete Stanski
Lessons & Use-Cases at Scale - Dr. Pete StanskiLessons & Use-Cases at Scale - Dr. Pete Stanski
Lessons & Use-Cases at Scale - Dr. Pete Stanski
 

Semelhante a Ignorance is bliss, but not for MongoDB

Networking 2016-05-24 - Topic 1- Cybereason Lab Analysis by Brad Green
Networking 2016-05-24 - Topic 1- Cybereason Lab Analysis by Brad Green Networking 2016-05-24 - Topic 1- Cybereason Lab Analysis by Brad Green
Networking 2016-05-24 - Topic 1- Cybereason Lab Analysis by Brad Green North Texas Chapter of the ISSA
 
Eset trends report_2018
Eset trends report_2018Eset trends report_2018
Eset trends report_2018malvvv
 
Cybersecurity Trends 2018: The costs of connection
Cybersecurity Trends 2018: The costs of connectionCybersecurity Trends 2018: The costs of connection
Cybersecurity Trends 2018: The costs of connectionESET Middle East
 
Ransomware (1).pdf
Ransomware (1).pdfRansomware (1).pdf
Ransomware (1).pdfHiYeti1
 
targeted-data-breach-bulletin-sept
targeted-data-breach-bulletin-septtargeted-data-breach-bulletin-sept
targeted-data-breach-bulletin-sept*****Dominic A Ienco
 
Open Source Insight: Artifex Ruling, NY Cybersecurity Regs, PATCH Act, & Wan...
Open Source Insight: Artifex Ruling, NY Cybersecurity Regs,  PATCH Act, & Wan...Open Source Insight: Artifex Ruling, NY Cybersecurity Regs,  PATCH Act, & Wan...
Open Source Insight: Artifex Ruling, NY Cybersecurity Regs, PATCH Act, & Wan...Black Duck by Synopsys
 
Insight Brief: Security Analytics to Identify the 12 Indicators of Compromise
Insight Brief: Security Analytics to Identify the 12 Indicators of CompromiseInsight Brief: Security Analytics to Identify the 12 Indicators of Compromise
Insight Brief: Security Analytics to Identify the 12 Indicators of Compromise21CT Inc.
 
Analysis of RSA Lockheed Martin Attack
Analysis of RSA Lockheed Martin AttackAnalysis of RSA Lockheed Martin Attack
Analysis of RSA Lockheed Martin AttackGavin Davey
 
EXTERNAL - Whitepaper - How 3 Cyber ThreatsTransform Incident Response 081516
EXTERNAL - Whitepaper - How 3 Cyber ThreatsTransform Incident Response 081516EXTERNAL - Whitepaper - How 3 Cyber ThreatsTransform Incident Response 081516
EXTERNAL - Whitepaper - How 3 Cyber ThreatsTransform Incident Response 081516Yasser Mohammed
 
cyber attacks in May , breaches in May
cyber attacks in May , breaches in Maycyber attacks in May , breaches in May
cyber attacks in May , breaches in MaySathish Kumar K
 
Websense security prediction 2014
Websense   security prediction 2014Websense   security prediction 2014
Websense security prediction 2014Bee_Ware
 
Sophos security-threat-report-2014-na
Sophos security-threat-report-2014-naSophos security-threat-report-2014-na
Sophos security-threat-report-2014-naAndreas Hiller
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Securitybelsis
 
A Survey of Keylogger in Cybersecurity Education
A Survey of Keylogger in Cybersecurity EducationA Survey of Keylogger in Cybersecurity Education
A Survey of Keylogger in Cybersecurity Educationijtsrd
 
Sophos Security Threat Report 2014
Sophos Security Threat Report 2014Sophos Security Threat Report 2014
Sophos Security Threat Report 2014- Mark - Fullbright
 
We explain the security flaw that's freaking out the internet
We explain the security flaw that's freaking out the internetWe explain the security flaw that's freaking out the internet
We explain the security flaw that's freaking out the internetaditi agarwal
 
Challenges and Risks of Web 3.0 — A New Digital World Order
Challenges and Risks of Web 3.0 — A New Digital World OrderChallenges and Risks of Web 3.0 — A New Digital World Order
Challenges and Risks of Web 3.0 — A New Digital World OrderMindfire LLC
 

Semelhante a Ignorance is bliss, but not for MongoDB (20)

Networking 2016-05-24 - Topic 1- Cybereason Lab Analysis by Brad Green
Networking 2016-05-24 - Topic 1- Cybereason Lab Analysis by Brad Green Networking 2016-05-24 - Topic 1- Cybereason Lab Analysis by Brad Green
Networking 2016-05-24 - Topic 1- Cybereason Lab Analysis by Brad Green
 
Eset trends report_2018
Eset trends report_2018Eset trends report_2018
Eset trends report_2018
 
Cybersecurity Trends 2018: The costs of connection
Cybersecurity Trends 2018: The costs of connectionCybersecurity Trends 2018: The costs of connection
Cybersecurity Trends 2018: The costs of connection
 
Ransomware (1).pdf
Ransomware (1).pdfRansomware (1).pdf
Ransomware (1).pdf
 
targeted-data-breach-bulletin-sept
targeted-data-breach-bulletin-septtargeted-data-breach-bulletin-sept
targeted-data-breach-bulletin-sept
 
News Bytes - December 2015
News Bytes - December 2015News Bytes - December 2015
News Bytes - December 2015
 
Open Source Insight: Artifex Ruling, NY Cybersecurity Regs, PATCH Act, & Wan...
Open Source Insight: Artifex Ruling, NY Cybersecurity Regs,  PATCH Act, & Wan...Open Source Insight: Artifex Ruling, NY Cybersecurity Regs,  PATCH Act, & Wan...
Open Source Insight: Artifex Ruling, NY Cybersecurity Regs, PATCH Act, & Wan...
 
Insight Brief: Security Analytics to Identify the 12 Indicators of Compromise
Insight Brief: Security Analytics to Identify the 12 Indicators of CompromiseInsight Brief: Security Analytics to Identify the 12 Indicators of Compromise
Insight Brief: Security Analytics to Identify the 12 Indicators of Compromise
 
Analysis of RSA Lockheed Martin Attack
Analysis of RSA Lockheed Martin AttackAnalysis of RSA Lockheed Martin Attack
Analysis of RSA Lockheed Martin Attack
 
What Businesses Entrepreneurs Are Imperative To Know About Ransomware
What Businesses Entrepreneurs Are Imperative To Know About RansomwareWhat Businesses Entrepreneurs Are Imperative To Know About Ransomware
What Businesses Entrepreneurs Are Imperative To Know About Ransomware
 
EXTERNAL - Whitepaper - How 3 Cyber ThreatsTransform Incident Response 081516
EXTERNAL - Whitepaper - How 3 Cyber ThreatsTransform Incident Response 081516EXTERNAL - Whitepaper - How 3 Cyber ThreatsTransform Incident Response 081516
EXTERNAL - Whitepaper - How 3 Cyber ThreatsTransform Incident Response 081516
 
cyber attacks in May , breaches in May
cyber attacks in May , breaches in Maycyber attacks in May , breaches in May
cyber attacks in May , breaches in May
 
Websense security prediction 2014
Websense   security prediction 2014Websense   security prediction 2014
Websense security prediction 2014
 
Sophos security-threat-report-2014-na
Sophos security-threat-report-2014-naSophos security-threat-report-2014-na
Sophos security-threat-report-2014-na
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
 
Cyber ppt
Cyber pptCyber ppt
Cyber ppt
 
A Survey of Keylogger in Cybersecurity Education
A Survey of Keylogger in Cybersecurity EducationA Survey of Keylogger in Cybersecurity Education
A Survey of Keylogger in Cybersecurity Education
 
Sophos Security Threat Report 2014
Sophos Security Threat Report 2014Sophos Security Threat Report 2014
Sophos Security Threat Report 2014
 
We explain the security flaw that's freaking out the internet
We explain the security flaw that's freaking out the internetWe explain the security flaw that's freaking out the internet
We explain the security flaw that's freaking out the internet
 
Challenges and Risks of Web 3.0 — A New Digital World Order
Challenges and Risks of Web 3.0 — A New Digital World OrderChallenges and Risks of Web 3.0 — A New Digital World Order
Challenges and Risks of Web 3.0 — A New Digital World Order
 

Mais de ITrust - Cybersecurity as a Service

L’Intelligence Artificielle : un ‘booster’ pour la cybersécurité
L’Intelligence Artificielle : un ‘booster’ pour la cybersécuritéL’Intelligence Artificielle : un ‘booster’ pour la cybersécurité
L’Intelligence Artificielle : un ‘booster’ pour la cybersécuritéITrust - Cybersecurity as a Service
 
Quand les cybercriminels n’ont plus besoin de fuir les logiciels de sécurité
Quand les cybercriminels n’ont plus besoin de fuir les logiciels de sécuritéQuand les cybercriminels n’ont plus besoin de fuir les logiciels de sécurité
Quand les cybercriminels n’ont plus besoin de fuir les logiciels de sécuritéITrust - Cybersecurity as a Service
 
Artificial intelligence and machine learning: ultimate game changers
Artificial intelligence and machine learning: ultimate game changersArtificial intelligence and machine learning: ultimate game changers
Artificial intelligence and machine learning: ultimate game changersITrust - Cybersecurity as a Service
 
Passer de la détection d’anomalies à la détection de menaces
Passer de la détection d’anomalies à la détection de menacesPasser de la détection d’anomalies à la détection de menaces
Passer de la détection d’anomalies à la détection de menacesITrust - Cybersecurity as a Service
 
Meet anomaly detection: a powerful cybersecurity defense mechanism when its w...
Meet anomaly detection: a powerful cybersecurity defense mechanism when its w...Meet anomaly detection: a powerful cybersecurity defense mechanism when its w...
Meet anomaly detection: a powerful cybersecurity defense mechanism when its w...ITrust - Cybersecurity as a Service
 

Mais de ITrust - Cybersecurity as a Service (20)

IT security : a five-legged sheep
IT security : a five-legged sheepIT security : a five-legged sheep
IT security : a five-legged sheep
 
Petya, pire que WannaCry ?
Petya, pire que WannaCry ?Petya, pire que WannaCry ?
Petya, pire que WannaCry ?
 
L’Intelligence Artificielle : un ‘booster’ pour la cybersécurité
L’Intelligence Artificielle : un ‘booster’ pour la cybersécuritéL’Intelligence Artificielle : un ‘booster’ pour la cybersécurité
L’Intelligence Artificielle : un ‘booster’ pour la cybersécurité
 
Manifeste ResistanceCYBER 29.05.17
Manifeste ResistanceCYBER 29.05.17Manifeste ResistanceCYBER 29.05.17
Manifeste ResistanceCYBER 29.05.17
 
Advanced persistent threats, entre mythe et réalité
Advanced persistent threats, entre mythe et réalitéAdvanced persistent threats, entre mythe et réalité
Advanced persistent threats, entre mythe et réalité
 
Quand les cybercriminels n’ont plus besoin de fuir les logiciels de sécurité
Quand les cybercriminels n’ont plus besoin de fuir les logiciels de sécuritéQuand les cybercriminels n’ont plus besoin de fuir les logiciels de sécurité
Quand les cybercriminels n’ont plus besoin de fuir les logiciels de sécurité
 
Artificial intelligence and machine learning: ultimate game changers
Artificial intelligence and machine learning: ultimate game changersArtificial intelligence and machine learning: ultimate game changers
Artificial intelligence and machine learning: ultimate game changers
 
Manifeste ResistanceCYBER 19.05.17
Manifeste ResistanceCYBER 19.05.17Manifeste ResistanceCYBER 19.05.17
Manifeste ResistanceCYBER 19.05.17
 
Manifeste ResistanceCYBER 18.05.17
Manifeste ResistanceCYBER 18.05.17Manifeste ResistanceCYBER 18.05.17
Manifeste ResistanceCYBER 18.05.17
 
Manifeste ResistanceCYBER 17.05.17
Manifeste ResistanceCYBER 17.05.17Manifeste ResistanceCYBER 17.05.17
Manifeste ResistanceCYBER 17.05.17
 
Manifeste ResistanceCYBER 15.05.17
Manifeste ResistanceCYBER 15.05.17Manifeste ResistanceCYBER 15.05.17
Manifeste ResistanceCYBER 15.05.17
 
Passer de la détection d’anomalies à la détection de menaces
Passer de la détection d’anomalies à la détection de menacesPasser de la détection d’anomalies à la détection de menaces
Passer de la détection d’anomalies à la détection de menaces
 
Meet anomaly detection: a powerful cybersecurity defense mechanism when its w...
Meet anomaly detection: a powerful cybersecurity defense mechanism when its w...Meet anomaly detection: a powerful cybersecurity defense mechanism when its w...
Meet anomaly detection: a powerful cybersecurity defense mechanism when its w...
 
L’étrange histoire d’un piratage en Angleterre
L’étrange histoire d’un piratage en AngleterreL’étrange histoire d’un piratage en Angleterre
L’étrange histoire d’un piratage en Angleterre
 
Cisco WebEx vulnerability: it’s a kind of magic
Cisco WebEx vulnerability: it’s a kind of magicCisco WebEx vulnerability: it’s a kind of magic
Cisco WebEx vulnerability: it’s a kind of magic
 
ITrust Company Overview FR
ITrust Company Overview FRITrust Company Overview FR
ITrust Company Overview FR
 
ITrust Company Overview EN
ITrust Company Overview ENITrust Company Overview EN
ITrust Company Overview EN
 
SOC OEM - Datasheet FR
SOC OEM - Datasheet FRSOC OEM - Datasheet FR
SOC OEM - Datasheet FR
 
SOC OEM - Datasheet EN
SOC OEM - Datasheet ENSOC OEM - Datasheet EN
SOC OEM - Datasheet EN
 
Reveelium Technical Overview - Datasheet FR
Reveelium Technical Overview - Datasheet FRReveelium Technical Overview - Datasheet FR
Reveelium Technical Overview - Datasheet FR
 

Último

The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
Active Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfActive Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfCionsystems
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...panagenda
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AIABDERRAOUF MEHENNI
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about usDynamic Netsoft
 

Último (20)

The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
Active Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfActive Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdf
 
Exploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the ProcessExploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the Process
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about us
 

Ignorance is bliss, but not for MongoDB

  • 1. Ignorance is bliss, but not for MongoDB The database management system MongoDB is currently being downloaded at an impressive rate: approximately 30 000 times per day. Widely spread, this open source software is today the talk of the town because of a hacking wave that, according to some, was to be expected sooner or later. In 2015, the Hackernews website was the first to raise concern about and its security flaws. Over 600 TB of data hosted by the NoSQL database were identified as being accessible without a password. Yes, you read that correctly. « These MongoDB instances weren’t exposed due to any flaw in its software, but due to a misconfiguration (bad security practice) that let any remote attacker access MongoDB databases without using any special hacking tool. », added the website. Not long after, MongoDB published a new software version of its database. The latest version 3.4 enables administrators to actually activate the authentication feature on the unprotected systems. But, as it was to be expected, the majority of admins most likely didn’t catch the news concerning the additional security features of the available updates. It’s also possible that some of them find a migration process bothersome (to upgrade from a 2.7 version to a 3.X can be delicate). Regardless of their reasons though, this particular segment of MongoDB users is now being targeted by an unforgiving hacking pandemic. Last December, security researcher Victor Gevers sounded the second alarm for MongoDB, announcing that the danger had officially evolved from the state of « potential threat » to « full-blown ongoing attack ». According to Gevers, it seems as though cybercriminals were the only ones to take his warning into account. The outbreak all started with a group dubbed « harak1r1 » which is actively targeting all administrators having not updated MongoDB. What remains hugely impressive in this case is just how the numbers progressed in less than two weeks. On January 3rd, 2 000 databases had been seized by « harak1r1 ». Now, according to Gevers and another fellow security researcher, Niall Merrigan, the stats show today almost 34 000 infected databases. This sudden increase is also due to rising number of criminal groups seizing this opportunity. Like bees to honey, more than 20 groups are involved today in the MongoDB heist. And who can blame them? It seems pretty easy to exploit the software’s misconfiguration. One the most “successful” group is Kraken. Kraken alone has managed to gather an impressive number of 21 000 MongoDB databases.
  • 2. Another ransomware? Uhm, not really... The media are advertising these incidents as ransomware attacks, but that’s not the case for all of the groups. Indeed, Krakendoesn’tencryptyourdata,neitherdoesitlaunchamaliciouspayloadlikethe restof thisseason’smalware(read our previousarticle onPopcornTime here).No,these hackersactuallyuse a script that replacesdatabase contentwith the ransom request. In other words, they export the content of unsecured MongoDB instancesin order to then erase the found data and drop instead a file containing the ransom content. A basic script should look something like this: > mongodump --host <targetHost> --out data > mongo --host <targetHost> dbName > db.dropDatabase() > db.bitcoins.insert({"bitcoin Address": "XXXX", "message": "You have been pwned. Give us 1 BTC.", email: "btc@gift.xx" }) Of course, we are simplifying things to a great extent here. But it remains true that, if the database can be accessed without first logging in, one can easily launch the above mentioned script. But all goodthingscome to those that...pay, right?False.AccordingtoGeversandMerrigan,some of the cybercriminal groupsinvolvedare quite happywithjustdeletingthe filesfound,renderingall datahostage rescuingoperationsfutile. Unfortunately,morethan88enterprisestodatahave alreadypaidtherequestedpriceand12of themhave yettoreceive a response (or their data, for that matter). Cybersecurity experts also note that these groups are also competing with each other at the same time. And what a ruthless fight it is. Some hackers even delete existing scripts containing ransom demands. Between you and us, this doesn’t exactly inspire trust. Victims could then easily find themselves in the situation that the bitcoins they just transferred were sent to a hacking group that doesn’t even have their data. However, looking over the stats, it becomes clear that cybercriminals cannot endlessly benefit from MongoDB’s weakness. According to John Matherly, the founder of Shodan, almost 50 000 MongoDB servers are exposed to the Internet,while more thanahalf have alreadybeeninfected.Thatbeingsaid,hackershaveagainfoundthe loopholethat rendersthe situationintheirfavor.Take,forinstance,Kraken –thathasmade a profitof over9000 bitcoins(or7million euro) in the last couple of weeks. The latter didn’t just stop there, it also put its script up for sale in order to make the most out of a temporary situation. Source:BleepingComputer
  • 3. Don’t be surprised! If you leave the door cracked... ...hackers will definitely invite themselves in. AndreasNilsson,ProductSecurityResponsible atMongoDB,explainshow administratorscanmanage to avoidthistype of attack: “These hacks can be avoided thanks to the numerous security measures integrated within MongoDB. Our security manual is there to help you use these safety features correctly.” Thismightcome as a surprise to some of you,but MongoDB isno more lesssecure thana MySQL database:« It’sin the nature of a database software torenderoptionalcertainfeatures.Thisisnottrue onlyinthe case of MongoDB »,stated a spokesperson in New York. Evenso, certainactorspresentinthe cyber-landscape didnothesitate toharshlycriticizethe leaf-company.Appalledat the recent events, Chris Wysopal, Director of Technology for Veracode, doesn’t agree at all with this product development approach. The latter attempted to underline the need to secure a software from the moment it is being first conceived on Twitter: It seems we’ve hit a bump in the road, as public opinion is divided: should we enable the popularization of a quick & simple tool,despite its security shortcomings? Or should we instead focus on developing tools that are more complex, more secure, with a restrictive configuration, disregarding the need for a fast and painless deployment? That aside,the importantthingrightnowis to determine whetherornot you’ve alreadybeenhacked.It’seasierthanit sounds, trust us. You can do this by simply following these 3 steps: 1. Check your MongoDB for an unknown admin account that may have been recently added; 2. CheckGridFS,the tool that enablesyouto use MongoDB as a file manager,tosee if anyunknownfileswere recently added, not as a result of your own doing; 3. Check the logs in order to make sure that your MongoDB instances were not accessed by a foreign machine. If,bysome strike of luck,yoursisnotamongthe 34 000 compromisedservers,youshouldknow thatthe situation(ifleft unchanged) is subject to change in the very near future. If this chain of so-called ransomware was possible, it’s only because there are still individuals out there in denial of the true value of cybersecurity best practices. Here are a couple of steps you might find useful: 1. Update your MongoDB to the latest version; 2. Disconnect the remote control feature for your database (if possible); 3. Block the default port of MongoDB; 4. Configure Bind_ip in order to limit the access to the server by linking local IP addresses. Link: https://www.reveelium.com/en/ignorance-bliss-not-for-mongodb/ https://www.reveelium.com/en/cisco-webex-vulnerability-its-a-kind-of-magic/