Unsecured MongoDBs taken hostage
83 points| xyunknown | 9 years ago
I've aquired the portion of the log related to the hostage taking, posted below. In particular this log shows that __no__ backup of the data was taken. So please don't pay any money!
------------------------------------------
Although my colleagues and I have already pointed out the issue of open-by-default databases in spring 2015 (look at the references), today it seems for the astonishingly first(?) time somebody took the opportunity to erase hundreds of MongoDBs leaving only this Message:
{ "_id" : ObjectId("5859a0370b8e49f123fcc7da"), "mail" : "[email protected]", "note" : "SEND 0.2 BTC TO THIS ADDRESS 13zaxGVjj9MNc2jyvDRhLyYpkCh323MsMq AND CONTACT THIS EMAIL WITH YOUR IP OF YOUR SERVER TO RECOVER YOUR DATABASE !" }
Well played, system admins.
Updates:
The price for the data seems to equate to about 200 USD currently. Thanks, wereHamster.
This has been going on since at least yesterday (https://twitter.com/achillean/status/816385533538631680). Thanks, NietTim.
There have already been transactions by presumed victims: https://bitref.com/13zaxGVjj9MNc2jyvDRhLyYpkCh323MsMq . Thanks, anondon.
Please read the official security checklist by MongoDB! In particular, use passwords and don't expose on all interfaces (duh!)! https://docs.mongodb.com/manual/administration/security-checklist/
Sources/References:
The Jan '15 info paper of which I am one of the authors: https://cispa.saarland/wp-content/uploads/2015/02/MongoDB_documentation.pdf
(Jan '17) http://www.csoonline.com/article/3154190/security/exposed-mongodb-installs-being-erased-held-for-ransom.html
http://www.theregister.co.uk/2017/01/04/mongodb_installs_wiped_by_bitcoin_ransoming_script/
(German) https://www.heise.de/newsticker/meldung/Eindringling-nimmt-offenbar-MongoDB-Datenbanken-als-Geisel-3587479.html
[+] [-] DyslexicAtheist|9 years ago|reply
Please don't say "hack" when you've been auto-pwned by something that uses an OWASP TOP-10 to get you. It's carelessness, inexperience, possibly negligence or anything in between. But for sure it is not a hack!
[+] [-] koolba|9 years ago|reply
[+] [-] mrweasel|9 years ago|reply
Some sort of analysis of the purpose of these directly exposed MongoDB instances could be interesting. Are they being used as a backend for JavaScript applications?
[+] [-] dx034|9 years ago|reply
I don't see any reason that a database should allow to listen to any address without authentication. There shouldn't be a real world application requiring this.
[+] [-] ryanlol|9 years ago|reply
Oh yeah? I dumped over 40TB of data from open MySQL instances. --skip-grant-tables is probably the most common advice for resetting your MySQL root password.
[+] [-] anacrolix|9 years ago|reply
[+] [-] SillentTroll|9 years ago|reply
I understand why the authentication is disabled by default, but it should fail to start with a DB that has users with roles and stuff.
[+] [-] dx034|9 years ago|reply
[+] [-] SillentTroll|9 years ago|reply
Situation #1, new database: Start MongoDb without any users, but as soon as the admin user is added, drop all connections and enable authentication
Situation #2, existing database: In MongoDB is started with a database, that has admin user but the authentication is not enabled, fail and exit.
[+] [-] achillean|9 years ago|reply
[+] [-] anondon|9 years ago|reply
Looks like the guy pulled off these blackmailing/hostage tricks before as well.
Not to pile on to the already tense situation, would you be open to sharing how this happened, what the database contained etc, sort of like a post mortem without revealing any personally identifiable info.
[+] [-] xyunknown|9 years ago|reply
[+] [-] dx034|9 years ago|reply
[+] [-] fauria|9 years ago|reply
[+] [-] xyunknown|9 years ago|reply
Update: in a different log he used a different server for the attack, suggesting he might be using innocent servers, therefore I removed the log.
[+] [-] xyunknown|9 years ago|reply
[+] [-] sebcat|9 years ago|reply
[+] [-] martinald|9 years ago|reply
[+] [-] Xylakant|9 years ago|reply
[+] [-] achillean|9 years ago|reply
https://blog.shodan.io/its-the-data-stupid/
Note that MongoDB listens on localhost unless changed by the user or the developer is using an insecure image.
[+] [-] NietTim|9 years ago|reply
[+] [-] xyunknown|9 years ago|reply
[+] [-] kirushik|9 years ago|reply
[+] [-] userbinator|9 years ago|reply
[+] [-] xyunknown|9 years ago|reply
[+] [-] rohandighe|9 years ago|reply
[+] [-] mike-cardwell|9 years ago|reply
[+] [-] wereHamster|9 years ago|reply
[+] [-] mathrawka|9 years ago|reply
Requested action not taken: mailbox unavailable 550 Invalid recipient
[+] [-] mike-cardwell|9 years ago|reply
[+] [-] tbarbugli|9 years ago|reply
[+] [-] wereHamster|9 years ago|reply