Among those who have join
MongoDB attacks DB Databases more recently is a group report by security researcher Niall Merrigan on January 6. The south korea whatsapp data attackers are identifi only by the email address us in the ransom demand. This new group, using the address [email protected], has already compromis at least 17 MongoDB instances and is demanding that their victims pay 0.25 Bitcoin to recover their data.
Google Docs currently maintains an active
list of the growing number of hacker groups involv in the attacks. The amounts request by the hackers range from 0.15 to 1 Bitcoin. The Bitcoin exchange rate fluctuat in the first days of 2017 and was around $892 on January 6.
The attack itself against MongoDB is quite simple and exploits the weakness of databases that have not been properly configur and are left open, so that their user does not require proper administrative verification. Once the attacker has connect to the open database, the next step is to gain full control over DB Databases it and then steal or encrypt the data contain therein, offering to return it back to the victim only upon receipt of a ransom paid in Bitcoin.
The fact that many
MongoDB instances are ao lists left expos is not a new phenomenon. Back in December 2015, security researcher DB Databases Chris Vickery us the search engine Shodan to find MongoDB servers with open ports. At the time, he was able to find poorly configur MongoDB databases using a utility from Kromtech, the developer of Mac OS X’s MacKeeper suite.
Vickery’s DB Databases cashback and promo codes on the zolla website was follow by John Matherly, founder of the Shodan project, who in December 2015 report finding at least 35,000 publicly accessible MongoDB instances online that did not require authentication. Exactly one year later, in January 2017, the number of public MongoDB databases not only had not decreas, but had apparently increas significantly, perhaps to 99,000 by some estimates.