January 10, 2017 By Douglas Bonderud 2 min read

According to Bleeping Computer, the latest ransomware attack now affects more than 28,000 databases on MongoDB servers. The root cause is a combination of malicious attacks designed to steal and ransom data, made possible by virtually nonexistent security on the part of MongoDB users.

Although it is called ransomware, this attack doesn’t quite fit the classic definition. Here’s a look at how the database service met disaster head on.

Up, Up and Away?

As noted by TechRepublic, MongoDB has been gaining popularity for its work with NoSQL databases and is on track for an IPO in the next few years. But just like any database service that holds information for customers worldwide, MongoDB is a huge target. If cybercriminals can grab and encrypt user data, they can often force victims to pay almost any price for its return.

Security experts Niall Merrigan and Victor Gevers discovered evidence of MongoDB attacks on Jan. 6. This activity seemed to be the work of a single actor and targeted just 13 victims. Within days, however, the number of attacks skyrocketed up to 10,000. By Jan. 9, almost 30,000 databases were compromised. Now users are frustrated, and MongoDB faces an uncertain future.

Going, Going, Gone

While it’s tempting to chalk up the MongoDB servers attack as just another case of ransomware, there’s a common thread missing: Instead of encrypting data on-site, cybercriminals are wiping databases and leaving ransom notes behind, demanding up to 1 bitcoin in exchange for the return of stolen information.

As The Next Web pointed out, however, there’s little evidence that any of the supposedly stolen data has been properly exfiltrated. This means that if users pay the ransom, their digital property may still be gone for good. Some malicious groups have begun rehacking previously compromised databases and replacing existing ransom notes with their own, making it impossible for victims to know if they’re even paying the right criminal, let alone whether their data can be recovered.

Too Easy

According to IT Pro, users running regular database backups shouldn’t have an issue, since they can simply restore existing data and skip paying the ransom. But there’s a bigger problem here: Attackers were only able to gain access because database admins were running servers without a password. All the attackers had to do was identify these open servers — an easy task for any fraudster with automated tools — then grab what they wanted, leave a note and slam the door.

It’s no surprise, then, that the number of attacks quickly ramped up. Once attackers discovered one set of open servers they decided it was worth searching for more. So far, they’ve managed to compromise 25 percent of the entire MongoDB ecosystem.

Andreas Nilsson, director of product security at MongoDB, published a blog post in response. Nilsson asked users to enable basic security protections and warned against having a database open to the internet at large. MongoDB also pushed out a security update with a focus on mitigating these type of attacks going forward.

An Avoidable Disaster

The bottom line is that bad user security combined with typical cybercriminal tactics turned what could have been an isolated attack into a massive debacle. And there was little MongoDB could have done to prevent it. If admins choose to run their servers without a password and employing default user names, it’s only a matter of time before fraudsters help themselves to sensitive data and, in this case, destroy it before demanding a ransom with no guarantee of safe release.

It’s a harsh lesson, but one that hopefully makes the equation crystal clear: Malicious actors plus missing security equals complete data disaster.

More from

FYSA – Adobe Cold Fusion Path Traversal Vulnerability

2 min read - Summary Adobe has released a security bulletin (APSB24-107) addressing an arbitrary file system read vulnerability in ColdFusion, a web application server. The vulnerability, identified as CVE-2024-53961, can be exploited to read arbitrary files on the system, potentially leading to unauthorized access and data exposure. Threat Topography Threat Type: Arbitrary File System Read Industries Impacted: Technology, Software, and Web Development Geolocation: Global Environment Impact: Web servers running ColdFusion 2021 and 2023 are vulnerable Overview X-Force Incident Command is monitoring the disclosure…

What does resilience in the cyber world look like in 2025 and beyond?

6 min read -  Back in 2021, we ran a series called “A Journey in Organizational Resilience.” These issues of this series remain applicable today and, in many cases, are more important than ever, given the rapid changes of the last few years. But the term "resilience" can be difficult to define, and when we define it, we may limit its scope, missing the big picture.In the age of generative artificial intelligence (gen AI), the prevalence of breach data from infostealers and the near-constant…

Airplane cybersecurity: Past, present, future

4 min read - With most aviation processes now digitized, airlines and the aviation industry as a whole must prioritize cybersecurity. If a cyber criminal launches an attack that affects a system involved in aviation — either an airline’s system or a third-party vendor — the entire process, from safety to passenger comfort, may be impacted.To improve security in the aviation industry, the FAA recently proposed new rules to tighten cybersecurity on airplanes. These rules would “protect the equipment, systems and networks of transport…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today