Cyber: Exposed Mongodb Instances Still Targeted In Data Extortion Attacks

Cyber: Exposed Mongodb Instances Still Targeted In Data Extortion Attacks

A threat actor is targeting exposed MongoDB instances in automated data extortion attacks demanding low ransoms from owners to restore the data.

The attacker focuses on the low-hanging fruit, databases that are insecure due to misconfiguration that permits access without restriction. Around 1,400 exposed servers have been compromised, and the ransom note demanded a ransom of about $500 in Bitcoin.

Until 2021, a flurry of attacks had occurred, deleting thousands of databases and demanding ransom to restore the information [1, 2]. Sometimes, the attacker just deletes the databases without a financial demand.

A pentesting exercise from researchers at cybersecurity company Flare revealed that these attacks continued, only at a smaller scale.

The researchers discovered more than 208,500 publicly exposed MongoDB servers. Of them, 100,000 expose operational information, and 3,100 could be accessed  without authentication.

Almost half (45.6%) of those with unrestricted access had already been compromised when Flare examined them. The database had been wiped, and a ransom note was left.

An analysis of the ransom notes showed that most of them demanded a payment of 0.005 BTC within 48 hours.

“Threat actors demand payment in Bitcoin (often around 0.005 BTC, equivalent today to $500-600 USD) to a specified wallet address, promising to restore the data,” reads the Flare report.

“However, there is no guarantee the attackers have the data, or will provide a working decryption key if paid.”

There were only five distinct wallet addresses across the dropped ransom notes, and one of them was prevalent in about 98% of the cases, indicating a single threat actor focusing on these attacks.

Source: BleepingComputer