Exposed MongoDB instances still targeted in data extortion attacks
#Vulnerabilities

Exposed MongoDB instances still targeted in data extortion attacks

Security Reporter
3 min read

Threat actors continue targeting misconfigured MongoDB databases, demanding Bitcoin ransoms to restore deleted data from thousands of exposed servers.

A threat actor is targeting exposed MongoDB instances in automated data extortion attacks demanding low ransoms from owners to restore the data. The attacker focuses on the low-hanging fruit, databases that are insecure due to misconfiguration that permits access without restriction. Around 1,400 exposed servers have been compromised, and the ransom note demanded a ransom of about $500 in Bitcoin.

Until 2021, a flurry of attacks had occurred, deleting thousands of databases and demanding ransom to restore the information [1, 2]. Sometimes, the attacker just deletes the databases without a financial demand. A pentesting exercise from researchers at cybersecurity company Flare revealed that these attacks continued, only at a smaller scale.

Shodan search results

The researchers discovered more than 208,500 publicly exposed MongoDB servers. Of them, 100,000 expose operational information, and 3,100 could be accessed without authentication.

Almost half (45.6%) of those with unrestricted access had already been compromised when Flare examined them. The database had been wiped, and a ransom note was left. An analysis of the ransom notes showed that most of them demanded a payment of 0.005 BTC within 48 hours.

"Threat actors demand payment in Bitcoin (often around 0.005 BTC, equivalent today to $500-600 USD) to a specified wallet address, promising to restore the data," reads the Flare report. "However, there is no guarantee the attackers have the data, or will provide a working decryption key if paid."

Featured image

There were only five distinct wallet addresses across the dropped ransom notes, and one of them was prevalent in about 98% of the cases, indicating a single threat actor focusing on these attacks. Flare also comments on the remaining exposed instances that didn't appear to have been hit, even though they were exposed and poorly secured, hypothesizing that those may have already paid a ransom to the attackers.

In addition to poor authentication measures, the researchers also found that nearly half (95,000) of all internet-exposed MongoDB servers run older versions that are vulnerable to n-day flaws. However, the potential of most of those was limited to denial-of-service attacks, not offering remote code execution.

Exposed MongoDB instances still targeted in data extortion attacks

Flare suggests that MongoDB administrators avoid exposing instances to the public unless it's absolutely necessary, use strong authentication, enforce firewall rules and Kubernetes network policies that allow only trusted connections, and avoid copying configurations from deployment guides. MongoDB should be updated to the latest version and continuously monitored for exposure. In the case of exposure, credentials need to be rotated and logs examined for unauthorized activity.

These attacks highlight a persistent problem in database security: misconfiguration remains one of the most common attack vectors. The fact that attackers can still find thousands of exposed MongoDB instances years after similar campaigns in 2021 demonstrates that basic security hygiene continues to be overlooked by many organizations.

The low ransom demands (around $500) suggest these attackers are targeting small businesses or individuals who may be more likely to pay quickly rather than risk losing their data permanently. This strategy has proven effective enough to sustain these campaigns over multiple years, despite the availability of security best practices and hardening guides from MongoDB and the broader security community.

Comments

Loading comments...