The rise in ransomware attacks on MongoDB installations prompted the database maker last week to issue advice on how to avoid being victimized.
As of Sunday, security researcher and Microsoft developer Niall Merrigan identified more than 27,000 MongoDB databases seized by ransomware. By Tuesday afternoon Pacific Time, an online spreadsheet maintained by Merrigan and fellow security researcher Victor Gevers listed 32,643 victims.
The attacks involve hackers who copy data from insecure databases, delete the original, and ask for a ransom of a few hundred dollars worth of Bitcoin to return the stolen data back to the owner.
MongoDB, like other NoSQL databases, has suffered from security shortcomings for years. Trustwave called out MongoDB in 2013. Security researcher John Matherly did so again in 2015.
Where MySQL, PostgreSQL, and other relational databases tend to default to local installation and some form of authorization, MongoDB databases are exposed to the internet by default, and don't require credentials immediately by default.
MongoDB's security checklist is here. The company has stated it is the user's responsibility to make these changes to the default configuration.
(Score: 0) by Anonymous Coward on Saturday January 14 2017, @01:31AM
They really need to be careful not to lose their reputation. Pretty soon, the higher ups at companies are going to keep seeing "MongoDB" show up in their reports and news about being insecure. MongoDB isn't the only document-oriented database on the block. The high levels will either get wooed away or the ops and admins will switch on their own.