Stories
Slash Boxes
Comments

SoylentNews is people

posted by n1 on Sunday January 22 2017, @07:02PM   Printer-friendly
from the aaand-it's-gone... dept.

Arthur T Knackerbracket has found the following story:

It was only a matter of time until ransomware groups that wiped data from thousands of MongoDB databases and Elasticsearch clusters started targeting other data storage technologies. Researchers are now observing similar destructive attacks hitting openly accessible Hadoop and CouchDB deployments.

Security researchers Victor Gevers and Niall Merrigan, who monitored the MongoDB and Elasticsearch attacks so far, have also started keeping track of the new Hadoop and CouchDB victims. The two have put together spreadsheets on Google Docs where they document the different attack signatures and messages left behind after data gets wiped from databases.

In the case of Hadoop, a framework used for distributed storage and processing of large data sets, the attacks observed so far can be described as vandalism.

That's because the attackers don't ask for payments to be made in exchange for returning the deleted data. Instead, their message instructs the Hadoop administrators to secure their deployments in the future.

According to Merrigan's latest count, 126 Hadoop instances have been wiped so far. The number of victims is likely to increase because there are thousands of Hadoop deployments accessible from the internet -- although it's hard to say how many are vulnerable.

The attacks against MongoDB and Elasticsearch followed a similar pattern. The number of MongoDB victims jumped from hundreds to thousands in a matter of hours and to tens of thousands within a week. The latest count puts the number of wiped MongoDB databases at more than 34,000 and that of deleted Elasticsearch clusters at more than 4,600.

A group called Kraken0, responsible for most of the ransomware attacks against databases, is trying to sell its attack toolkit and a list of vulnerable MongoDB and Elasticsearch installations for the equivalent of $500 in bitcoins.

-- submitted from IRC


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 3, Insightful) by Nerdfest on Sunday January 22 2017, @07:36PM

    by Nerdfest (80) on Sunday January 22 2017, @07:36PM (#457403)

    You'd think that people would be clever enough to keep stuff like this off the open internet and access it through SSH at least. Oh well, I guess it's a learning experience, for both access and backup technologies.

    Starting Score:    1  point
    Moderation   +1  
       Insightful=1, Total=1
    Extra 'Insightful' Modifier   0  
    Karma-Bonus Modifier   +1  

    Total Score:   3  
  • (Score: 0) by Anonymous Coward on Sunday January 22 2017, @08:28PM

    by Anonymous Coward on Sunday January 22 2017, @08:28PM (#457412)

    Not necessarily even backups. Ready only snapshots would do the trick for restoring.

  • (Score: 4, Insightful) by EvilSS on Sunday January 22 2017, @08:46PM

    by EvilSS (1456) Subscriber Badge on Sunday January 22 2017, @08:46PM (#457420)
    Programmers and people in IT find new ways every day to show me how little many of them think about security as they build and implement. It's frustrating to say the least.
    • (Score: 0) by Anonymous Coward on Sunday January 22 2017, @08:49PM

      by Anonymous Coward on Sunday January 22 2017, @08:49PM (#457423)

      What is worse is you basically have to learn most of this junk the 'hard way'. You end up having to be come an expert at security just so you can write a stupid simple damn app.

      • (Score: 0) by Anonymous Coward on Sunday January 22 2017, @09:22PM

        by Anonymous Coward on Sunday January 22 2017, @09:22PM (#457438)

        if you're too stupid not to control access to your database from the web then you need to take your dumb ass back to your windows/mac laptop.

  • (Score: 2) by mcgrew on Sunday January 22 2017, @10:04PM

    by mcgrew (701) <publish@mcgrewbooks.com> on Sunday January 22 2017, @10:04PM (#457453) Homepage Journal

    I'd think that they would not be so incompetent as to not back their data up. Hard drive failure or hacker, with backups it's little problem.

    Fools pay ransom on ransomware, the wise have backups.

    --
    mcgrewbooks.com mcgrew.info nooze.org
  • (Score: 2) by frojack on Sunday January 22 2017, @11:59PM

    by frojack (1554) on Sunday January 22 2017, @11:59PM (#457479) Journal

    I wonder if most of these aren't needed to feed public websites and stuff like that.

    I seriously can't imagine anybody putting up a huge dataset like that spread around a boatload of servers without a single thought about security. Otoh, we had at least one candidate for the highest of the land who couldn't be bothered to secure several different servers, because they could just pass a law against hacking and solve all those problems.

    --
    No, you are mistaken. I've always had this sig.
    • (Score: 2) by Nerdfest on Monday January 23 2017, @02:19AM

      by Nerdfest (80) on Monday January 23 2017, @02:19AM (#457514)

      Even for public sites, these sit behind a firewall and are only accessed by the middeware servers.