New ‘Meow’ attack has deleted almost 4k unsecured databases

栏目: IT技术 · 发布时间: 3年前

内容简介:07/25 Update added below. This post was originally published on July 22nd, 2020.Hundreds of unsecured databases exposed on the public web are the target of an automated 'meow' attack that destroys data without any explanation.

New ‘Meow’ attack has deleted almost 4k unsecured databases

07/25 Update added below. This post was originally published on July 22nd, 2020.

Hundreds of unsecured databases exposed on the public web are the target of an automated 'meow' attack that destroys data without any explanation.

The activity started recently by hitting Elasticsearch and MongoDB instances without leaving any explanation, or even a ransom note. Attacks then expanded to other database types and to file systems open on the web.

A quick search by BleepingComputer on the IoT search engine Shodan initially found dozens of databases that have been affected by this attack. Recently, the number of wiped databases increased to over 1,800.

These attacks have pushed researchers into a race to find the exposed databases and report them responsibly before they become 'meowed.'

Cat's out of the bag

One of the first publicly known examples of a Meow attack is an Elasticsearch database belonging to a VPN provider that claimed not to keep any logs.

Discovered by researcher Bob Diachenko , the database was  initially secured in July only to become exposed again five days later.

The second time, though, the owner no longer received a well-intended notification. Instead, they got ‘meowed,’ with almost all records getting wiped.

New ‘Meow’ attack has deleted almost 4k unsecured databases

Diachenko told BleepingComputer that there are not many details about the attacker or the purpose of their actions. He says that the attack appears to be an automated script that “overwrites or destroys the data completely.”

Researchers first observed the ‘meow’ database attacks at the beginning of the week. They could be the work of a vigilante trying to give administrators a hard lesson in security by raining destruction on unsecured data.

Victor Gevers, the chairman of the non-profit GDI Foundation, saw this type of attack, too. He says that the actor is also attacking exposed MongoDB databases, hitting as much as they can.

New ‘Meow’ attack has deleted almost 4k unsecured databases

He also saw the first ‘meow’ attacks a few days ago, with a recent one occurring on July 22, just a couple of hours after a GDI volunteer disclosed it responsibly to the owner.

The researcher observed on Thursday that whoever is behind the 'meow' attack is apparently targeting any database that is insecure and reachable over the internet.

He saw these data-wiping attacks on systems running Cassandra, CouchDB, Redis, Hadoop, Jenkins, as well as against network-attached storage devices.

New ‘Meow’ attack has deleted almost 4k unsecured databases
Victor Gevers

At the time of writing, BleepingComputer saw that 'meow' attacks impacted mostly Elasticsearch databases (1,395), followed by MongoDB (383), and Redis (54). This amounts to 1,832 but the real figure is higher as search engines start indexing the other database types. We will update the numbers when we get result for other database types.

According to LeakIX , a project that indexes open services, Apache ZooKeeper has been added on the list of "meow" attacks.

New ‘Meow’ attack has deleted almost 4k unsecured databases
LeakIX

07/25 Update: The Meow attacks continue to escalate with almost 4,000 databases deleted as of Saturday, July 25th.

A new search on Saturday using Shodan shows that more than 3,800 databases have entry names matching the 'meow' attack. More than 97% of them are Elastic and MongoDB.

While it is still not known why the threat actors are wiping databases, a security researcher named Anthr@X discovered that the attacks are being conducted via ProtonVPN IP addresses.

New ‘Meow’ attack has deleted almost 4k unsecured databases

Obstructing researchers

If behind these incidents are positive intentions, sometimes nothing good comes out of them and valuable data that could be lost in the process.

Data leaks from unsecured MongoDB and Elasticsearch instances reachable over the public internet are on a descending curve, but there is still some “very sensitive” information exposed.

As Gevers puts it, “some leaks bring bad things to the light, which need to be shared,” and wiping them brings benefits to no one.

“It is becoming a race to find these leaks as early as possible. This reduces the amount of time that can be spent on researching and reporting” - Victor Gevers

Whoever is behind the 'meow' attacks is likely to keep on targeting unsecured databases, aggressively destroying them. Administrators should make sure that they expose only what needs to be exposed and make sure the assets are properly secured.

Update [July 25, 2020]: Added image with overall status of 'meow' attacks from LeakIX. Recalculated amount of deleted databases due to Meow attacks.


以上就是本文的全部内容,希望本文的内容对大家的学习或者工作能带来一定的帮助,也希望大家多多支持 码农网

查看所有标签

猜你喜欢:

本站部分资源来源于网络,本站转载出于传递更多信息之目的,版权归原作者或者来源机构所有,如转载稿涉及版权问题,请联系我们

高性能网站

高性能网站

(美)苏德 / 东南大学出版社 / 2008年 / 28.00元

《高性能网站》中的规則向你解释了可以怎样优化网站中包含的Ajax、CSS、JavaScript、Flash和图片。每个规则都可以在本书的网站上找到对应的特别例子和代码片段。这些规則包括以下内容:减少HTTP连接请求、使用内容分发网络(ContentDeliveryNetwork)、在HTTP协议头添加过期时间、把部分内容变成Gzip格式、把样式表(stylesheets)放在顶部、将脚本放在底部、......一起来看看 《高性能网站》 这本书的介绍吧!

HTML 编码/解码
HTML 编码/解码

HTML 编码/解码

XML 在线格式化
XML 在线格式化

在线 XML 格式化压缩工具

HEX CMYK 转换工具
HEX CMYK 转换工具

HEX CMYK 互转工具