Hacker Combines Data Breach With Extortion
Hackers are creative if nothing else.
A hacker going by the name of Harak1r1 is going around looking for unprotected Mongo databases. Mongo is a database used on many websites. The only problem is that on some of them, people do not protect the administrator account.
What the hacker is doing is this. First the hacker finds an unprotected Mongo database. Next, the hacker makes a backup of the database and uploads it to his own site. Finally, the hacker deletes the database and replaces it with a new database with a message that says if you want to see your data alive, send unmarked bitcoins to this address.
Apparently this has happened to a number of users over the last few weeks.
Interestingly, you would think the ransom would be large, but apparently all the hacker is asking for is 0.2 bitcoin or around $200.
In each case, the database owner has a couple of problems:
- Their web site is down. Minus its database, most websites won’t work. That could be a business or PR disaster or both.
- Their data has been compromised. Someone else has the data and the owner does not have it. This is different than the typical ransomware because usually the hacker does not take the data, but rather encrypts it in place. Depending on the type of data in the database, this could be a reportable breach to authorities and to the public.
- Obviously, the database is not secure. Do you assume that the only thing the attacker touched was the database or do you consider that the entire web site is compromised.
- If you assume that the entire web site is compromised, you have to rebuild it from scratch. Depending on how paranoid you are, you may have to replace the physical hard disks. Down time continues; potentially for days.
- Assuming you have a backup, you can restore the data after you rebuild the entire web site.
- If you don’t have a backup, you have to consider whether to pay off the cyber mafia and hope they give you your data back.
- How do you stop this from happening again?
There are a couple of take-aways of course.
- You should never make a web site publicly visible, even for a little while, until it is fully secured and patched.
- Databases should NEVER be directly accessible from the public Internet. This may require rearchitecting software, but if it is architected in a way that requires direct access from the public Internet, you are, pretty much, asking for a world of trouble.
- Backups. Backups and more backups. Gotta have them; gotta test them.
- Monitoring. How did this hacker delete tables out of a database without you knowing about it.
- Disaster recovery and business continuity plan. If it is not extortion, it will be something else. Plan for a web site meltdown and have a WELL PRACTICED plan to recover to a different server in a different data center. My teams used to practice this MONTHLY. You want to be able to do this in your sleep, because the call will likely come in at 3 AM and you WILL BE sleeping.
Lots of challenges.
OR maybe opportunities.
Take care of this before you become a statistic.
Information for this post came from Bleeping Computer.