ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    Extortionists competing to get paid for the same databases!

    News
    mongodb default unsecured
    5
    12
    1.9k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • travisdh1T
      travisdh1
      last edited by

      KrebsonSecurity reporting on the latest database hacking incidents.

      Yet another in the long string of not properly securing something. Anyone who leaves MongoDB in it's default configuration is wide open to attack. Now the shady side of the internet is falling all over themselves trying to get paid to restore the data. The only problem seems to be that before someone pays up, they've already been infected by another malware.

      Almost wish I could watch the antics in real time!

      1 Reply Last reply Reply Quote 0
      • scottalanmillerS
        scottalanmiller
        last edited by

        Now we get to witness competitive market value in action!

        1 Reply Last reply Reply Quote 1
        • JaredBuschJ
          JaredBusch
          last edited by

          I seriously do not get how there are tens of thousands of databases open to the public.

          I mean you have to try to fail that hard, IMO.

          BRRABillB 1 Reply Last reply Reply Quote 2
          • BRRABillB
            BRRABill @JaredBusch
            last edited by

            @JaredBusch said in Extortionists competing to get paid for the same databases!:

            I seriously do not get how there are tens of thousands of databases open to the public.

            I mean you have to try to fail that hard, IMO.

            Probably just following a set of directions that don't include changing the defaults.

            Probably a ton of WordPress installs/routers/etc with admin and admin out there, too...

            JaredBuschJ 1 Reply Last reply Reply Quote 1
            • JaredBuschJ
              JaredBusch @BRRABill
              last edited by

              @BRRABill said in Extortionists competing to get paid for the same databases!:

              @JaredBusch said in Extortionists competing to get paid for the same databases!:

              I seriously do not get how there are tens of thousands of databases open to the public.

              I mean you have to try to fail that hard, IMO.

              Probably just following a set of directions that don't include changing the defaults.

              Probably a ton of WordPress installs/routers/etc with admin and admin out there, too...

              The MariaDB database behind my WordPress installs is behind a firewall. It is not directly publicly accessible.

              The MongoDB running my company blog is behind a firewall. The blog pages use it. It is not open to the public. I did not open or close anything. It is a default install.

              BRRABillB 1 Reply Last reply Reply Quote 0
              • BRRABillB
                BRRABill @JaredBusch
                last edited by

                @JaredBusch

                I don't know.

                THis is all the article says...

                "If installed on a server with the default settings, for example, MongoDB allows anyone to browse the databases, download them, or even write over them and delete them."

                JaredBuschJ scottalanmillerS 2 Replies Last reply Reply Quote 0
                • JaredBuschJ
                  JaredBusch @BRRABill
                  last edited by

                  @BRRABill said in Extortionists competing to get paid for the same databases!:

                  @JaredBusch

                  I don't know.

                  THis is all the article says...

                  "If installed on a server with the default settings, for example, MongoDB allows anyone to browse the databases, download them, or even write over them and delete them."

                  A server with no firewall maybe.

                  scottalanmillerS 1 Reply Last reply Reply Quote 0
                  • scottalanmillerS
                    scottalanmiller @BRRABill
                    last edited by

                    @BRRABill said in Extortionists competing to get paid for the same databases!:

                    @JaredBusch

                    I don't know.

                    THis is all the article says...

                    "If installed on a server with the default settings, for example, MongoDB allows anyone to browse the databases, download them, or even write over them and delete them."

                    Yeah, they are taking things out of context. A default MongoDB on an non-default server that has no firewall. MongoDB does not open the firewall ports on a default install.

                    Beyond that, MongoDB that is open to the public is not yet installed completely. "Default settings" is misused here. "Settings used before installation is complete" is not the same as "default." Most modern NoSQL Clusters use a "database network" approach that requires you to configure the networking as part of the basic install.

                    No different than someone saying that a SAN is "wide up and browesable by the public" over the Internet by default. Um, yeah, if you forget to have it on its own network. But that's a ridiculous thing to claim.

                    1 Reply Last reply Reply Quote 1
                    • scottalanmillerS
                      scottalanmiller @JaredBusch
                      last edited by

                      @JaredBusch said in Extortionists competing to get paid for the same databases!:

                      @BRRABill said in Extortionists competing to get paid for the same databases!:

                      @JaredBusch

                      I don't know.

                      THis is all the article says...

                      "If installed on a server with the default settings, for example, MongoDB allows anyone to browse the databases, download them, or even write over them and delete them."

                      A server with no firewall maybe.

                      A server with no firewall, with an incomplete installation.

                      travisdh1T 1 Reply Last reply Reply Quote 1
                      • travisdh1T
                        travisdh1 @scottalanmiller
                        last edited by

                        @scottalanmiller said in Extortionists competing to get paid for the same databases!:

                        @JaredBusch said in Extortionists competing to get paid for the same databases!:

                        @BRRABill said in Extortionists competing to get paid for the same databases!:

                        @JaredBusch

                        I don't know.

                        THis is all the article says...

                        "If installed on a server with the default settings, for example, MongoDB allows anyone to browse the databases, download them, or even write over them and delete them."

                        A server with no firewall maybe.

                        A server with no firewall, with an incomplete installation.

                        Talk about IT fails, geesh.

                        1 Reply Last reply Reply Quote 0
                        • RomoR
                          Romo
                          last edited by Romo

                          Explanation of the vulnerability


                          Understanding the hack

                          The hack itself is alarmingly simple. In versions >= 2.6.0, MongoDB includes a default configuration file that binds MongoDB to 127.0.0.1 by default. As a result, the database will only listen to local connections.

                          Before version 2.6.0, that wasn’t true. By default, MongoDB was left open to remote connections. Authentication is also not required by default, which means that out of the box installs of MongoDB before version 2.6.0 happily accept unauthenticated remote connections.

                          Users could still restrict access to local connections if they took the time to configure the install but that meant manually adding a line to their mongodb.conf file. Since that wasn’t the default configuration, many existing installs never included this critical step.

                          Making matters worse is that it’s easy to identify potential MongoDB attack candidates. MongoDB’s default port is 27017. Using a search engine such as ZoomEye, you can query for MongoDB installs, see what port they’re available over, and find around 100,000 vulnerable candidates.

                          The vulnerability itself is hardly new. The issue was first raised back in 2012 and released somewhere around 2015. Also, in early 2015, John Matherly made some noise when he reported finding around 30,000 insecure installs of MongoDB. In other words, this is something that everyone could have known about for a while.

                          scottalanmillerS 1 Reply Last reply Reply Quote 0
                          • scottalanmillerS
                            scottalanmiller @Romo
                            last edited by

                            @Romo said in Extortionists competing to get paid for the same databases!:

                            Explanation of the vulnerability


                            Understanding the hack

                            The hack itself is alarmingly simple. In versions >= 2.6.0, MongoDB includes a default configuration file that binds MongoDB to 127.0.0.1 by default. As a result, the database will only listen to local connections.

                            Before version 2.6.0, that wasn’t true. By default, MongoDB was left open to remote connections. Authentication is also not required by default, which means that out of the box installs of MongoDB before version 2.6.0 happily accept unauthenticated remote connections.

                            Users could still restrict access to local connections if they took the time to configure the install but that meant manually adding a line to their mongodb.conf file. Since that wasn’t the default configuration, many existing installs never included this critical step.

                            Making matters worse is that it’s easy to identify potential MongoDB attack candidates. MongoDB’s default port is 27017. Using a search engine such as ZoomEye, you can query for MongoDB installs, see what port they’re available over, and find around 100,000 vulnerable candidates.

                            The vulnerability itself is hardly new. The issue was first raised back in 2012 and released somewhere around 2015. Also, in early 2015, John Matherly made some noise when he reported finding around 30,000 insecure installs of MongoDB. In other words, this is something that everyone could have known about for a while.

                            That's not a vulnerability, that is STILL a half configured system AND no firewall on the server. And MongoDB 2.6 is relatively old, we are on 3.3 these days. This is a database cluster component, not a complete database piece on its own. Whatever "security" professional is writing this piece clearly isn't aware of what they are writing about. What they write is half true, 27017 is listening on 0.0.0.0, but it does so for a reason and is only vulnerable in places where someone did not finish setting up their database AND their server. It's not a vulnerability in the product.

                            1 Reply Last reply Reply Quote 1
                            • 1 / 1
                            • First post
                              Last post