Hacking attacks on Elasticsearch and MongoDB


The Elasticsearch and MongoDB unsecured databases have been targeted at hacking attacks that wipe out all data. There are no ransom demands.

These are called meow attacks because they leave a revealing meow signature in the server’s log files.

Close-up of a screenshot of a server log file that was attacked by Meow

Security researcher Bob Diachenko (@MayhemDayOne) linked to a tweet by Anthr @ X (@ anthrax0) said to represent a screenshot of a log file showing details of a meow attack.

Screenshot of a log file posted on twitter Close up of a screenshot of a log file from an attacked server that was posted on Twitter.

Meow Hacking Attacks

The attacks target insecure Elasticsearch and MongoDB installations.

That can mean installations that are not protected by a firewall and are exposed to the public.

That could also be facilities that don’t have SSL encrypted communications.

The Elasticsearch hacking attack was observed by security investigation Bob Chiachenko on July 20, 2020. He noted that there were no ransom requests or warnings.

Ad

Continue reading below

It was an attack designed solely to remove all data.

The latest victim of a high-level attack is an African online payment service.

Automated hacking attacks

In general, hacking attacks are automated. A bot script attacks a site by looking for known vulnerabilities, such as unsafe ports and vulnerable files. The process is similar to that of a thief walking down a street checking door handles for unlocked vehicles.

The meow attack is also an automated attack.

What is being attacked?

At this time, it is the unsafe Elasticsearch and MongoDB databases that are under attack.

Elasticsearch is the most attacked, followed by MongoDB.

Ad

Continue reading below

As of July 24, 2020, there were 1,779 Elasticsearch attacks and 701 MongoDB.

Elasticsearch is an open source search and analysis service used by companies like Uber, Shopify and Udemy.

MongoDB declares on its website that it is used by companies such as eBay, Adobe, SquareSpace, Verizon and the UK government.

Attacks allegedly hidden by a VPN

Someone on Twitter posted screenshots of the log file of an attack on the Mongo database that showed that the attacks on that server were going through a VPN IP address to hide the true origin of the attack.

ProtonVPN is a virtual private network (VPN). A VPN is a service that masks a user’s true IP address for security reasons. In some countries, they are used to mask their Internet activities from curious governments.

ProtonVPN responded via Twitter by agreeing to review activity and block malicious users who violate its terms and conditions.

Recommended Action

There are security plugins for Elasticsearch:

It may be prudent for publishers running Elasticsearch or MongoDB to consider reviewing their facilities to ensure that they are secure and not exposed to the public Internet.

Citation

The new attack ‘Meow’ has eliminated almost 4,000 databases without guarantee