Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Malware & Threats

Over 1,400 MongoDB Databases Ransacked by Threat Actor

Of 3,100 unprotected MongoDB instances, half remain compromised, most of them by a single threat actor.

MongoDB

Unprotected MongoDB instances remain an easy target for financially motivated hackers, with over 1,400 servers currently showing signs of compromise, threat management firm Flare reports.

Ransacking MongoDB databases was a trend roughly a decade ago, with over 33,000 instances hijacked in a massive campaign detailed in early 2017.

Because database owners failed to properly protect internet-accessible MongoDB instances, hackers accessed them, wiped their content, and dropped ransom notes demanding payment in exchange for the erased content.

Now, Flare says that there are over 200,000 MongoDB servers publicly discoverable, with more than 100,000 disclosing operational information.

Alarmingly, 3,100 databases are exposed to the internet without proper restrictions, allowing anyone to access them.

Of these, 1,416 instances (45.6%) have been compromised, with their contents replaced with ransom notes typically demanding a $500 ransom payment in Bitcoin, Flare says.

Advertisement. Scroll to continue reading.

In 98% of these cases, the ransom notes mention the same bitcoin address, strongly suggesting that the MongoDB ransacking was performed by the same threat actor.

The remaining 1,684 servers (54.4%) do not show signs of infection, and Flare believes that at least some of their owners might have paid a ransom,

“This suggests that the threat actor’s earnings from this campaign could range from $0 USD (assuming all remaining servers were test environments that were simply taken offline) to as much as $842,000,” Flare notes.

At the moment, the threat actor’s Bitcoin wallet appears to have received only around $400, suggesting that the ransacking activity might not have been as profitable for the hacker.

Flare’s investigation also revealed that over 95,000 of the identified servers (46.3%) had at least one vulnerability. Most of the flaws could lead to denial-of-service (DoS) conditions.

“In our case, the only truly problematic assets are the approximately 3,100 MongoDB instances that were exposed without proper access controls,” Flare notes.

Related: Cyber Fraud Overtakes Ransomware as Top CEO Concern: WEF

Related: In Other News: 8,000 Ransomware Attacks, China Hacked US Gov Emails, IDHS Breach Impacts 700k

Related: Ransomware Payments Surpassed $4.5 Billion: US Treasury

Related: Ransomware Payments Dropped in Q3 2025: Analysis

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

With "Shadow AI" usage becoming prevalent in organizations, learn how to balance the need for rapid experimentation with the rigorous controls required for enterprise-grade deployment.

Register

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

People on the Move

Chris Sistrunk has been promoted to Practice Leader for Mandiant's OT Security Consulting.

Nudge Security has appointed Patrick Dillon as its Chief Revenue Officer.

AutoNation has appointed Brian Fricke as Chief Information Security Officer.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.