Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Email Security

Ransomware Gang Hits Exposed MySQL Databases

Exploiting weak credentials on MySQL servers connected to the Internet, an ongoing ransomware campaign has compromised more than 250,000 databases to date, according to a warning from security vendor Guardicore.

Exploiting weak credentials on MySQL servers connected to the Internet, an ongoing ransomware campaign has compromised more than 250,000 databases to date, according to a warning from security vendor Guardicore.

Dubbed PLEASE_READ_ME, Guardicore said the campaign started as early as January 2020, with more than 83,000 victims successfully breached to date. 

With more than five million Internet-facing MySQL servers on the internet, the attacks are expected to continue against those with weak authentication credentials.

Guardicore security researchers say that the attackers are engaging in double extortion in an attempt to force victims into paying the ransom demand for the encrypted data.

Originating from 11 IP addresses, most located in Ireland and the UK, the attacks appear to have resulted in 7TB of data.

Between January and November, the attackers would include a Bitcoin wallet in the ransom note, instructing the victim to make payments there. This resulted in roughly $25,000 being paid to the attackers.

Starting in October, the victims were being directed to a TOR website, hn4wg4o6s5nc7763.onion, where the attackers list all databases for which a ransom was not paid. A total of 250,000 entries from 83,000 MySQL servers were identified.

The attackers gain access to the targeted databases by brute-forcing the passwords for the MySQL servers. Next, they run queries to gather information on tables and users, and to archive and exfiltrate the victim’s data. Next, the database is swept clean and a ransom note is left, demanding a ransom of up to 0.08 BTC.

A backdoor is also added to the database, so that the adversary can re-access it if needed.

On their TOR website, the attackers offer the stolen databases for sale at 0.03 Bitcoin (roughly $520). All entries are listed per token, with approximately 83,000 unique tokens identified, Guardicore said.

The attacks are not targeted, with the adversary lacking interest in the victim’s identity or size. Researchers surmise that the immediate focus is compromising as many victims as possible, for financial gain (but they are making less money per victim, the security researchers note).

“The PLEASE_READ_ME operators are trying to up their game by using double extortion in scale. Factoring their operation will render the campaign more scalable and profitable,” Guardicore Labs concludes.

Related: University Project Tracks Ransomware Attacks on Critical Infrastructure

Related: New Snake Ransomware Targets ICS Processes

Related: Seven Ransomware Families Target Industrial Software

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Expert Insights

Related Content

Cybercrime

The FBI dismantled the network of the prolific Hive ransomware gang and seized infrastructure in Los Angeles that was used for the operation.

Management & Strategy

Industry professionals comment on the recent disruption of the Hive ransomware operation and its hacking by law enforcement.

Malware & Threats

Microsoft plans to improve the protection of Office users by blocking XLL add-ins from the internet.

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.

IoT Security

Lexmark warns of a remote code execution (RCE) vulnerability impacting over 120 printer models, for which PoC code has been published.

Ransomware

US government reminds the public that a reward of up to $10 million is offered for information on cybercriminals, including members of the Hive...

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.

Email Security

Microsoft is urging customers to install the latest Exchange Server updates and harden their environments to prevent malicious attacks.