Hackers exploit unsecured MongoDB instances to wipe data and demand ransom
嗯,用户让我用中文帮他总结一篇文章,控制在一百个字以内,而且不需要以“文章内容总结”或“这篇文章”这样的开头,直接写描述即可。好的,我先看看这篇文章讲的是什么。 文章标题是“Hackers exploit unsecured MongoDB instances to wipe data and demand ransom”,看起来是关于黑客利用未受保护的MongoDB实例进行数据擦除并索要赎金的事件。接下来,作者Pierluigi Paganini在2026年2月2日发布的文章中提到,超过1400个暴露的MongoDB服务器被黑客入侵并清除数据,留下赎金记录。安全公司Flare报告称,未受保护的MongoDB数据库仍然是容易攻击的目标。 文章提到,在3100个暴露的服务器中,有1416个被入侵,数据被清除并留下赎金记录,通常要求500美元比特币。虽然有超过20万的MongoDB服务器公开可见,但最大的风险来自那些没有适当访问控制的服务器在线。 报告指出,在3100个完全暴露的服务器中,1416个被入侵。赎金记录中使用相同的比特币地址,指向一个单一攻击者。研究人员观察到超过95,000个服务器至少有一个漏洞,但大多数漏洞仅启用拒绝服务攻击。真正的风险来自配置错误,成千上万的数据库在线而没有适当的访问控制。 结论是建议应用预防和强化的最佳实践,因为配置错误仍然是关键因素。 现在我要把这些信息浓缩到一百字以内。首先确定主要点:黑客利用未受保护的MongoDB实例进行数据擦除和勒索赎金;超过1400个服务器被入侵;赎金通常为500美元比特币;主要风险来自配置错误而非漏洞;安全公司建议加强访问控制。 所以总结应该是:黑客利用未受保护的MongoDB实例清除数据并索要赎金。超过1400个暴露服务器被入侵,赎金通常为500美元比特币。主要风险来自配置错误而非漏洞。 </think> 黑客利用未受保护的MongoDB实例清除数据并索要赎金。超过1400个暴露服务器被入侵,赎金通常为500美元比特币。主要风险来自配置错误而非漏洞。 2026-2-2 15:13:10 Author: securityaffairs.com(查看原文) 阅读量:1 收藏

Hackers exploit unsecured MongoDB instances to wipe data and demand ransom

Pierluigi Paganini February 02, 2026

Over 1,400 exposed MongoDB servers have been hijacked and wiped by hackers, who left ransom notes after exploiting weak or missing access controls.

Cybersecurity firm Flare reports that unsecured MongoDB databases remain easy targets, with 1,416 of 3,100 exposed servers compromised. Hackers wiped data and left ransom notes, usually demanding $500 in Bitcoin, often using the same wallet. While over 200,000 MongoDB servers are publicly visible, the biggest risk comes from those left online without proper access controls.

“Our analysis revealed more than 200,000 servers running MongoDB that were publicly discoverable. Of these, slightly over 100,000 instances disclosed operational information, and 3,100 were fully exposed to the internet without access restrictions.” reads the report published by Flare. “Among the 3,100 fully exposed servers, 1,416 instances (45.6%) had already been compromised, with their databases wiped and replaced with a ransom note. In nearly all cases, the ransom demand was approximately $500 USD in Bitcoin.”

The researcher noted that in nearly all cases, the same Bitcoin address appears in ransom notes, pointing to a single attacker. Flare says some unaffected servers may have paid, putting possible earnings between $0 and $842,000.

“Notably, only five distinct Bitcoin wallets were observed across all incidents, with the wallet bc1qe2l4ffmsqfdu43d7n76hp2ksmhclt5g9krx3du appearing in over 98% of cases. This strongly suggests the activity is attributable to a single dominant actor, likely the same attacker documented in our previous dark web research.” states the report.

The researchers observed that over 95,000 servers had at least one vulnerability, however, most flaws only enable denial-of-service. The real risk comes from misconfiguration, with thousands of databases left online without proper access controls.

“While there are currently no known pre-authentication remote code execution (RCE) vulnerabilities in MongoDB, and our findings indicate that MongoDB is not being widely exploited at the vulnerability level, the risk remains significant. A single pre-auth RCE zero-day in MongoDB could instantly expose hundreds of thousands of servers and effectively hand attackers a well-oiled ransom machine capable of operating at massive scale.” concludes the report. “For this reason, we strongly recommend applying the prevention and hardening best practices outlined above, as misconfiguration—not exploitation—continues to be the critical enabling factor.”

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, ransom)




文章来源: https://securityaffairs.com/187548/security/hackers-exploit-unsecured-mongodb-instances-to-wipe-data-and-demand-ransom.html
如有侵权请联系:admin#unsafe.sh