Owners of at least 1,400 servers
Cybersecurity firm Flare has uncovered an ongoing, automated extortion campaign targeting publicly exposed MongoDB databases. The attack involves a threat actor scanning the internet for MongoDB instances that lack basic authentication controls. Upon finding an open server, the attacker's script automatically wipes all data and leaves behind a ransom note demanding a payment of approximately $500 in Bitcoin. Flare's research found that of 3,100 completely unsecured MongoDB servers discovered, nearly 46% (around 1,400) had already been compromised by this campaign. These attacks, while less common than several years ago, serve as a critical reminder of the importance of fundamental database security hygiene.
This is a low-sophistication, high-volume automated attack. The threat actor is not using zero-day exploits or advanced techniques but is simply capitalizing on a common and well-known misconfiguration: running a database in production with no authentication required for access.
Attack Flow:
27017).Critical Insight: Attackers in these campaigns rarely, if ever, return the data. The data is typically destroyed, not exfiltrated and stored. Paying the ransom is highly unlikely to result in data recovery.
The attack relies on the default configuration of some older versions of MongoDB or on administrator error. In the past, MongoDB instances would bind to 0.0.0.0 by default and not enforce authentication, making them publicly accessible. While modern versions have improved default security, many legacy systems or misconfigured new deployments remain vulnerable.
T1595.002 - Vulnerability Scanning: The attacker scans for open MongoDB ports and misconfigurations.T1190 - Exploit Public-Facing Application: While not an 'exploit' in the traditional sense, this involves abusing a weakness in a public-facing service.T1485 - Data Destruction: The core of the attack, where the database contents are wiped.T1490 - Inhibit System Recovery: By destroying the primary data source, the attacker inhibits recovery unless viable backups exist.| Type | Value | Description | Context | Confidence |
|---|---|---|---|---|
port |
27017 |
The default port for MongoDB. Monitor for unexpected inbound connections from the internet. | Firewall logs, network flow data | high |
log_source |
mongod.log |
The MongoDB log file. Look for a high volume of connection and command activity from an unknown IP, followed by dropDatabase commands. |
Database server logs | high |
other |
Ransom note in database | The presence of a new database or collection with a name like README, RECOVER_YOUR_DATA, or similar, containing a ransom message. |
Database monitoring | high |
dropDatabase and alert on them. Monitor firewall logs for inbound connections to port 27017 from untrusted sources.Preventing these attacks involves basic security best practices for database administration.
M1032 - Multi-factor Authentication and M1027 - Password Policies)127.0.0.1 if local access only). Never expose a database directly to the public internet. Use firewall rules to restrict access to the database port to only specific, trusted application servers. (M1035 - Limit Access to Resource Over Network)M1026 - Privileged Account Management)M0930 - Data Backup)Do not expose databases directly to the internet. Restrict network access to only trusted application servers.
Mapped D3FEND Techniques:
Enforce strong authentication on all database instances.
Mapped D3FEND Techniques:
Apply the principle of least privilege. Application accounts should not have administrative rights like 'dropDatabase'.
Mapped D3FEND Techniques:
Regularly back up and test the restoration of critical data to ensure recovery from a destructive attack.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats