Forum Moderators: open
The activity started recently by hitting Elasticsearch and MongoDB instances without leaving any explanation, or even a ransom note. Attacks then expanded to other database types and to file systems open on the web.
...
the attack appears to be an automated script that “overwrites or destroys the data completely.”
...
Researchers first observed the ‘meow’ database attacks at the beginning of the week.
...
The researcher observed on Thursday that whoever is behind the 'meow' attack is apparently targeting any database that is insecure and reachable over the internet.
He saw these data-wiping attacks on systems running Cassandra, CouchDB, Redis, Hadoop, Jenkins, as well as against network-attached storage devices.
...
A new search on Saturday using Shodan shows that more than 3,800 databases have entry names matching the 'meow' attack. More than 97% of them are Elastic and MongoDB.
[edited by: engine at 4:06 pm (utc) on Jul 27, 2020]
As always, secure your data. Not sure of the motives for these attacks, but am very sure that laissez-faire webmasters will reap an unhappy day for failing to take due diligence.
They are writeable by anyone who can connect to the server by default.
Some of the security changes made by MongoDB in recent versions include adding localhost binding by default, which limits access to the database to only the system on which the database is first installed, and upgrading from SHA-1 to SHA-256 for database authentication systems.
This is not true. At least not with respect to MongoDB. I have never used ElasticSearch so I can't comment. MongoDB is by default bound to the localhost. Therefore you need access to system that the database is installed on to get access to the DB.
And more importantly, much more importantly, we are taking about 1000 websites that have been attacked. There are likely more successful Wordpress attacks done on a daily basis than have ever been done with this "Meow attack".