News

Unidentified persons destroyed the NewsBlur RSS database

An unknown hacker erased the database of the popular RSS reader NewsBlur, and then demanded a ransom from the developers in exchange for access to the data.

According to a message that appeared on the company’s home page, the attack affected MongoDB servers and one of five databases the company used. At the same time, NewsBlur founder Samuel Clay wrote that the database was destroyed due to a firewall error, and this happened by his fault during a scheduled database migration.
About two hours before [the attack], I switched my MongoDB cluster to new servers. It turns out that the ufw firewall, which I enabled and deliberately limited to a strict permission list that only included my internal servers, was not working on the new server due to Docker. When I put MongoDB in a container, Docker kindly injected an allow rule into iptables, exposing MongoDB to the world.Clay told HackerNews.

Clay is confident that this incident allowed hacker to gain access to the server, erase its contents and leave a ransom note. Moreover, it took the attacker only three hours to discover an available MongoDB database that accidentally found itself on the network.

Let me remind you that just a few years ago, MongoDB hacks and ransom demands were a very popular tactic among cybercriminals. For example, by mid-2017, attackers had already compromised more than 45,000 databases, and at some point, in addition to MongoDB, they also became interested in ElasticSearch, Hadoop, CouchDB, Cassandra, and MySQL.

Although the original hacker groups that practiced such attacks in 2016-2017 stopped after only a few months, since the seizure of the database “hostage” brought them almost no money, experts for a long time discovered new participants in the attacks who also decided to try themselves in extortion.

Ok, here’s what I’m doing:
– Taking a snapshot of the backup taken 3 hours ago (should take 30 minutes) just in case
– Booting the snapshot and replicating to another secondary (~3-4 hours)
Once those two are done, we should be back in business.Samuel Clay wrote in his Twitter.

The incident had already been successfully resolved, as NewsBlur employees were able to restore the database from a backup, which fortunately was at hand.

Let me also remind you that we wrote that Gootkit malware operators left unprotected database in open access.

User Review
0 (0 votes)
Comments Rating 0 (0 reviews)
Daniel Zimmermann

Daniel Zimmermann has been writing on security and malware subjects for many years and has been working in the security industry for over 10 years. Daniel was educated at the Saarland University in Saarbrücken, Germany and currently lives in New York.

Recent Posts

Remove Mubasinter.xyz pop-up ads (Virus Removal Guide)

Mubasinter.xyz is a domain that tries to trick you into subscribing to its browser notifications…

22 hours ago

Remove Garicund.xyz pop-up ads (Virus Removal Guide)

Garicund.xyz is a domain that tries to force you into subscribing to its browser notifications…

22 hours ago

Qehu Virus Removal Guide (+Decrypt .qehu files)

Qehu - General Info Qehu is a destructive software functioning as typical ransomware. Michael Gillespie,…

3 days ago

Qepi Virus Removal Guide (+Decrypt .qepi files)

Qepi Virus - Details Qepi is a destructive software functioning as typical ransomware. Michael Gillespie,…

3 days ago

Remove Wifebaabuy.live pop-up ads (Virus Removal Guide)

Wifebaabuy.live is a domain that tries to trick you into clik to its browser notifications…

3 days ago

Remove Relativeads.net pop-up ads (Virus Removal Guide)

Relativeads.net is a domain that tries to force you into clik to its browser notifications…

3 days ago