Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Exposed MongoDB instances still targeted in data extortion attacks
    Cybersecurity

    Exposed MongoDB instances still targeted in data extortion attacks

    adminBy adminFebruary 1, 2026No Comments3 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Exposed MongoDB instances still targeted in data extortion attacks
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Exposed MongoDB instances still targeted in data extortion attacks

    A threat actor is targeting exposed MongoDB instances in automated data extortion attacks demanding low ransoms from owners to restore the data.

    The attacker focuses on the low-hanging fruit, databases that are insecure due to misconfiguration that permits access without restriction. Around 1,400 exposed servers have been compromised, and the ransom note demanded a ransom of about $500 in Bitcoin.

    Until 2021, a flurry of attacks had occurred, deleting thousands of databases and demanding ransom to restore the information [1, 2]. Sometimes, the attacker just deletes the databases without a financial demand.

    Wiz

    A pentesting exercise from researchers at cybersecurity company Flare revealed that these attacks continued, only at a smaller scale.

    The researchers discovered more than 208,500 publicly exposed MongoDB servers. Of them, 100,000 expose operational information, and 3,100 could be accessed  without authentication.

    Shodan search results
    Shodan search results
    Source: Flare

    Almost half (45.6%) of those with unrestricted access had already been compromised when Flare examined them. The database had been wiped, and a ransom note was left.

    An analysis of the ransom notes showed that most of them demanded a payment of 0.005 BTC within 48 hours.

    “Threat actors demand payment in Bitcoin (often around 0.005 BTC, equivalent today to $500-600 USD) to a specified wallet address, promising to restore the data,” reads the Flare report.

    “However, there is no guarantee the attackers have the data, or will provide a working decryption key if paid.”

    Sample of the ransom note
    Sample of the ransom note
    Source: Flare

    There were only five distinct wallet addresses across the dropped ransom notes, and one of them was prevalent in about 98% of the cases, indicating a single threat actor focusing on these attacks.

    Flare also comments on the remaining exposed instances that didn’t appear to have been hit, even though they were exposed and poorly secured, hypothesizing that those may have already paid a ransom to the attackers.

    In addition to poor authentication measures, the researchers also found that nearly half (95,000) of all internet-exposed MongoDB servers run older versions that are vulnerable to n-day flaws. However, the potential of most of those was limited to denial-of-service attacks, not offering remote code execution.

    CVEs distribution on the 95,000 exposed instances
    CVEs distribution on the 95,000 exposed instances
    Source: Flare

    Flare suggests that MongoDB administrators avoid exposing instances to the public unless it’s absolutely necessary, use strong authentication, enforce firewall rules and Kubernetes network policies that allow only trusted connections, and avoid copying configurations from deployment guides.

    MongoDB should be updated to the latest version and continuously monitored for exposure. In the case of exposure, credentials need to be rotated and logs examined for unauthorized activity.


    tines

    Modern IT infrastructure moves faster than manual workflows can handle.

    In this new Tines guide, learn how your team can reduce hidden manual delays, improve reliability through automated response, and build and scale intelligent workflows on top of tools you already use.

    attacks data Exposed extortion instances MongoDB targeted
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleI cut my yearly streaming costs by half with a few simple tricks
    Next Article Why some monitors wake instantly and others feel broken
    admin
    • Website

    Related Posts

    Pro-Russia actors team with Iran-linked hackers in attacks

    March 3, 2026

    LexisNexis confirms data breach as hackers leak stolen files

    March 3, 2026

    Quantum Decryption of RSA is Much Closer than Expected

    March 3, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Pro-Russia actors team with Iran-linked hackers in attacks

    March 3, 2026

    8 Best Student Checking Accounts of March 2026

    March 3, 2026

    Builderius WordPress Page Builder Integrates Claude AI

    March 3, 2026

    Google is cutting Chrome’s release cycle in half

    March 3, 2026
    Categories
    • Blogging (32)
    • Cybersecurity (580)
    • Privacy & Online Earning (82)
    • SEO & Digital Marketing (363)
    • Tech Tools & Mobile / Apps (716)
    • WiFi / Internet & Networking (103)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Pro-Russia actors team with Iran-linked hackers in attacks

    March 3, 2026

    8 Best Student Checking Accounts of March 2026

    March 3, 2026

    Builderius WordPress Page Builder Integrates Claude AI

    March 3, 2026
    Most Popular
    • Pro-Russia actors team with Iran-linked hackers in attacks
    • 8 Best Student Checking Accounts of March 2026
    • Builderius WordPress Page Builder Integrates Claude AI
    • Google is cutting Chrome’s release cycle in half
    • LexisNexis confirms data breach as hackers leak stolen files
    • A Practical Guide for GTM Teams
    • This new Samsung slidable phone concept expands from the top
    • Quantum Decryption of RSA is Much Closer than Expected
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.