DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Despite warnings earlier this year, tens of thousands of databases continue to leak (update1)

Posted on December 14, 2015 by Dissent

Back in February, some students from the Centre for IT-Security, Privacy and Accountability (CISPA) at Saarland University, Germany made headlines when they reported that they had found approximately 40,000 MongoDB Databases exposed on Port 27017, a port that is open by default in a MongoDB Database installation.  Anyone who searches Shodan would be able to easily locate such leaking databases.

So what happened after they reported their findings? There was some media coverage, but did the FTC post any guidance or warning to entities? Did CERT? Did the FBI? If they did, I can’t find it, and it appears that many businesses and entities using MongoDB are still exposing their entire databases on Port 27017. As of this weekend, there were 36,000 results for a search for open databases on that port. While many of them appear to be duplicates, it is still a concerning number.

In recent days, DataBreaches.net has reported on some of these leaking databases: the Vixlet leak affecting more than 377,000 MLB, ATP and Slipknot fans, the OkHello leak affecting more than 2.6 million users of the video chat service,  the California Virtual Academies leak affecting more than 74,000 students and employees, the iFit leak affecting 576,274 customers, and the Hzone leak affecting 5,027 users of a dating app for HIV-positive singles, but Chris Vickery has also uncovered many other similarly leaking databases. One of them is from the gaming site Slingo, where Chris found 2.5 million users’ first and last names, usernames, email addresses, password hashes, Facebook IDs, postal addresses, and gender. Chris notified them and they secured their database. He has also notified other businesses, such as Kromtech, after he found 13 million MacKeeper users’ information leaking (I think Brian Krebs may be reporting on that one).

So far, none of the above sites seems to have posted any notification on their sites that disclose that their users’ information had been exposed – or for how long it had been exposed. And I can still access OkHello’s backup database that contains videos of children.

Is it time for government or relevant organizations to issue a highly publicized warning about this situation? CERT considered it a high-risk vulnerability when it issued a release in June 2015 about IBM’s noSQL database. Why no warning on MongoDB Database?

As everyone knows, I am not a security professional. But it seems to me the FBI, FTC, and CERT can and should do something to increase awareness and to get entities to secure their leaking databases.

Update1: John Matherly, the founder of Shodan responded to the MacKeeper news on Shodan’s blog. He reported almost identical numbers to what I said above:

At the moment, there are at least 35,000 publicly available, unauthenticated instances of MongoDB running on the Internet. This is an increase of >5,000 instances since the last article. They’re hosted mostly on Amazon, Digital Ocean and Aliyun (cloud computing by Alibaba)

[…]

By default, newer versions of MongoDB only listen on localhost. The fact that MongoDB 3.0 is well-represented means that a lot of people are changing the default configuration of MongoDB to something less secure and aren’t enabling any firewall to protect their database. In the previous article, it looked like the misconfiguration problem might solve itself due to the new defaults that MongoDB started shipping with; that doesn’t appear to be the case based on the new information. It could be that users are upgrading their instances but using their existing, insecure configuration files.

Significantly, he notes:

Finally, I can’t stress enough that this problem is not unique to MongoDB: Redis, CouchDB, Cassandra and Riak are equally impacted by these sorts of misconfigurations.

Okay, so expand the alert/guidance to include them. Whether it’s by intention or by accident, millions of people have their personal information at risk.

 


Related:

  • Cyber-Attack On Bectu’s Parent Union Sparks UK National Security Concerns
  • John Bolton Indictment Provides Interesting Details About Hack of His AOL Account and Extortion Attempt
  • A business's cyber insurance policy included ransom coverage, but when they needed it, the insurer refused to pay. Why?
  • Scenes from a "No Kings" Protest, 10-18-25
  • No Kings. Not Today. Not Ever.
  • An arrested man's lawyer claims his client can't be ShinyHunters' leader. His argument wasn't persuasive.
Category: Commentaries and Analyses

Post navigation

← Two apps with health info found leaking: researcher. Part 2: Hzone
KY: Child identity theft legislation pre-filed in House →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.