684.8 TB of Data Exposed by Publicly Accessible MongoDB Servers

684.8 TB of Data Exposed by Publicly Accessible MongoDB Servers

In light of the recent incident of MacKeeper exposing 13 million accounts through a public, unauthenticated MongoDB instances I wanted to quickly revisit my earlier blog post on the subject.

At the moment, there are at least 35,000 publicly available, unauthenticated instances of MongoDB running on the Internet. This is an increase of >5,000 instances since the last article. They're hosted mostly on Amazon, Digital Ocean and Aliyun (cloud computing by Alibaba):

The most popular versions of MongoDB are:

  1. 3.0.7: 3,010
  2. 2.4.9: 2,624
  3. 2.4.14: 2,535
  4. 2.4.10: 1,879
  5. 3.0.6: 1,256

By default, newer versions of MongoDB only listen on localhost. The fact that MongoDB 3.0 is well-represented means that a lot of people are changing the default configuration of MongoDB to something less secure and aren't enabling any firewall to protect their database. In the previous article, it looked like the misconfiguration problem might solve itself due to the new defaults that MongoDB started shipping with; that doesn't appear to be the case based on the new information. It could be that users are upgrading their instances but using their existing, insecure configuration files.

In terms of data volume, all of the exposed databases combined account for 684.8 TB of data. And the most popular database names are:

  1. local: 33,947
  2. admin: 23,970
  3. db: 8,638
  4. test: 6,761
  5. config: 859
  6. test1: 612
  7. mydb: 549
  8. DrugSupervise: 382
  9. Video: 376
  10. mean-dev: 252

The database names are mostly the same as before, with the exception of: DrugSupervise and mean-dev. Notably absent is hackedDB which was at #8 last time.

Finally, I can't stress enough that this problem is not unique to MongoDB: Redis, CouchDB, Cassandra and Riak are equally impacted by these sorts of misconfigurations.

Nice! That's about 17.11 Library of Congress' in print form :D

回复

要查看或添加评论,请登录

John Matherly的更多文章

  • Introducing Shodan Trends

    Introducing Shodan Trends

    Shodan was originally designed as a tool to understand how technology use is changing on the Internet. The information…

  • Trends in Internet Exposure

    Trends in Internet Exposure

    More companies are going remote due to COVID-19 and as a result there's been a lot of speculation around how this…

    8 条评论
  • Analyzing Post-WannaCry SMB Exposure

    Analyzing Post-WannaCry SMB Exposure

    It's been a month since the WannaCry ransomware attack wrecked havoc across Windows networks via SMB and I'd like to…

    5 条评论
  • Understanding SSL Usage by Country

    Understanding SSL Usage by Country

    Real-world borders don't necessarily translate to the Internet but it can still reveal useful information as shown by…

    2 条评论
  • 49,153 PB of Memory Available

    49,153 PB of Memory Available

    I've written and presented on the topic of insecure databases for nearly 2 years now. The example I use the most to…

  • Tracking HTTP/2.0 Adoption

    Tracking HTTP/2.0 Adoption

    HTTP/2.0 is the next version of the protocol powering websites and it promises many improvements over HTTP/1.

    5 条评论
  • Top 10 Website Hackers for June

    Top 10 Website Hackers for June

    I wanted to revisit the results of an earlier post this year on how to track website defacements and see how things…

    4 条评论
  • Challenges in Taking Things Offline

    Challenges in Taking Things Offline

    Shodan has been in the news for the past few years largely due to the discoveries that security researchers have made…

    8 条评论
  • Hiding in Plain Sight

    Hiding in Plain Sight

    A common reaction I get when talking about devices exposed on the Internet is something like the following:…

    2 条评论

社区洞察

其他会员也浏览了