Dozens of unsecured databases exposed on the public web are the target of an automated ‘meow’ attack that destroys data without any explanation.The activity started recently and hits Elasticsearch and MongoDB instances indiscriminately without leaving any explanation, or even a ransom note.A quick search by BleepingComputer on the IoT search engine Shodan has found dozens of databases that have been affected by this attack.These attacks have pushed researchers into a race to find the exposed databases and report them responsibly before they become ‘meowed.’
Cat’s out of the bag
The most recent publicly known example of a Meow attack is an Elasticsearch database belonging to a VPN provider that claimed not to keep any logs.Discovered by researcher Bob Diachenko, the database was initially secured in July only to become exposed again five days later.The second time, though, the owner no longer received a well-intended notification. Instead, they got ‘meowed,’ with almost all records getting wiped.Diachenko told BleepingComputer that there are not many details about the attacker or the purpose of their actions. He says that the attack appears to be an automated script that “overwrites or destroys the data completely.”Researchers first observed the ‘meow’ database attacks a few days ago. They could be the work of a vigilante trying to give administrators a hard lesson in security by raining destruction on unsecured data.Victor Gevers, the chairman of the non-profit GDI Foundation, saw this type of attack, too. He says that the actor is also attacking exposed MongoDB databases, hitting as much as they can.
He also saw the first ‘meow’ attacks a few days ago, with a recent one occurring earlier today, just a couple of hours after a GDI volunteer disclosed it responsibly to the owner.
Obstructing researchers
If behind these incidents are positive intentions, sometimes nothing good comes out of them and valuable data that could be lost in the process.Data leaks from unsecured MongoDB and Elasticsearch instances reachable over the public internet are on a descending curve, but there is still some “very sensitive” information exposed.As Gevers puts it, “some leaks bring bad things to the light, which need to be shared,” and wiping them brings benefits to no one.
“It is becoming a race to find these leaks as early as possible. This reduces the amount of time that can be spent on researching and reporting” – Victor Gevers
Whoever is behind the ‘meow’ attacks is likely to keep on targeting unsecured databases, aggressively destroying them. Administrators should make sure that they expose only what needs to be exposed and make sure the assets are properly secured.
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.