Jump to content

Ongoing Meow attack has nuked >1,000 databases without telling anyone why

Pickles von Brine

 

 

Summary

More than 1,000 unsecured databases so far have been permanently deleted in an ongoing attack that leaves the word “meow” as its only calling card, according to Internet searches over the past day.

 

Quotes

Quote

The attack first came to the attention of researcher Bob Diachenko on Tuesday, when he discovered a database that stored user details of the UFO VPN had been destroyed. UFO VPN had already been in the news that day because the world-readable database exposed a wealth of sensitive user information, including:

  • Account passwords in plain text
  • VPN session secrets and tokens
  • IP addresses of both user devices and the VPN servers they connected to
  • Connection timestamps
  • Geo-tags
  • Device and OS characteristics
  • Apparent domains from which advertisements are injected into free users’ Web browsers

Besides amounting to a serious privacy breach, the database was at odds with the Hong Kong-based UFO’s promise to keep no logs. The VPN provider responded by moving the database to a different location but once again failed to secure it properly. Shortly after, the Meow attack wiped it out.

Representatives of UFO didn’t immediately respond to an email seeking comment.

Since then, Meow and a similar attack have destroyed more than 1,000 other databases. At the time this post went live, the Shodan computer search site showed that 987 ElasticSearch and 70 MongoDB instances had been nuked by Meow. A separate, less-malicious attack tagged an additional 616 ElasticSearch, MongoDB, and Cassandra files with the string “university_cybersec_experiment.” The attackers in this case seem to be demonstrating to the database maintainers that the files are vulnerable to being viewed or deleted.

One database affected by the Meow attack.

My thoughts

Um... What?  Unsecure databases are just being deleted with the word "meow". This almost sounds like something a 13 year old did it. It is so weird. I am not sure what to really say other than protect your stuff, make sure things are siloed and use protection. Though... um... thoughts? Any idea why in the hell someone would do this? I cannot thing of it anything other than someone being an ass. 

 

Source

 

Be sure to @Pickles von Brine if you want me to see your reply!

Stopping by to praise the all mighty jar Lord pickles... * drinks from a chalice of holy pickle juice and tossed dill over shoulder* ~ @WarDance
3600x | NH-D15 Chromax Black | 32GB 3200MHz | ASUS KO RTX 3070 UnderVolted and UnderClocked | Gigabyte Aorus Elite AX X570S | Seasonic X760w | Phanteks Evolv X | 500GB WD_Black SN750 x2 | Sandisk Skyhawk 3.84TB SSD 

Link to comment
Share on other sites

Link to post
Share on other sites

Silly cat, that's not Meow Mix
 

 

PLEASE QUOTE ME IF YOU ARE REPLYING TO ME

Desktop Build: Ryzen 7 2700X @ 4.0GHz, AsRock Fatal1ty X370 Professional Gaming, 48GB Corsair DDR4 @ 3000MHz, RX5700 XT 8GB Sapphire Nitro+, Benq XL2730 1440p 144Hz FS

Retro Build: Intel Pentium III @ 500 MHz, Dell Optiplex G1 Full AT Tower, 768MB SDRAM @ 133MHz, Integrated Graphics, Generic 1024x768 60Hz Monitor


 

Link to comment
Share on other sites

Link to post
Share on other sites

2 minutes ago, Pickles - Lord of the Jar said:

 

My thoughts

Um... What?  Unsecure databases are just being deleted with the word "meow". This almost sounds like something a 13 year old did it. It is so weird. I am not sure what to really say other than protect your stuff, make sure things are siloed and use protection. Though... um... thoughts? Any idea why in the hell someone would do this? I cannot thing of it anything other than someone being an ass. 

 

I mean, the biggest ass is the one keeping logs despite claiming not to, then leaving that out in the open...

This could be like that IoT virus that infects devices, removes botnets, and secure the device so botnets can't return. Of course, it locks out the device owners as well in the process, so not "harmless", but more like a "guerrilla security" type of thing. This looks similar in that it is destructive (way more than the botnet example), but it also prevents data leaks. Maybe some angry ITSec specialist went on a crusade, "if you can't securely store data then you better not have any data" type of logic.

Link to comment
Share on other sites

Link to post
Share on other sites

it was @seon123

PC: Motherboard: ASUS B550M TUF-Plus, CPU: Ryzen 3 3100, CPU Cooler: Arctic Freezer 34, GPU: GIGABYTE WindForce GTX1650S, RAM: HyperX Fury RGB 2x8GB 3200 CL16, Case, CoolerMaster MB311L ARGB, Boot Drive: 250GB MX500, Game Drive: WD Blue 1TB 7200RPM HDD.

 

Peripherals: GK61 (Optical Gateron Red) with Mistel White/Orange keycaps, Logitech G102 (Purple), BitWit Ensemble Grey Deskpad. 

 

Audio: Logitech G432, Moondrop Starfield, Mic: Razer Siren Mini (White).

 

Phone: Pixel 3a (Purple-ish).

 

Build Log: 

Link to comment
Share on other sites

Link to post
Share on other sites

14 minutes ago, Pickles - Lord of the Jar said:

 

My thoughts

Um... What?  Unsecure databases are just being deleted with the word "meow". This almost sounds like something a 13 year old did it. It is so weird. I am not sure what to really say other than protect your stuff, make sure things are siloed and use protection. Though... um... thoughts? Any idea why in the hell someone would do this? I cannot thing of it anything other than someone being an ass. 

 

Source

 

There are whitehat hackers, and then there are blackhat hackers. Whitehat's find the problems and try to get the people responsible to fix them. Blackhat's find the problems and exploit or destroy them, for fun.

 

Like it's an eventuality that someone will use the same exploit to just destroy everything exploitable where as botnets would rather not destroy their victim's machines otherwise they would destroy themselves in the process. Like that is one version of the Armageddon for botnets.

 

https://en.wikipedia.org/wiki/CIH_(computer_virus)

 

This was the last known time that something was known to permanently destroy PC's on purpose and was widely proliferated. Stuxnet was a narrowly targeted one that targeted PLC's. Most other destructiveness comes from malware designed to extort the victim, and doesn't spread like a virus. Wannacry is probably the last thing that was semi-destructive with this nature, and was something that could have been prevented had the NSA not sat on it.

Link to comment
Share on other sites

Link to post
Share on other sites

at least this person speaks english

I know that in japnesse meow is nya

Everyone, Creator初音ミク Hatsune Miku Google commercial.

 

 

Cameras: Main: Canon 70D - Secondary: Panasonic GX85 - Spare: Samsung ST68. - Action cams: GoPro Hero+, Akaso EK7000pro

Dead cameras: Nikion s4000, Canon XTi

 

Pc's

Spoiler

Dell optiplex 5050 (main) - i5-6500- 20GB ram -500gb samsung 970 evo  500gb WD blue HDD - dvd r/w

 

HP compaq 8300 prebuilt - Intel i5-3470 - 8GB ram - 500GB HDD - bluray drive

 

old windows 7 gaming desktop - Intel i5 2400 - lenovo CIH61M V:1.0 - 4GB ram - 1TB HDD - dual DVD r/w

 

main laptop acer e5 15 - Intel i3 7th gen - 16GB ram - 1TB HDD - dvd drive                                                                     

 

school laptop lenovo 300e chromebook 2nd gen - Intel celeron - 4GB ram - 32GB SSD 

 

audio mac- 2017 apple macbook air A1466 EMC 3178

Any questions? pm me.

#Muricaparrotgang                                                                                   

 

Link to comment
Share on other sites

Link to post
Share on other sites

Over 1000 data bases is a lot of databases.  Just because the database it was discovered having attacked was ugly doesn’t mean they all were.  Makes me wonder if there’s a commonality amongst them other than them being unsecured.  Also a common way to hide ones tracks is to make a lot of them.  Attacker might have only been interested in one of the databases but killed the lot to obfuscate  involvement.  If it was just one database a lone might more easily be drawn.

Not a pro, not even very good.  I’m just old and have time currently.  Assuming I know a lot about computers can be a mistake.

 

Life is like a bowl of chocolates: there are all these little crinkly paper cups everywhere.

Link to comment
Share on other sites

Link to post
Share on other sites

Seems like something the owner of the channel Linus Cat Tips might now something about :D

Main Rig:-

Ryzen 7 3800X | Asus ROG Strix X570-F Gaming | 16GB Team Group Dark Pro 3600Mhz | Corsair MP600 1TB PCIe Gen 4 | Sapphire 5700 XT Pulse | Corsair H115i Platinum | WD Black 1TB | WD Green 4TB | EVGA SuperNOVA G3 650W | Asus TUF GT501 | Samsung C27HG70 1440p 144hz HDR FreeSync 2 | Ubuntu 20.04.2 LTS |

 

Server:-

Intel NUC running Server 2019 + Synology DSM218+ with 2 x 4TB Toshiba NAS Ready HDDs (RAID0)

Link to comment
Share on other sites

Link to post
Share on other sites

Honestly…even if a meow ends up being a company that has my data (or even ESPECIALLY if it does), I applaud the meow hacker.  They're basically just removing what should be private data from the public view, and from the hands of those who already showed they couldn't be trusted with it.

Link to comment
Share on other sites

Link to post
Share on other sites

8 minutes ago, Kisai said:

There are whitehat hackers, and then there are blackhat hackers. Whitehat's find the problems and try to get the people responsible to fix them. Blackhat's find the problems and exploit or destroy them, for fun.

 

Like it's an eventuality that someone will use the same exploit to just destroy everything exploitable where as botnets would rather not destroy their victim's machines otherwise they would destroy themselves in the process. Like that is one version of the Armageddon for botnets.

 

https://en.wikipedia.org/wiki/CIH_(computer_virus)

 

This was the last known time that something was known to permanently destroy PC's on purpose and was widely proliferated. Stuxnet was a narrowly targeted one that targeted PLC's. Most other destructiveness comes from malware designed to extort the victim, and doesn't spread like a virus. Wannacry is probably the last thing that was semi-destructive with this nature, and was something that could have been prevented had the NSA not sat on it.

There.s also the ones who operate between the two called Grey Hats. These go one of two ways, they operate using questionable methods but do submit bugs to be fixed or they will submit a bug, claim its bounty then release it anyway (after the grace period has expired).

 

Actually within the last few weeks it was revealed that a prominent hacker in the Vita/Playstation scene received payment from Sony to not reveal a PS4 Kernel Exploits for a year. The exploit was patched months ago now but the year is almost up and the PS4 scene is hoping that when he does release it will lead to PS4s up to Firmware V7 being exploitable.

Main Rig:-

Ryzen 7 3800X | Asus ROG Strix X570-F Gaming | 16GB Team Group Dark Pro 3600Mhz | Corsair MP600 1TB PCIe Gen 4 | Sapphire 5700 XT Pulse | Corsair H115i Platinum | WD Black 1TB | WD Green 4TB | EVGA SuperNOVA G3 650W | Asus TUF GT501 | Samsung C27HG70 1440p 144hz HDR FreeSync 2 | Ubuntu 20.04.2 LTS |

 

Server:-

Intel NUC running Server 2019 + Synology DSM218+ with 2 x 4TB Toshiba NAS Ready HDDs (RAID0)

Link to comment
Share on other sites

Link to post
Share on other sites

Cats: known to meow and knock things over.

How to remove an SQL table (part of a DB): DROP TABLE table_name;

 

I rest my case.

"We're all in this together, might as well be friends" Tom, Toonami.

 

mini eLiXiVy: my open source 65% mechanical PCB, a build log, PCB anatomy and discussing open source licenses: https://linustechtips.com/topic/1366493-elixivy-a-65-mechanical-keyboard-build-log-pcb-anatomy-and-how-i-open-sourced-this-project/

 

mini_cardboard: a 4% keyboard build log and how keyboards workhttps://linustechtips.com/topic/1328547-mini_cardboard-a-4-keyboard-build-log-and-how-keyboards-work/

Link to comment
Share on other sites

Link to post
Share on other sites

1 minute ago, minibois said:

Cats: known to meow and knock things over.

How to remove an SQL table (part of a DB): DROP TABLE table_name;

 

I rest my case.

You know who else is famous for dropping things? The owner of Linus Cat Tips...

 

The plot thickens.

Main Rig:-

Ryzen 7 3800X | Asus ROG Strix X570-F Gaming | 16GB Team Group Dark Pro 3600Mhz | Corsair MP600 1TB PCIe Gen 4 | Sapphire 5700 XT Pulse | Corsair H115i Platinum | WD Black 1TB | WD Green 4TB | EVGA SuperNOVA G3 650W | Asus TUF GT501 | Samsung C27HG70 1440p 144hz HDR FreeSync 2 | Ubuntu 20.04.2 LTS |

 

Server:-

Intel NUC running Server 2019 + Synology DSM218+ with 2 x 4TB Toshiba NAS Ready HDDs (RAID0)

Link to comment
Share on other sites

Link to post
Share on other sites

Just now, Master Disaster said:

You know who else is famous for dropping things? The owner of Linus Cat Tips...

The plot thickens.

And Razer has been known to create cat ear headsets... Linus used a clone of such headsets, where the ears were speakers..

 

 

In conclusion: Linus stole Razer Valerie

Could Linus know who stole Project Valerie? - General Discussion ...

"We're all in this together, might as well be friends" Tom, Toonami.

 

mini eLiXiVy: my open source 65% mechanical PCB, a build log, PCB anatomy and discussing open source licenses: https://linustechtips.com/topic/1366493-elixivy-a-65-mechanical-keyboard-build-log-pcb-anatomy-and-how-i-open-sourced-this-project/

 

mini_cardboard: a 4% keyboard build log and how keyboards workhttps://linustechtips.com/topic/1328547-mini_cardboard-a-4-keyboard-build-log-and-how-keyboards-work/

Link to comment
Share on other sites

Link to post
Share on other sites

This seems like a grey hat hacker showing that those databases are vulnerable.

Specs: Motherboard: Asus X470-PLUS TUF gaming (Yes I know it's poor but I wasn't informed) RAM: Corsair VENGEANCE® LPX DDR4 3200Mhz CL16-18-18-36 2x8GB

            CPU: Ryzen 9 5900X          Case: Antec P8     PSU: Corsair RM850x                        Cooler: Antec K240 with two Noctura Industrial PPC 3000 PWM

            Drives: Samsung 970 EVO plus 250GB, Micron 1100 2TB, Seagate ST4000DM000/1F2168 GPU: EVGA RTX 2080 ti Black edition

Link to comment
Share on other sites

Link to post
Share on other sites

47 minutes ago, justpoet said:

Honestly…even if a meow ends up being a company that has my data (or even ESPECIALLY if it does), I applaud the meow hacker.  They're basically just removing what should be private data from the public view, and from the hands of those who already showed they couldn't be trusted with it.

Still makes assumptions about those thousand plus databases.  We only know about one of them.  They should all be looked at

Not a pro, not even very good.  I’m just old and have time currently.  Assuming I know a lot about computers can be a mistake.

 

Life is like a bowl of chocolates: there are all these little crinkly paper cups everywhere.

Link to comment
Share on other sites

Link to post
Share on other sites

40 minutes ago, williamcll said:

This seems like a grey hat hacker showing that those databases are vulnerable.

Might be.  There are a bunch of possibles.

Not a pro, not even very good.  I’m just old and have time currently.  Assuming I know a lot about computers can be a mistake.

 

Life is like a bowl of chocolates: there are all these little crinkly paper cups everywhere.

Link to comment
Share on other sites

Link to post
Share on other sites

Is there news if it's been limited to only MySQL backed DB? or have they hit PSQL as well? honestly, I'm not surprised; I think people believe that there is a-lot more organization within companies with security and data, especially at the startup -> small stage, the amount of client DB we've had to clean & fix was astonishing when I started dealing with WP owners. More often than not, the database is exposed because companies are tied down with so much tech overhead and things get forgotten; solid reminder for ip whitelisting & tidying up at the end of the day..

Link to comment
Share on other sites

Link to post
Share on other sites

1 hour ago, minibois said:

Cats: known to meow and knock things over.

How to remove an SQL table (part of a DB): DROP TABLE table_name;

 

I rest my case.

As the proud slave of multiple cats, I concur.

Link to comment
Share on other sites

Link to post
Share on other sites

16 minutes ago, rewird said:

Is there news if it's been limited to only MySQL backed DB? or have they hit PSQL as well? honestly, I'm not surprised; I think people believe that there is a-lot more organization within companies with security and data, especially at the startup -> small stage, the amount of client DB we've had to clean & fix was astonishing when I started dealing with WP owners. More often than not, the database is exposed because companies are tied down with so much tech overhead and things get forgotten; solid reminder for ip whitelisting & tidying up at the end of the day..

The source only mentions ElasticSearch, MongoDB, and Cassandra - all of which have nothing in common with MySQL/MariaDB and PostgreSQL.

Looking to buy GTX690, other multi-GPU cards, or single-slot graphics cards: 

 

Link to comment
Share on other sites

Link to post
Share on other sites

I’d have left a picture of a kitty that says “I’m hungry.”

My eyes see the past…

My camera lens sees the present…

Link to comment
Share on other sites

Link to post
Share on other sites

2 hours ago, rewird said:

Is there news if it's been limited to only MySQL backed DB? or have they hit PSQL as well? honestly, I'm not surprised; I think people believe that there is a-lot more organization within companies with security and data, especially at the startup -> small stage, the amount of client DB we've had to clean & fix was astonishing when I started dealing with WP owners. More often than not, the database is exposed because companies are tied down with so much tech overhead and things get forgotten; solid reminder for ip whitelisting & tidying up at the end of the day..

Wordpress is just utter rubbish and people should not use it unless they extensively blog/engage with comments. It's not a CMS so much as an incomplete collection of modules that doesn't quite do enough in the base (eg no caching) but the stuff it does come with or encourage you to use bloats the RAM use to the point that it overwhelms "free hosting" and "cheap hosting" sites, so they won't allow people to run it if gets more than 10 page views per second.

 

Link to comment
Share on other sites

Link to post
Share on other sites

47 minutes ago, Caroline said:

43eqlp.jpg

Well that is what he would say.  Insinuation without any evidence for his own personal advantage has been something we’ve seen a lot of.  Not to say it didn’t come from China.  Would be an extremely strange thing for their government to do.   Lot of people in China and individuals there are just as likely to be opinionated as anywhere else.   I still think a careful look at exactly what databases got scrubbed could prove enlightening.  There may have been only one actual target, with the others attacked merely to confuse the issue.

Not a pro, not even very good.  I’m just old and have time currently.  Assuming I know a lot about computers can be a mistake.

 

Life is like a bowl of chocolates: there are all these little crinkly paper cups everywhere.

Link to comment
Share on other sites

Link to post
Share on other sites

11 hours ago, Pickles - Lord of the Jar said:

My thoughts

Um... What?  Unsecure databases are just being deleted with the word "meow". This almost sounds like something a 13 year old did it. It is so weird. I am not sure what to really say other than protect your stuff, make sure things are siloed and use protection. Though... um... thoughts? Any idea why in the hell someone would do this? I cannot thing of it anything other than someone being an ass. 

Well, on one hand, it's a terrible practice to leave databases open to the public internet without any form of secure, 2 factor authentication or token system. Maybe they did it for the lulz, maybe they have an agenda, or maybe we'll never know. One thing we do know is that there is always a relevant XKCD. :D 

https://xkcd.com/327/

Exploits of a Mom

 

9 hours ago, VegetableStu said:

 

 

Ah, yes, good old Cyriak, up to his tricks again.

 

 

Desktop: KiRaShi-Intel-2022 (i5-12600K, RTX2060) Mobile: OnePlus 5T | Koodo - 75GB Data + Data Rollover for $45/month
Laptop: Dell XPS 15 9560 (the real 15" MacBook Pro that Apple didn't make) Tablet: iPad Mini 5 | Lenovo IdeaPad Duet 10.1
Camera: Canon M6 Mark II | Canon Rebel T1i (500D) | Canon SX280 | Panasonic TS20D Music: Spotify Premium (CIRCA '08)

Link to comment
Share on other sites

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now

×