• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Over 90% of Exposed Russian Cloud Databases Compromised

You are here: Home / General Cyber Security News / Over 90% of Exposed Russian Cloud Databases Compromised
March 10, 2022

Pro-Ukraine hackers have compromised a massive quantity of Russian cloud databases, deleting knowledge, renaming files and probably exfiltrating data for potential attacks, scientists have verified.

Jeremiah Fowler and a workforce at Web page Planet decided to glance at the marketing campaign to “hack back” at Russian entities following the invasion of Ukraine.

The Nameless hacking collective declared on February 24 that it was “officially in cyber war” in opposition to the Russian governing administration, even though the Ukrainian vice primary minister, Mykhailo Fedorov, is organizing a volunteer “IT army” of hackers via Telegram to strike Russian targets.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Fowler uncovered that their endeavours are starting up to bear fruit. Out of a random sample of 100 misconfigured Russian cloud databases identified by means of IoT engines and other legitimate strategies, 92 had been compromised.

In the bulk of these scenarios, attackers totally wiped the dataset with a script comparable to the infamous MeowBot. Data files were also renamed with pro-Ukrainian messages this sort of as “putin end this war,” “no war,” and “HackedByUkraine,” he reported.

One of the compromised databases belonged to the put up-Soviet Commonwealth of Independent States (CIS).

“Hundreds of folders in the databases experienced been renamed to ‘putin_stop_this_war.’ In addition to the hack, it seems that the database exposed extremely weak administrative qualifications and quite a few emails. This would also make workforce straightforward targets for social engineering to obtain entry deeper in the business or social engineering,” Fowler explained.

“We do not know if info was downloaded or what the hackers plan to do with this facts, but most likelihood these uncovered persons deal with true hazards of even more cyber steps.”

Hacktivists could theoretically use personal information and facts uncovered in this kind of attacks to concentrate on people with spear-phishing and/or destructive malware.

Other notable finds were being a dataset managed by Russian internet service provider “Green Dot” and a trove that contains “a incredibly significant number” of top secret keys referencing Russian email giant mail.ru as the host server.

Even though specific attribution is demanding, “we can only think they are affiliated with or supporters of Nameless dependent on the timeline of when the Russian databases were being qualified,” Fowler reported of the hackers liable.

The information arrives as the Russian government yesterday revealed hackers had brought on short-term outages of a number of company websites by focusing on an externally loaded widget utilised to accumulate customer figures.


Some components of this report are sourced from:
www.infosecurity-magazine.com

Previous Post: «ukrainian hacker linked to revil ransomware attacks extradited to united Ukrainian Hacker Linked to REvil Ransomware Attacks Extradited to United States
Next Post: UK Security Agency Issues New Guidance on Data Center Protection Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • WhatsApp Unveils Proxy Support to Tackle Internet Censorship
  • Hackers Using CAPTCHA Bypass Tactics in Freejacking Campaign on GitHub
  • Blind Eagle Hacking Group Targets South America With New Tools
  • US Family Planning Non-Profit MFHS Confirms Ransomware Attack
  • Microsoft Reveals Tactics Used by 4 Ransomware Families Targeting macOS
  • Dridex Malware Now Attacking macOS Systems with Novel Infection Method
  • Cyber attacks on UK organisations surged 77% in 2022, new research finds
  • WhatsApp to combat internet blackouts with proxy server support
  • The IT Pro Podcast: Going passwordless
  • Podcast transcript: Going passwordless

Copyright © TheCyberSecurity.News, All Rights Reserved.