Ad End 1 May 2026
Ad End 4 April 2026
banner Expire 3 July 2026
ad End 25 April 2026
banner Expire 25 April 2025
adv exp at 20 April 2026
banner Expire 10 May 2026
banner Expire 23 June 2026
ad End 17 June 2026
What's new
Ads end 31 October 2026
ad End 5 May 2026
Money Club cc shop
Wizard's shop 2.0
Ad Ends 13 July 2025
Trump cc shop
UniCvv
RonalClub cc shop
BidenCash Shop
Blackstash cc shop
Kfc CLub
Yale Lodge
best shop

Ransomware Campaign Targets MySQL Servers

File_closed07

TRUSTED VERIFIED SELLER
Staff member
Joined
Jun 13, 2020
Messages
8,061
Reaction score
1,031
Points
212
Awards
2
  • trusted user
  • Rich User
Internet-connected MySQL databases around the world are being targeted by a double extortion ransomware campaign that researchers have dubbed PLEASE_READ_ME.

The campaign, which dates back to at least January 2020, was detected by researchers at Guardicore Labs. So far, it has breached more than 83,000 of the more than five million internet-facing MySQL databases in existence worldwide.

Simple but effective in its approach, the campaign uses file-less ransomware to exploit weak credentials in MySQL servers. After gaining entry, the attackers lock the databases and steal data.

The attack is a double extortion because its authors use two different tactics to turn a profit. First, they try to blackmail the database owners into handing over money to retrieve access to their data. Second, they sell the stolen data online to the highest bidder.

Researchers noted that the attackers have been able to offer over 250,000 databases for sale on a dark web auction site so far.

The attackers leave a backdoor user on the database for persistence, allowing them to re-access the network whenever the mood strikes them.

Researchers were able to trace the origins of the attacks to 11 different IP addresses, the majority of which are based in Ireland and the UK.

Since spotting the first attack on January 24, the Guardicore Global Sensors Network (GGSN) has reported a total of 92 attacks. Since October, the rate at which attacks are being launched has risen steeply.

Two variants have been used over the campaign's lifetime, showing an evolution in the attackers' tactics. The first was used from January to the end of November for 63 attacks, and the second phase kicked off on October 3, halting at November's end.

In phase one, the attackers left a ransom note with their wallet address, the amount of Bitcoin to pay, and an email address for technical support. Victims were given 10 days to pay up.

"We found that a total of 1.2867640900000001 BTC had been transferred to these wallets, equivalent to 24,906 USD," noted researchers.

In the second phase, the attackers ditched the Bitcoin wallet in favor of a website in the TOR network where payment could be made.
 
Ad End 1 November 2024
Top