Hello.
My server was hacked into Mysql tonight. The databases have been downloaded and information has been left as the new database "PLEASE_READ_ME_XMG" in it, the table "WARNING" and entry one:
"To recover your lost Database and avoid leaking it: Send us 0.06 Bitcoin (BTC) to our Bitcoin address xxxxYhxUDxmxxxxxxxxxxxxxxxx and contact us by Email with your Server IP or Domain name and a Proof of Payment. If you are unsure if we have your data , contact us and we will send you a proof. Your Database is downloaded and backed up on our servers. Backups that we have right now: xxxxx, classicmodels, xxxxxx. If we dont receive your payment in the next 10 Days, we will make your database public or use them otherwise. "
email address "[email protected]"
Fortunately, this is my test server where I test working applications and there was no data important for me. Trash in general.
In addition, I noticed the creation of a new Mysql user "mysqlbackups" with permissions "Select table data | Insert table data | Update table data | Delete table data | Create tables | Drop tables | Reload grants | Shutdown database | Manage processes | File operations | Reference operations | Manage indexes | Alter tables | Show databases | Superuser | Create temp tables | Lock tables | Execute | Slave replication | Client replication | Create View | Show View | Create Routine | Alter Routine | Create User | Create Event | Create Trigger | Create Tablespace "
After the logs, the hack came from the RU.
Well, I forgot to change the default port for Mysql and disable all database users who have external access instead of letting them through the SSH tunnel.
Have you had such cases at home?
What do you think about all this?
My server was hacked into Mysql tonight. The databases have been downloaded and information has been left as the new database "PLEASE_READ_ME_XMG" in it, the table "WARNING" and entry one:
"To recover your lost Database and avoid leaking it: Send us 0.06 Bitcoin (BTC) to our Bitcoin address xxxxYhxUDxmxxxxxxxxxxxxxxxx and contact us by Email with your Server IP or Domain name and a Proof of Payment. If you are unsure if we have your data , contact us and we will send you a proof. Your Database is downloaded and backed up on our servers. Backups that we have right now: xxxxx, classicmodels, xxxxxx. If we dont receive your payment in the next 10 Days, we will make your database public or use them otherwise. "
email address "[email protected]"
Fortunately, this is my test server where I test working applications and there was no data important for me. Trash in general.
In addition, I noticed the creation of a new Mysql user "mysqlbackups" with permissions "Select table data | Insert table data | Update table data | Delete table data | Create tables | Drop tables | Reload grants | Shutdown database | Manage processes | File operations | Reference operations | Manage indexes | Alter tables | Show databases | Superuser | Create temp tables | Lock tables | Execute | Slave replication | Client replication | Create View | Show View | Create Routine | Alter Routine | Create User | Create Event | Create Trigger | Create Tablespace "
After the logs, the hack came from the RU.
Well, I forgot to change the default port for Mysql and disable all database users who have external access instead of letting them through the SSH tunnel.
Have you had such cases at home?
What do you think about all this?