A database with over 200GB of data was found on a server left defenseless and open to public query, to anyone knowing where to find it.

The storage included about 445 million customer records from Veeam, a Swiss-based company that provides intelligent data management services for virtual, physical and cloud infrastructures.

Security researcher Bob Diachenko discovered the trove of information on Amazon infrastructure on September 5 and saw it vanish four days later, suggesting that the company heeded his notifications and took steps to secure its MongoDB server.

Wiz

The exposure time of the records is uncertain, but according to Diachenko the IP address of the server had been indexed by Shodan on August 31.

The collection consisted of customer personal information such as first and last name, email address, and country of residence.

Diachenko says that additional details available on the server included marketing attributes, like the type of customer and organization size (enterprise, commercial, SMB), IP addresses, referrer URLs, or user agent.

Looking for details that could help him determine the owner of the server, Diachenko discovered entries created as far back as four years ago.

Veeam counts about 307,000 customers. Among them are Norwegian Cruise Line, Gatwick Airport, Scania, healthcare and educational institutions (several universities and school districts).

Miscofigured MongoDB should be exinct by now

MongoDB was initially used for access from local networks. As its use went beyond these confinements, administrators continued to rely on the default setup, which was not ready for online access.

Starting version 2.6.0, MongoDB no longer allows networked connections unless the administrator explicitly configures them. This was implemented in the most popular deployment packages, RPM and DEB, about five years ago.

Ever since the first misconfigured instances of MongoDB have been reported, cybercriminals began building an extortion business around them.

They search the internet for open-access servers, may export the content, delete it and leave instead a ransom note.

One of the latest campaigns is Mongo Lock. The attackers behind it have automated the operation.

However, as reported by BleepingComputer, the scripts are unreliable and sometimes create the ransom note but leave the data intact.

Veeam replied to a request for comments from BleepingComputer, saying that the information was part of their marketing databases, and was exposed to third parties for a short period.

"It has been brought to our attention that one of our marketing databases, leaving a number of non-sensitive records (i.e. prospect email addresses), was possibly visible to third parties for a short period of time. We have now ensured that ALL Veeam databases are secure.  Veeam takes data privacy and security very seriously, and a full investigation is currently underway," reads the statement from Veeam

Break down IAM silos like Bitpanda, KnowBe4, and PathAI

Broken IAM isn't just an IT problem - the impact ripples across your whole business.

This practical guide covers why traditional IAM practices fail to keep up with modern demands, examples of what "good" IAM looks like, and a simple checklist for building a scalable strategy.

Related Articles:

CISA orders feds to patch MongoBleed flaw exploited in attacks

MongoDB warns admins to patch severe vulnerability immediately

Korean Air data breach exposes data of thousands of employees

Exploited MongoBleed flaw leaks MongoDB secrets, 87K servers exposed

Nissan says thousands of customers exposed in Red Hat breach