From The Fine Article:
"The present attacks against MongoDB seek out installations made accessible to the Internet without a set administrator password. The bad guys take over these accounts, upload the data on the databases, delete that data, and replace it with a ransom demand."
So, yeah, post data to the internet with no password, and people will mess with it; imagine that!
On Wed, Jan 11, 2017 at 10:54 AM, Stephen Russell srussell705@gmail.com wrote:
mmm these dbs are not like the others it seems.
https://nakedsecurity.sophos.com/2017/01/11/thousands-of-mongodb-databases-c...
On Wed, Jan 11, 2017 at 7:00 AM, Richard Kaye rkaye@invaluable.com wrote:
I know, Tracy. I've had a few clients that got hit with ransomware (some multiple times) and they usually know because the exe stops working as the infection spreads.
--
rk -----Original Message----- From: ProfoxTech [mailto:profoxtech-bounces@leafe.com] On Behalf Of Tracy Pearson Sent: Tuesday, January 10, 2017 6:21 PM To: profoxtech@leafe.com Subject: RE: VFP tables likely victims for ransomware?
Richard Kaye wrote on 2017-01-10:
I was a bit unclear, Mike.
I've got some clients who mount their dropbox locations on their local
computers. The nastier bits out there can crawl UNCs now and not just mapped drives. So depending on your backup/sync settings, disaster is just a push away...
--
rk
Richard,
If you can't query the table, the table is bad, *or* in use. LLFF determine if the file is in use.
Lots of possibilities exist when your coding.
Tracy Pearson PowerChurch Software
[excessive quoting removed by server]