Article 561W3 Ongoing Meow attack has nuked >1,000 databases without telling anyone why

Ongoing Meow attack has nuked >1,000 databases without telling anyone why

by
Dan Goodin
from Ars Technica - All content on (#561W3)
cat-meow-800x518.jpg

Enlarge (credit: David Sutterlutti / Flickr)

More than 1,000 unsecured databases so far have been permanently deleted in an ongoing attack that leaves the word meow" as its only calling card, according to Internet searches over the past day.

The attack first came to the attention of researcher Bob Diachenko on Tuesday, when he discovered a database that stored user details of the UFO VPN had been destroyed. UFO VPN had already been in the news that day because the world-readable database exposed a wealth of sensitive user information, including:

  • Account passwords in plain text
  • VPN session secrets and tokens
  • IP addresses of both user devices and the VPN servers they connected to
  • Connection timestamps
  • Geo-tags
  • Device and OS characteristics
  • Apparent domains from which advertisements are injected into free users' Web browsers

Besides amounting to a serious privacy breach, the database was at odds with the Hong Kong-based UFO's promise to keep no logs. The VPN provider responded by moving the database to a different location but once again failed to secure it properly. Shortly after, the Meow attack wiped it out.

Read 6 remaining paragraphs | Comments

index?i=xJ_OaYc1QOs:3KHzlOSK-II:V_sGLiPB index?i=xJ_OaYc1QOs:3KHzlOSK-II:F7zBnMyn index?d=qj6IDK7rITs index?d=yIl2AUoC8zA
External Content
Source RSS or Atom Feed
Feed Location http://feeds.arstechnica.com/arstechnica/index
Feed Title Ars Technica - All content
Feed Link https://arstechnica.com/
Reply 0 comments