All Posts
Cyber Threat Intelligence
Modern Honey Network
1
min read

MHN Radar: Databases Under Siege

Published on
February 16, 2017
Table of Contents
<p>Anomali’s <a href="https://threatstream.github.io/mhn/" target="_blank">Modern Honeypot Network</a> (MHN for short) is a worldwide network of honeypot sensors that collects data on scans, probes and intrusions of various network ports and services. By looking at data collected by MHN we can piece together a picture of the current threat landscape for a variety of services.</p><p>Recently, security headlines have been ripe with <a href="https://threatpost.com/attacks-on-mongodb-rise-as-hijackings-continue/122887/" target="_blank">reports of ongoing campaigns against exposed database servers</a> on the internet. Many of them ending up fully compromised and having data hijacked by cyber criminals using <a href="https://www.htbridge.com/blog/ransomweb_emerging_website_threat.html" target="_blank">Linux variants of ransomware</a> that encrypt the database. Affected database installations include MongoDB, ElasticSearch, Hadoop, Cassandra, CouchDB as well as other well-known databases.</p><p>If you are running any of these database technologies, you are urged to immediately review your security posture and ensure systems are not exposed.</p><p>The primary issue is that these database systems are setup with default configurations and then made accessible on the open internet.  This is usually by way of opening ports on a firewall or in some cases directly connecting the system to the internet without sufficient hardening of the OS and applications. (Did we mention some don’t even bother to change the default password?)</p><p>Once installed, the database usually runs quietly as a backend service and unless configured otherwise will listen on its default TCP port (common ones listed below). If that TCP port is accessible via the open internet it means anyone can run a scan and identify systems running these services, making them potential targets for attacks.</p><table align="center" class="table table-bordered table-striped" style="width: 300px;"><thead><tr><th scope="col">DB</th><th scope="col">TCP Port</th></tr></thead><tbody><tr><td>MongoDB</td><td>27017</td></tr><tr><td>ElasticSearch</td><td>9200</td></tr><tr><td>Hadoop</td><td>50070</td></tr><tr><td>Cassandra</td><td>9160</td></tr><tr><td>CouchDB</td><td>5984</td></tr></tbody></table><p style="text-align: center;"><em>Default TCP Ports for common databases</em></p><p>Looking through data available in MHN, we can see the distribution of connection attempts to backend database services for the past year. As far as TCP port activity goes, MongoDB (TCP port 27107) eclipse’s the others in terms of overall volume with Elasticsearch (TCP port 9200) coming in second place.</p><p style="text-align: center;"><em><img alt="" src="https://cdn.filestackcontent.com/sQPdY69LTiK1AXdx46ra"/></em></p><p style="text-align: center;"><em>Figure 1 – TCP port activity, 2016 on left and 2017 year to date on right.</em></p><h2>Volume of scans for backend database services within MHN</h2><p>This is where things start to get interesting. Up until late last year there was only a trickle of scans, though MongoDB was already at the forefront signaling what was yet to come.</p><p><strong>2016</strong><br/> <img alt="" src="https://cdn.filestackcontent.com/XT2Kcqv5QpWs6hoHVyb9"/></p><p><strong>2017</strong><br/> <img alt="" src="https://cdn.filestackcontent.com/kNrTuC5XSrG2c6YXHVT8"/></p><p style="text-align:center;"><em>Figure 2 – Database TCP Port activity. The bad guys are REALLY interested in MongoDB!</em></p><p>As you can see above, since 2017 started there has seen a significant increase in activity to database services. MongoDB saw more than a 10-fold increase in activity but the other services saw major increases as well. There is no question that exposed databases are actively under attack and it’s ongoing.</p><p>Geographically, the US has the highest number of exposed systems for all the represented databases (according to data from shodan.io). The majority of the probes against MongoDB came from an IP located in China and hosted on AS4837.</p><h2>What’s Next?</h2><p>Attackers will continue to scour the internet for openly accessible databases. Security teams should to be on alert for associated activity and expect scans and probes against any exposed systems, <a href="https://cwe.mitre.org/data/definitions/200.html" target="_blank">information disclosure</a> alone can be enough to trigger an attack. This should serve as a reminder that security is rarely a “set it &amp; forget it” deal. If you set it up, you must harden it or at least make sure it is not accessible to anyone that is not authorized. Poking holes in the firewall so you can manage the DB remotely may be convenient, but it may be very costly as well.</p><h2>Additional Information</h2><p>Every environment is different and fully securing your databases may require additional mitigation. You are encouraged to seek help from the security community and or professionals for the particular database technology.</p><p>Proactively looking for signs of activity related to probes, scans, or authentication attempts may be helpful in determining your risk level or amount of exposure. Having access to up to date Threat Intelligence is vital in battling threats like these as it empowers your security team to know which needles to look for in your haystack.</p><p>The following short list of vendor recommendations may also help get your started.</p><ul><li><strong>MongoDB Security checklist</strong><br/> <a href="https://docs.mongodb.com/manual/administration/security-checklist/" target="_blank">https://docs.mongodb.com/manual/administration/security-checklist/</a></li><li><strong>ElasticSearch</strong><br/> <a href="http://code972.com/blog/2017/01/107-dont-be-ransacked-securing-your-elasticsearch-cluster-properly" target="_blank">http://code972.com/blog/2017/01/107-dont-be-ransacked-securing-your-elasticsearch-cluster-properly</a></li><li><strong>Cassandra</strong><br/> <a href="https://docs.datastax.com/en/cassandra/3.0/cassandra/configuration/secureIntro.html" target="_blank">https://docs.datastax.com/en/cassandra/3.0/cassandra/configuration/secureIntro.html</a></li><li><strong>Hadoop</strong><br/> <a href="https://hadoop.apache.org/docs/r3.0.0-alpha1/hadoop-project-dist/hadoop-common/SecureMode.html" target="_blank">https://hadoop.apache.org/docs/r3.0.0-alpha1/hadoop-project-dist/hadoop-common/SecureMode.html</a></li><li><strong>CouchDB</strong><br/> <a href="https://cwiki.apache.org/confluence/display/COUCHDB/Securing+CouchDB" target="_blank">https://cwiki.apache.org/confluence/display/COUCHDB/Securing+CouchDB</a></li></ul><p>For more information on MHN as well as how to setup your own honeypot network for collecting statistics on cyber-attacks, check out the <a href="https://www.anomali.com/blog/mhn-modern-honey-network">MHN intro page</a>.</p>

FEATURED RESOURCES

January 20, 2026
Anomali Cyber Watch

Anomali Cyber Watch: Remcos RAT, BitB phishing, Linux Malware Framework, Supply Chain Intrusion and more

New Malware Campaign Delivers Remcos RAT Through Text-Only Staging and Living-Off-the-Land Execution. Browser-in-the-Browser Phishing Evolves into a High-Fidelity Credential Trap. Cloud-Aware Linux Malware Framework Poised for Future Threats. And More..
Read More
January 13, 2026
Anomali Cyber Watch

Anomali Cyber Watch: Cisco ISE Flaw, Ni8mare, N8scape, Zero-Click Prompt Injection and more

Anomali Cyber Watch: Cisco ISE Flaw Enables Arbitrary File Read via Administrative Access. Ni8mare and N8scape Vulnerabilities Expose n8n Automation Platforms to Full Compromise. Zero-Click Prompt Injection Abuse Enables Silent Data Exfiltration via AI Agents. Phishing Attacks Exploit Misconfigured Email Routing to Spoof Internal Domains. Ransomware Activity in the U.S. Continued to Rise in 2025. Android Ghost Tap Malware Drives Remote NFC Payment Fraud Campaigns. Black Cat SEO Poisoning Malware Campaign Exploits Software Search Results. MuddyWater Upgrades Espionage Arsenal with RustyWater RAT in Middle East Spear-Phishing. China-Linked ESXi VM Escape Exploit Observed in the Wild. Instagram Denies Data Breach Despite Claims of 17.5 Million Account Data Leak
Read More
January 6, 2026
Anomali Cyber Watch

Anomali Cyber Watch: OWASP Agentic AI, MongoBleed, WebRAT Malware, and more

Real-World Attacks Behind OWASP Agentic AI Top 10. MongoDB Memory Leak Vulnerability “MongoBleed” Actively Exploited. WebRAT Malware Spread via Fake GitHub Proof of Concept Exploits. Trusted Cloud Automation Weaponized for Credential Phishing. MacSync macOS Stealer Evolves to Abuse Code Signing and Swift Execution. Claimed Resecurity Breach Turns Out to Be Honeypot Trap. Cybersecurity Professionals Sentenced for Enabling Ransomware Attacks. Google Tests Nano Banana 2 Flash as Its Fastest Image AI Model. RondoDox Botnet Exploits React2Shell to Hijack 90,000+ Systems. Critical n8n Expression Injection Leads to Arbitrary Code Execution
Read More
Explore All