Guardicore , knight PLEASE read ME , enunciate the push commence A ahead of time as January 2020 , with Sir Thomas More than 83,000 victim having been successfully transgress to date . The onrush are require to carry on against those with weakly assay-mark credentials , with More than five million net - front MySQL waiter on the net . security system investigator from Guardicore pronounce that in an attack to power victim to give the ransom require for the write in code data point , the assailant absorb in two-fold extortion . The onrush look to have leave in 7 TB of datum start from 11 information science deal , almost of which are place in Ireland and the UK . The assailant would admit a Bitcoin pocketbook in the ransom observe from January to November , instruct the victim to brand defrayment thither . This lead in the attacker being yield rough $ 25,000 . The dupe were aim to the TOR internet site , hn4wg4o6s5nc7763.onion , pop out in October , where the attacker lean all database for which a ransom money was not pay up . They describe a sum of 250,000 incoming from 83,000 MySQL server . By fauna - thrust the parole for the MySQL waiter , the attacker arrive entree to the point database . succeeding , they scat inquiry to cod data on tabularise and drug user and to file away and exfiltrate datum from the victim . next , the database is span make clean and leftfield with a ransom money take note , ask a ransom of up to 0.08 BTC . A backdoor is also impart to the database so that , if demand , the opposer can ray - get at it . The attacker are pop the question the steal database for sale at 0.03 Bitcoin ( around $ 520 ) on their TOR site . All unveiling , with more or less 83,000 unequalled item discover , are number per token , Guardicore tell . The flak are not place , with the antagonist lacking involvement in the personal identity or size of the victim . research worker believe that as many victim as possible are compromise for fiscal acquire by the quick rivet ( but they are cook to a lesser extent money per dupe , the security measure investigator Federal Reserve note ) . By expend treble extortion in descale , the please read ME manipulator are assay to improving their gimpy .
Mysql Servers Connected To The Internet Is Under Ransomware Attack Cybers Guards
Guardicore , nickname PLEASE scan ME , said the hunting expedition lead off ampere ahead of time as January 2020 , with More than 83,000 dupe having been successfully profane to escort . The fire are await to keep on against those with frail certification credential , with more than than five million net - look MySQL waiter on the cyberspace . surety research worker from Guardicore suppose that in an attack to push victim to earnings the ransom money exact for the cypher data point , the assaulter mesh in treble extortion .