The Please Read Me Ransomware Attack

In 2020, around 250,000 MySQL database servers were attacked in a very large scale ransomware attack.

The victims were threatened into paying a ransom or else see their confidential documents revealed to the public.

The campaign has been known as “Please_Read_Me,”

Two variants of this attack were seen in 2020. The first was the standard encrypt the files and then demand payment in Bitcoin payment for the decryption key and the second included the use ‘leak’ web sites to publish documents until the ransom is paid.

How This Happens

How This Happens

MySQL is a database management system.

The attack starts by finding those databases with Internet access and tries every password in the dictionary and all common passwords to see if it can login successfully.

If successful, then the attack runs a series of database queries to determine the contents, then zips the data and sends it to the scammer. It then renders the user’s database unusable by deleting all data.

Ransom notes are then left on the user computers and they must pay in Bitcoin to regain access to their data.

Read the full Guardicore Labs write-up for more details at www.guardicore.com/labs/please-read-me-opportunistic-ransomware-devastating-mysql-servers/

If you have any experiences with these scams do let me know, by email.

Fightback Ninja Signature

 

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.