Hackers wipe out more than 1,000 databases, leaving only the word 'Meow'

Adam Smith
Thursday 23 July 2020 17:22 BST
Comments
Koko, the cat, watches Cat TV on a laptop in Washington, DC December 21, 2017
Koko, the cat, watches Cat TV on a laptop in Washington, DC December 21, 2017 (EVA CLAIRE HAMBACH/AFP via Getty Images)

Your support helps us to tell the story

From reproductive rights to climate change to Big Tech, The Independent is on the ground when the story is developing. Whether it's investigating the financials of Elon Musk's pro-Trump PAC or producing our latest documentary, 'The A Word', which shines a light on the American women fighting for reproductive rights, we know how important it is to parse out the facts from the messaging.

At such a critical moment in US history, we need reporters on the ground. Your donation allows us to keep sending journalists to speak to both sides of the story.

The Independent is trusted by Americans across the entire political spectrum. And unlike many other quality news outlets, we choose not to lock Americans out of our reporting and analysis with paywalls. We believe quality journalism should be available to everyone, paid for by those who can afford it.

Your support makes all the difference.

Over 1000 unsecured databases have been permanently deleted, leaving only the word “meow” behind.

The attack saw a database that had details of the UFO VPN. UFO VPN, and other products from seemingly the same company, had recently been in the news for exposing user information.

Information exposed include unencrypted account passwords, location information, and IP addresses of user devices and VPN servers.

The VPN, and others like it, claimed that it was not logging user details. Reports alleged that this was not the case.

The attack seems to have come from a bot, according to Forbes, as the attack script overwrites database indexes with random numerical strings and the word ‘Meow’.

It is unclear who is the source of the attacks. Ars Technica reports that a less severe attack, which hit other servers, tagged them with “university_cybersec_experiment”, and is seemingly a demonstration that the files were left vulnerable.

Security researcher Bob Diachenko, who partnered with Comparitech on a report into UFO VPN and the other VPN products, hypothesised that such an attack may have been conducted simply because it is easy.

“I think that in most [of the latter] cases, malicious actors behind the attacks do it just for fun, because they can, and because it is really simple to do,” Diachenko told Ars Technica.

“Thus, it is another wake-up call for the industry and companies which ignore cyber hygiene and lose their data and data of their customers in a blink of an eye.”

It appears that the attackers are running searchers for servers which expose information by not being password protected – like how security companies conduct research and reports.

Diachenko expects the Meow attacks to continue, and the number of affected databases to double over the next 24 hours.

Join our commenting forum

Join thought-provoking conversations, follow other Independent readers and see their replies

Comments

Thank you for registering

Please refresh the page or navigate to another page on the site to be automatically logged inPlease refresh your browser to be logged in