August 18, 2015 By Shane Schick 2 min read

Big data is supposed to offer companies a way to better serve customers or improve operations, but research shows cybercriminals may be more likely to profit from misconfigured databases, including MongoDB and Redis, which are leaking up to 1 petabyte of data.

According to security firm BinaryEdge, some of the most popular database products on the market are in many cases being used without any authentication whatsoever. This includes not only Redis and MongoDB, but also memcached and Elasticsearch. In many of the instances analyzed, researchers found large chunks of data that could be discovered and exploited by third parties.

This isn’t the first time misconfigured databases have raised major cybersecurity threats. An article on SecurityWeek referenced a similar research report published earlier this year that focused on MongoDB. That research showed that default configurations — which are easier to penetrate — were exposing information that should have been better protected.

Experts told SC Magazine UK the problem could be even worse than it appears. While big data has been one of the most discussed topics in the technology industry over the last few years, gaining insight from large chunks of information no longer requires a supercomputer or specialized data scientists. In fact, by looking at certain data sets and tampering with them — by injecting malware, for instance — an entire organization could be crippled, or the personal information of its customer base could be compromised.

Several of the database products included in the report have open source roots, including MongoDB. Open source has gotten a black eye in some enterprise circles ever since last year’s problems involving the Heartbleed vulnerability. In this case, however, it’s not necessarily a flaw with the products themselves. Instead, as iTnews noted, it could be a case of not using them properly or employing older, outdated versions. In other words, these are basic security best practices that more firms should already have in place that are being ignored.

Hopefully, the BinaryEdge research will have chief information security officers (CISOs) and their teams taking a closer look at their MongoDB, Redis or other database instances and addressing any issues quickly. After all, as SiliconANGLE reported, some of the data leaked seemed to refer to financial or health care information, which no one would want discovered by cybercriminals.

More from

What does resilience in the cyber world look like in 2025 and beyond?

6 min read -  Back in 2021, we ran a series called “A Journey in Organizational Resilience.” These issues of this series remain applicable today and, in many cases, are more important than ever, given the rapid changes of the last few years. But the term "resilience" can be difficult to define, and when we define it, we may limit its scope, missing the big picture.In the age of generative artificial intelligence (gen AI), the prevalence of breach data from infostealers and the near-constant…

Airplane cybersecurity: Past, present, future

4 min read - With most aviation processes now digitized, airlines and the aviation industry as a whole must prioritize cybersecurity. If a cyber criminal launches an attack that affects a system involved in aviation — either an airline’s system or a third-party vendor — the entire process, from safety to passenger comfort, may be impacted.To improve security in the aviation industry, the FAA recently proposed new rules to tighten cybersecurity on airplanes. These rules would “protect the equipment, systems and networks of transport…

Protecting your digital assets from non-human identity attacks

4 min read - Untethered data accessibility and workflow automation are now foundational elements of most digital infrastructures. With the right applications and protocols in place, businesses no longer need to feel restricted by their lack of manpower or technical capabilities — machines are now filling those gaps.The use of non-human identities (NHIs) to power business-critical applications — especially those used in cloud computing environments or when facilitating service-to-service connections — has opened the doors for seamless operational efficiency. Unfortunately, these doors aren’t the…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today