250,000 stolen MySQL databases auctioned on the dark web
Hackers are thought to have obtained 7TB of stolen data using the PLEASE_READ_ME ransomware campaign


A quarter of a million databases stolen from tens of thousands of breached MySQL servers are being offered for sale on the dark web, according to security researchers from Guardicore Labs.
Hackers are believed to have obtained 7TB of stolen data using the PLEASE_READ_ME ransomware campaign, successfully targeting around 83,000 MySQL database servers.
PLEASE_READ_ME has reportedly been active since January 2020, attacking weak credentials on internet-facing MySQL servers.
Since then, Guardicore Global Sensors Network (GGSN) reported 92 attacks, with numbers rising sharply in October. According to Guardicore researchers, the ransomware attacks originated from 11 different IP addresses, most of which were found to be located in the UK and Ireland.
The ransomware campaign is untargeted, meaning that it attempts to infect any of the five million MySQL servers which are internet-facing. Hackers exploit weak credentials and are able to re-access the network by leaving a backdoor user on the database for persistence.
Guardicore Labs researchers managed to discover two different variants during the lifetime of this campaign. The first, which lasted from January to the end of November, saw attackers leaving their victims a ransom note with their wallet address, the amount of Bitcoin to pay, as well as an email address for technical support, with 10 days being given to make the payment.
The second variant, which began on 3 October and also lasted until late November, got rid of the Bitcoin wallet payments and email communications. Instead, hackers opted for a website in the Tor network to receive payments and used unique alphanumeric tokens, outlined in the ransom notes, to identify the victims.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
In a blog post detailing the discovery, security researchers Ophir Harpaz and Omri Marom said that the “PLEASE_READ_ME operators are trying to up their game by using double extortion in scale”.
“Factoring their operation will render the campaign more scalable and profitable. Guardicore Labs provides an IOCs repository and will keep monitoring this campaign to help organizations protect against it,” they added.
Having only graduated from City University in 2019, Sabina has already demonstrated her abilities as a keen writer and effective journalist. Currently a content writer for Drapers, Sabina spent a number of years writing for ITPro, specialising in networking and telecommunications, as well as charting the efforts of technology companies to improve their inclusion and diversity strategies, a topic close to her heart.
Sabina has also held a number of editorial roles at Harper's Bazaar, Cube Collective, and HighClouds.
-
Bigger salaries, more burnout: Is the CISO role in crisis?
In-depth CISOs are more stressed than ever before – but why is this and what can be done?
By Kate O'Flaherty Published
-
Cheap cyber crime kits can be bought on the dark web for less than $25
News Research from NordVPN shows phishing kits are now widely available on the dark web and via messaging apps like Telegram, and are often selling for less than $25.
By Emma Woollacott Published
-
How does a SQL injection attack work?
In-depth Understanding one of the simplest, yet most effective, methods of cyber attack
By Adam Shepherd Last updated
-
SQL injection flaw fixed by Drupal
News The makers of the open source content management system have fixed troublesome flaw
By Clare Hopping Published
-
SQL and DDOS attacks remain priority for hackers
News Sensitive data increasingly being gleamed from social networks and through the practice of 'E-whoring', notes Imperva.
By Alexandra Velasco Published
-
Oracle issues 78 vulnerability patches
News Combined with Microsoft and Adobe patches, Oracle has made IT departments' lives a little harder this month.
By Tom Brewster Published
-
Oracle quiet on MySQL.com hack claims
News Larry Ellison's firm neither confirms nor denies MySQL.com has been hacked again.
By Tom Brewster Published
-
MySQL.com hacked again
News MySQL.com is found serving malware after the second known hack on the website this year.
By Tom Brewster Published
-
MySQL hit by irony attack
News MySQL.com gets hit by an SQL injection attack, and hackers leak some disconcertingly weak passwords onto the net.
By Tom Brewster Published
-
Week in review: Skynet here we come!
News Microsoft has trouble with XP and SQL, HMRC staff are snoops, bloggers speak up on elections and robots learn to carry mugs.
By Asavin Wattanajantra Published