Meow Attack Has Nuked Almost A Ton Of Unsecured Database

by | Dec 11, 2022

Hundreds of unsecured databases that are exposed on the public web are the subject of an automated ‘meow’ attack that destroys data without explaining.

In an ongoing attack that leaves the word “meow” as its only calling card, more than 1,000 unsecured databases have been permanently removed so far, according to Internet searches over the last few days.

What is the Meow attack?

Researchers have discovered a new assault that searches for unsecured databases and deletes the data without warning. This attack is dubbed “Meow” because the attacker renames databases, tables, and indices by adding “meow” to the end of the original name. It seems in the past few days it has hit roughly hundreds of databases. Some of the exposed databases had been disclosed safely by volunteer researchers to the database owners earlier, but if they weren’t secured immediately, the databases were destroyed — sometimes only hours after contacting the owners.

The most recent attack was against a VPN provider who claimed not to keep any logs but had the Elasticsearch database enabled by an unsecured user. Their computer was “meowed”, and all of the documents cleaned were out from the site. A researcher said there are not many details about the attacker or his motives – simply that it appears to be an automated script that “overwrites or completely destroys the data”. It is theorized that the intruder might be a vigilante attempting to teach administrators a lesson about securing databases by destroying unsecured ones. Actually, the attacks appear to have hit the Elasticsearch and MongoDB systems.

What really is the bot Meow?

Meow bot seems to exist purely to destroy those databases that leave themselves open and exposed online without any controls on security access. So-called because the automated attack script overwrites indexes of databases with appended “meow” numerical random strings.

Databases being “meowed” is a new threat that researchers have only spotted in recent days. However, we can see that hundreds of databases have already fallen prey to the unknown intruder by using a properly designed query with the Shodan Internet-of-Things (IoT) search engine, which is much loved by security researchers.

What is behind the Meow attack?

While the motive behind the Meow attacks is not yet clear, nor where the attacks come from, it has been reported that this may be a vigilante’s work trying to give administrators a hard lesson in security.

A security consciousness member concluded that the absence of any Ransomware note or demand suggests that this could be the work of a grey hat who has had enough unsecured databases and took drastic steps themselves.

There is little doubt that unsecured databases were a significant problem, exposing customer data to anyone looking, with simple misconfiguration errors at the core of the problem. “Despite efforts by cloud providers to help protect databases”, A security consciousness member said, “organizations repeatedly leave them publicly exposed, either by mistake or by personnel lacking the requisite knowledge”.


It’s not the first time attackers have targeted unsecured databases that have become increasingly popular with the growing usage of Amazon, Microsoft, and other providers’ cloud storage services. The motive in some cases is to make money through Ransomware attacks. In other cases — including the latest attacks on Meow — the data is completely wiped out without any ransomware notice or other reason. In the latest attacks, the only thing left behind was the word “meow”.

The spokesperson for MongoDB has issued the following comment to ITProPortal:

“Our MongoDB Community database is a very common product, with over 100M downloads worldwide. Sadly, not all installation follows best practices and as a result, some are configured inappropriately”.

“When MongoDB first became aware of these issues many years ago, we made software changes to protect the default settings of the Open Source Community application. As a result, we saw a substantial decline in the number of Open Databases published”.

“The default setup today for the MongoDB database comes with secure defaults out of the box”.

Speak to one of our experts to understand How to protect your Business from Cyberattacks

The only way to protect what you’ve worked hard to build is to be vigilant when it comes to cybersecurity. If you’d like to know more about how your business can benefit from managed services, just give us a call, we are here to help.

Hundreds of unsecured databases that are exposed on the public web are the subject of an automated ‘meow’ attack that destroys data without explaining.

How to get Microsoft Defender Health on Mac Fleet

Managing Macs for multiple companies gives us the opportunity to work in various environment and detect issues where it occurs first & then implement a solution for all others at the same time. Recently there was a requirement to find if there are MDD instances...

Implementing Machine Learning in IT Support Setup

Machine learning has the potential to revolutionize the way IT support businesses operate. This cutting-edge technology can be applied in a number of ways to improve the efficiency, accuracy, and speed of IT support services. Here are some ways that machine learning...

Benefits of Apple Business Managers

Apple Business Manager is a web-based platform designed to streamline the process of purchasing, deploying, and managing Apple devices within a business organization. It allows IT administrators to manage and distribute Apple devices and apps to their employees,...

Adoption of Macs in Enterprise: A Growing Trend

This image belongs to In recent years, there has been a growing trend of enterprises adopting Macs as their primary desktop and laptop computers. This shift in technology can be attributed to several factors, including...

ESG as future of IT

ESG, or environmental, social, and governance, is becoming increasingly important in the field of IT. As technology continues to advance and play a larger role in our daily lives, companies are being held to higher standards in terms of their impact on the environment...

Secure Your Mac with FileVault

FileVault is a built-in encryption tool for Macs that helps protect your data from unauthorized access by encrypting your hard drive. Enabling FileVault is a simple process that only takes a few minutes, and it can give you peace of mind knowing that your data is safe...

Is outsourcing IT to India is better or keeping it inhouse?

There are pros and cons to both outsourcing IT services to India and keeping IT within the company. Ultimately, the decision to outsource or keep IT in-house will depend on the specific needs and goals of the company, as well as the resources and capabilities...

How to be a good SCRUM Master

In an Agile development team, the Scrum Master is a crucial role that helps the team to work effectively and efficiently. A Scrum Master is responsible for facilitating the team's use of the Scrum framework and ensuring that the team is able to deliver high-quality...

Basics of Enterprise Patch Management

Enterprise patch management is the process of ensuring that all the software and applications within an organization are kept up-to-date with the latest patches and updates. This is important because software and applications are constantly being improved and updated...

Cost saving for enterprises by choosing M1 Macs

The M1 Mac has had a significant impact on the enterprise market since its release. As a highly-efficient and powerful machine, the M1 Mac has proven to be a valuable asset to businesses in a variety of industries. One of the key benefits of the M1 Mac is its improved...

CRM Is A Process, Not A Product! How Can We Make CRM A Successful Tool?

CRM (Customer Relationship Management) is software that allows businesses to manage business relationships and information associated with them. It provides a platform that manages interactions with customers, stores information about them, and automates processes...


Digital Workplace Services

Automated Tasks

 Office IT Support

Intune for Win & Mac

Citrix Virtual Apps

Mac Win iOS Android

Mac & Win Trained