February 6, 2026
By esentry Team

MongoDB Under Fire: A Surge in Database Wipe & Ransom Attacks

Just when it felt like everyone had moved on from it, MongoDB found its way back into the spotlight. Not because of a new vulnerability or clever exploit, but because attackers are doing what they have always done best: finding things that were left open. Out of thousands of unauthenticated MongoDB instances still online today, nearly 46% have already been hit, often before owners even realize the database was public.

Simple Yet Dangerous

There’s no elaborate intrusion story here. No phishing emails, no zero-day exploits, no clever tricks.

Attackers are simply running continuous scans across the internet, looking for MongoDB instances that were left exposed often during testing, migrations, or those “temporary” setups that quietly become permanent. When they find one, everything happens fast, and it’s almost entirely automated.

From connecting to the database.

To taking a quick look at the data.

To wiping it clean.

Then dropping a short ransom note asking for Bitcoin.

And just like that, it’s over.

In many cases, this entire sequence plays out within hours of the database becoming publicly accessible, sometimes even faster. There’s barely time for anyone to notice the exposure before the damage is done.

Worse still, paying the ransom rarely helps. Victims who send the money usually get nothing back. The data isn’t being held hostage; it’s already been destroyed. The ransom note isn’t an offer, but rather an afterthought.

It is data destruction, dressed up as extortion.

Why It Keeps Happening

You would expect attacks like this to be a thing of the past. MongoDB wipe campaigns were making headlines years ago, long before cloud security became a regular topic in board meetings.

But modern environments are messier than ever.

Infrastructure spins up in minutes. Test systems hang around longer than they should. Default settings get a free pass. Ownership shifts, then blurs. Somewhere in that sprawl, a database quietly ends up exposed to the internet and attackers are already looking for it.

That sad reality is, most of these victims weren’t hunteddown, they were discovered.

What Makes It Dangerous

There’s no flashy ransom negotiation. No public leak site countdown. Often, the first sign something is wrong is a developer or analyst opening a database and finding nothing.

No alerts.

No warning.

Just empty collections and a ransom note.

For organizations without reliable backups, that moment is catastrophic. For those with backups, it’s still a hard lesson in how quickly basic misconfigurations can turn into real damage.

Conclusion

This isn’t really about MongoDB.

It’s about how attackers don’t need to evolve if our mistakes stay the same.

Exposed services remain one of the easiest, fastest paths to impact, and automation means attackers will always get there before manual reviews do. The window between “exposed” and “exploited” is now measured in hours, not weeks.

If something is internet-facing, it will be found.

If it isn’t locked down, it will be used.

Sometimes the most dangerous threats aren’t new,they are the familiar ones we stopped paying attention to.