Post Now
Image

MongoDB, a prominent US-based company, is renowned for developing the widely-used open-source NoSQL database management system.

MongoDB revealed an ongoing investigation into a cyber attack targeting specific corporate systems. MongoDB, a prominent US-based company, is renowned for developing the widely-used open-source NoSQL database management system.

In emails sent to their customers, CISO Lena Smart from the company disclosed that their systems were identified as compromised on Wednesday evening, precisely on December 13th. Following the detection of the breach, the company promptly initiated an investigation into the incident.

"MongoDB is investigating a security incident involving unauthorized access to certain MongoDB corporate systems," reads the email from the company.

“This includes exposure of customer account metadata and contact information. At this time, we are unaware of any exposure to the data that customers store in MongoDB Atlas."

The company has confirmed that they do not believe the hackers accessed any customer data stored in MongoDB Atlas. However, the firm has indicated that threat actors had unauthorized access to its systems for a period of time before their presence was discovered.

"We are still conducting an active investigation and believe that this unauthorized access has been going on for some time before discovery," reads the security incident notification.

Given the exposure of customer metadata, the company strongly advises all customers to implement multi-factor authentication on their accounts, regularly update passwords, and exercise heightened vigilance against potential targeted phishing and social engineering attempts.

Want your digital assets to be protected? 

CyberShelter provides innovative and modern cybersecurity products and niche services to individuals and organization against all kinds of cyber threats.

For the latest cyber threats and the latest hacking news please follow us on FacebookLinkedin, and Twitter.

You may be interested in reading: How to Survive the COVID Time Cyber ​​Security Threats?