in order to get the contents back . While this new campaign is using a name to identify itself , these types of attacks are not new and MongoDB databases have been targeted for a while now . These hijacks work by attackers scanning the Internet or using services such as Shodan.io to search for unprotected MongoDB servers . Once connected , the attackers may export the databases , delete them , and then create a ransom note explaining how to get the databases back . According to security researcher Bob Diachenko who discovered the new Mongo Lock campaignAttack.Ransom, the attackers will connect to an unprotected database and delete it . In its place , the attackers will leave a new database called `` Warning '' with a collection inside it named `` Readme '' . The Readme collection will contain a ransom note that explains that the database has been encrypted and that the victims need to payAttack.Ransomthem a ransomAttack.Ransomto get it back . In the Mongo Lock campaignAttack.Ransom, as shown below , the attackers do not leave a bitcoin address , but rather direct the victim 's to contact them via email . While the ransom note claims that the attackers are exportingAttack.Databreachthe database first before deleting it , it is not known if they are doing that in ever case . Victims are paying ransomsAttack.RansomWhen looking up some of the bitcoin addresses used in recent MongoDB attacks , victims have been paying the ransomsAttack.Ransom. For example , the bitcoin address 3FAVraz3ovC1pz4frGRH6XXCuqPSWeh3UH , which has been used often , has had 3 ransom paymentsAttack.Ransomfor a total of 1.8 bitcoins . This is equivalent to a little over $ 11,000 USD at the current value of bitcoins .