809 million emails leaked from accessible MongoDB database
.jpg)
Last week, security researchers discovered an unprotected, publicly accessible MongoDB database containing 763 million unique email addresses. Chris DeRamus, CTO, DivvyCloud explains more.
The discovery of the unprotected, publicly accessible MongoDB database found it to be holding 150 gigabytes-worth of detailed, plaintext marketing data, much of it composed millions of email addresses. The trove, as Wired reports, is not only massive but also unusual; it contains data about individual consumers as well as what appears to be "business intelligence data," like employee and revenue figures from various companies. This diversity may stem from the information's source.
The database, owned by the "email validation" firm Verifications.io, was taken offline the same day it was reported to the company. In terms of the significance of the find, Chris DeRamus, CTO, DivvyCloud tells Digital Journal: "The data exposed in this leak of nearly 809 million records is unique, and highly exploitable since it includes business intelligence data such as employee and revenue figures from various companies, as well as genders, user IP addresses, email addresses, dates of birth and more."
In relation to the implications, DeRamus explains: "If a bad actor were to discover this massive trove of data, they could easily validate the contact information for the users included to launch a more focused phishing or brute force campaign."
The significance is not only confined to the database itself, but to the wider context. "We live in a world where data is king—collecting, storing and leveraging data is essential to running just about any type of business you can think of", according to DeRamus.
This is, he clarifies "all the more reason organizations must be diligent in ensuring data is protected with proper security controls. Automated cloud security solutions would have been able to detect the misconfiguration in the MongoDB database containing this information and could either alert the appropriate personnel to correct the issue, or trigger an automated remediation in real-time."
Businesses need to seriously putting such measures into effect. DeRamus notes how "These solutions are essential to enforce policy, reduce risk, provide governance, impose compliance and increase security across large-scale hybrid cloud infrastructure.”
Industry: Cyber Security News

Latest Jobs
-
- 6 month contract Operational Cyber Security - SIEM, Vulnerability, Cyber Essentials + London, Inside IR35
- City of London
- Depending on experience
-
6 month contract inside IR35 Operational Cyber Security London c50% of the role is day to day operations / administration / liaising with 3rd party monitoring suppliers. More though investigations, getting ready for cyber essentials plus. Following up on vulnerability management. 20-30% active monitoring of alerts, tooling etc. 10% reporting / light oversight of junior Experience with Microsoft defender / Azure, Splunk, Tenable Experience in maintaining Cyber Essentials Plus is a big bonus. Knowledge across ISO27001, NIST GDPR required. Inside ir35 need someone in their London (city) office 2-3 days a week.
-
- CONTRACT Fluent French AND English Cyber Security Project manager - 12 month
- United Kingdom
- Dependent on experience
-
Fluent French / English Contactor cyber Security Project Manager needed. Experience in migrating technical cyber services from one physical region to another. Experience with Crowdstrike, Tanium, Palo Alto and or Zscaler ideal or comparable solutions. Language fluency in French AND English is essential. 12 month contract. Looking to start June. Day rate dependent on Experience. Apply today for more details
-
- GRC Security Contractor - Achieve SOC2 Type 1 Compliance - 6 month
- London
- Dependent on experience
-
GRC security practitioner needed to ensure a financial service business to achieve SOC 2 type 1. Experience managing the end to end process is key, you will be the key individual to deliver this within a 6 month deadline. Experience of SOC 2 type 1 / type 2. The gathering of evidence, baseline of 27001, ukdpa, GDPR NIST etc. Looking to interview ASAP.
-
- Contact 12 month- Security Operations- Crowdstrike Falcon Insight EDR / Analyst.
- United Kingdom
- Dependent on experience
-
Security Operations engineer / Analyst with Crowdstrike Falcon Insight EDR experience for a 12 month contract. Experienced Contractor with Crowdstrike Falcon Insight: Endpoint detection and Response (EDR) experience needed - 12 month rolling project. Implementation, configuration and Analyst experience needed with Crowdstrike Falcon Insight: (EDR) Migration project- relocating capability internationally. technically implementing, configuration of that that migration and then transition to BAU role monitoring. DCL Search exclusive associate Project.