MELEE: A Tool to Detect Ransomware Infections in MySQL Instances
Attackers are abusing MySQL instances for conducting nefarious operations on the Internet. The cybercriminals are targeting exposed MySQL instances and triggering infections at scale to exfiltrate data, destruct data, and extort money via ransom. For example one of the significant threats MySQL deployments face is ransomware. We have authored a tool named “MELEE” to detect potential infections in MySQL instances. The tool allows security researchers, penetration testers, and threat intelligence experts to detect compromised and infected MySQL instances running malicious code. The tool also enables you to conduct efficient research in the field of malware targeting cloud databases. In this release of the tool, the following modules are supported:
MySQL instance information gathering and reconnaissance
MySQL instance exposure to the Internet
MySQL access permissions for assessing remote command execution
MySQL user enumeration
MySQL ransomware infections
Basic assessment checks for detecting ransomware infections
Extensive assessment checks for extracting insidious details about potential ransomware infections
MySQL ransomware detection and scanning for both unauthenticated and authenticated deployments
[*] usage: melee.py <mysql host (local or remote)> <mysql service port> <mysql username> <mysql password> <module>
[*] MELEE supported modules:
- map_mysql_geoip: map the GeoIP presence of the MySQL host
- check_anonymous_access: verify if the remote MySQL host has anonymous access
- enum_mysql_db_names: enumerate all the available MySQL databases
- enum_mysql_db_tables: enumerate all the tables in active databases
- enum_mysql_db_users: enumerate all the user names related to MySQL database (MySQL user) only
- enum_active_users: enumerate all the logged-in users (information_schema.process list) only
- check_ransomware_infection: detect a potential ransomware infection
- deep_scan_ransomware_infection: launch a deep scan to extract infected resources and a ransom message
[*] tool considerations:
- for ransom message analysis, the file is dumped to the local directory with <mysql_host>_ransom_message.txt
- for the anonymous access module, do not supply any password with a username
- for weak authentication credentials, use combinations such as <root:root>, or other combinations