Doctor rides, rides

The MongoDB database was found in the public domain, which does not require authentication, in which there was information from Moscow ambulance stations (SSMP).

Doctor rides, rides

Unfortunately, this is not the only problem: firstly, this time the data really leaked, and secondly, all sensitive information was stored on a server located in Germany (I would like to ask if this violates any law or departmental instructions?).

ДисклСймСр: вся информация Π½ΠΈΠΆΠ΅ публикуСтся ΠΈΡΠΊΠ»ΡŽΡ‡ΠΈΡ‚Π΅Π»ΡŒΠ½ΠΎ Π² ΠΎΠ±Ρ€Π°Π·ΠΎΠ²Π°Ρ‚Π΅Π»ΡŒΠ½Ρ‹Ρ… цСлях. Автор Π½Π΅ ΠΏΠΎΠ»ΡƒΡ‡Π°Π» доступа ΠΊ ΠΏΠ΅Ρ€ΡΠΎΠ½Π°Π»ΡŒΠ½Ρ‹ΠΌ Π΄Π°Π½Π½Ρ‹ΠΌ Ρ‚Ρ€Π΅Ρ‚ΡŒΠΈΡ… Π»ΠΈΡ† ΠΈ ΠΊΠΎΠΌΠΏΠ°Π½ΠΈΠΉ. Π˜Π½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΡ взята Π»ΠΈΠ±ΠΎ ΠΈΠ· ΠΎΡ‚ΠΊΡ€Ρ‹Ρ‚Ρ‹Ρ… источников, Π»ΠΈΠ±ΠΎ Π±Ρ‹Π»Π° прСдоставлСна Π°Π²Ρ‚ΠΎΡ€Ρƒ Π°Π½ΠΎΠ½ΠΈΠΌΠ½Ρ‹ΠΌΠΈ доброТСлатСлями.

A server with a base called "ssmp”, is located on the site of the well-known hosting provider Hetzner in Germany.

Doctor rides, rides

Based on indirect signs, it was possible to establish the alleged owner of the server and the database - a Russian company LLC "Computer intelligent systems".

On ci-systems.com/solutions/programs-smp/, the company tells us:

CIS SMP is a software product designed to automate the operation of emergency (specialized) medical care (SMP) stations within the boundaries of a constituent entity of the Russian Federation and provides:

  • receiving calls;
  • registration and redirection of calls;
  • formation, monitoring and management of mobile teams of NSR stations;
  • mass reassignment of brigades of the ambulance service during the liquidation of emergency situations;
  • the operation of a single call center SMP;
  • data exchange with external information systems.

Doctor rides, rides

The database had a size of 17.3 GB and contained:

  • date/time of the ambulance call
  • Name of ambulance crew members (including driver)
  • license plate of the ambulance car
  • ambulance vehicle status (e.g. β€œarriving on call”)
  • calling address
  • Name, date of birth, gender of the patient
  • description of the patient's condition (e.g., "temperature >39, poorly reduced, adult")
  • Name of person who called the ambulance
  • contact number
  • and much more…

The data in the database is similar to the log of some system for monitoring / tracking the progress of the task. The field of interest isdateΒ» in the table Β«assign_data_historyΒ».

Doctor rides, rides
(Of course, in the picture above, I tried to hide all personal data.)

As it was written at the very beginning, the lack of authentication is not the only problem this time.

Most importantly, this database was first discovered by Ukrainian hackers from the THack3forU, which leave different messages in the found MongoDB and destroy the information. This time the lads distinguished themselves by this:

"Hacked by THack3forU! Chanel.nPutin is fucked up,nMedvedev is a schmuck,nStrelkov is dumb,nRussia is DNO!”

and of course the fact that, having downloaded all 17 GB, they posted them in CSV format on file hosting mega.nz. About how open MongoDB databases are discovered - here.

As soon as the owner of the database was established, I sent him a notification with a proposal to still close access to the database, although it was already too late - the data had β€œgone”.

First time search engine Shodan fixed this database on 28.06.2018/08.04.2019/17, and access to it was finally closed on 20/18/05, somewhere between 6:XNUMX and XNUMX:XNUMX (Moscow time). A little less than XNUMX hours have passed since the announcement.

News about information leaks and insiders can always be found on my Telegram channel "Information leaksΒ».

Source: habr.com

Add a comment