I’m developing a multiplayer game in my free time and when I connected to my droplet today I figured out that my database was just hacked:


Altough I havn’t set specific securities, my root user has a 9 chars alphanumerical password, is it possible that it got bruteforced ? Ubuntu hasn’t a bruteforce protection ?

Thanks :)

These answers are provided by our Community. If you find them useful, show some love by clicking the heart. If you run into issues leave a comment, or add your own answer to help others.

3 answers

It was most-likely an SQL injection. You could try checking your access logs for some odd looking POST requests. Also always make sure to sanitize your queries.

  • I think I found what was going on, although the server OS was secured with a strong password, the postgress database was not, I forgot to change the default password and I guess a bot just scanned my db and tried the default password ! I’m dumb x)

    It can’t be SQL injection as the client never really commands the database, that is to say that the client sends packets then the server processes these packets and asks the database but no SQL injection is possible as the information in the packet is already “parsed” by the server logic, no raw data is queried.

My database also got hacked recently. I had alphanumeric (15 character) password which is virtually impossible for Bruteforce and username was also not root.

And today I got an email from digitalocean that some of my data including my billing info username and droplet details got leaked by some internal person.

Not sure how far should I trust digitalocean.

  • oh no, I was going to try digitalocean trusting their name in the game, but when I got asked for a passport scan and a selfie when all I wanted to do is learn docker with a couple of web apps to try, I canceled my account. the worst part is I gave my credit card info at the first step. and now when I see they’ve got hacked and data has leaked I’m genuinely worried about my credit card info.

It is mostly due to SQL injection. Try to check your access logs for some odd looking POST requests. Thanks…

Submit an Answer