0 0
Read Time:49 Second

In the last two weeks, an unidentified hacker has been able to enter Elasticsearch servers (an open source search engine with wide distribution and fast scalability) without authentication and remove their internal content, while trying to make a name during the operation. Leave a cyber security company as a footprint. The attacks on Elasticsearch’s servers began on March 24, and security researcher John Whittington was one of the people who discovered and identified the malicious activity. According to the investigation, the attacks were carried out with the help of an automatic script, which scanned and identified ElasticSearch systems that were active on the Internet without authentication, then connected to the relevant database and tried to erase their content. In the last step, it created a new “empty” index called Nightlionsecurance.com.

When the research became more extensive, we found that the attacker’s script did not work properly in all cases, because the index nightlionsecurity.com also contained databases whose content remained intact.

#Elasticsearch
#DataBase
#Attack

About Post Author

Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence
Happy
Happy
0 %
Sad
Sad
0 %
Excited
Excited
0 %
Sleepy
Sleepy
0 %
Angry
Angry
0 %
Surprise
Surprise
0 %

By Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence