www.secureworks.com Open in urlscan Pro
2620:1ec:bdf::45  Public Scan

URL: https://www.secureworks.com/blog/unsecured-elasticsearch-data-replaced-with-ransom-note
Submission: On June 20 via api from IN — Scanned from DE

Form analysis 1 forms found in the DOM

<form><span class="fieldset">
    <p><input type="checkbox" value="check" id="chkMain" checked="checked" class="legacy-group-status optanon-status-checkbox"><label for="chkMain">Active</label></p>
  </span></form>

Text Content

Cookie Notice

This website uses cookies to help personalize and improve your experience. Learn
more by visiting our privacy policy. By Continuing to use this site, you are
consenting to the use of cookies.


Close
Accept Cookies
Cookie Settings


 * Your Privacy

 * Strictly Necessary Cookies

 * Performance Cookies

 * Functional Cookies

 * Targeting Cookies

 * More Information

Privacy Preference Centre

Active

Always Active



Save Settings

Allow All

 * Emergency Incident Response
 * Contact Us
 * Events & Webinars
 * Blog
 * Support
 * Login


Try Taegis XDR

 * Search Secureworks
 * Products
   Extended Detection and Response
   Managed Detection and Response
   Vulnerability Management
   Get Started
    * Main Menu
    * Products Overview
    * Extended Detection and Response
       * Taegis™ XDR
       * Free Adversary Software Coverage Tool
   
    * Managed Detection and Response
       * Taegis™ ManagedXDR
       * Taegis™ ManagedXDR Elite
   
    * Vulnerability Management
       * Taegis™ VDR
       * Free VDR Buyer's Guide
   
    * Get Started
       * Request an XDR Demo
       * Request a VDR Demo
       * Free Trial
   
    * * * * Meet Secureworks Taegis
        * Extended Detection and Response
          * Taegis™ XDR
          * Free Adversary Software Coverage Tool
        * Managed Detection and Response
          * Taegis™ ManagedXDR
          * Taegis™ ManagedXDR Elite
        * Vulnerability Management
          * Taegis™ VDR
          * Free VDR Buyer's Guide
        * Get Started
          * Request an XDR Demo
          * Request a VDR Demo
          * Free Trial

 * Services
   Managed Services
   Security Assessments & Testing
   Incident Response & Readiness
   Get Started
    * Main Menu
    * Services Overview
    * Managed Services
       * Taegis™ ManagedXDR
       * Taegis™ ManagedXDR Elite
   
    * Security Assessments & Testing
       * Threat Hunting Assessment
       * Application Security Testing
       * Red Team Testing
       * Penetration Testing
       * Vulnerability Assessment
       * Ransomware Readiness Assessment
   
    * Incident Response & Readiness
       * Incident Response Services
       * Incident Management Retainer
       * Emergency Incident Response
       * Proactive Incident Response
   
    * Get Started
       * Talk to an Expert
       * Request a Quote
       * Emergency IR Hotline
       * See All Services
   
    * * * * Experienced a Breach?Contact Us Today
        * Managed Services
          * Taegis™ ManagedXDR
          * Taegis™ ManagedXDR Elite
        * Security Assessments & Testing
          * Threat Hunting Assessment
          * Application Security Testing
          * Red Team Testing
          * Penetration Testing
          * Vulnerability Assessment
          * Ransomware Readiness Assessment
        * Incident Response & Readiness
          * Incident Response Services
          * Incident Management Retainer
          * Emergency Incident Response
          * Proactive Incident Response
        * Get Started
          * Talk to an Expert
          * Request a Quote
          * Emergency IR Hotline
          * See All Services

 * Why Secureworks
   Industry Leader
   Security Expertise
    * Main Menu
    * Why Secureworks Overview
    * Industry Leader
       * Industry Solutions
       * Our Customers
       * Awards
   
    * Security Expertise
       * Threat Intelligence Research
       * Current Threat Analysis
       * Practitioner Blog
       * Let's Talk SOC Podcast
   
    * * * * We Beat the Threat
        * Industry Leader
          * Industry Solutions
          * Our Customers
          * Awards
        * Security Expertise
          * Threat Intelligence Research
          * Current Threat Analysis
          * Practitioner Blog
          * Let's Talk SOC Podcast

 * Partners
   Partner Programs
   Technology Alliances
   Get Started
    * Main Menu
    * Partners Overview
    * Partner Programs
       * Global Partner Program
       * Solution Provider
       * MSSP
       * Cyber Risk Partner Program
   
    * Technology Alliances
       * Technology Alliance Partners Program
       * Secureworks and AWS
       * Secureworks and Mimecast
   
    * Get Started
       * Become a Partner
       * Find a Partner
       * Password Reset
       * Partner Portal Login
   
    * * * * Access our Partner Portal for collateral, certification, requests
            for funds and more
        * Partner Programs
          * Global Partner Program
          * Solution Provider
          * MSSP
          * Cyber Risk Partner Program
        * Technology Alliances
          * Technology Alliance Partners Program
          * Secureworks and AWS
          * Secureworks and Mimecast
        * Get Started
          * Become a Partner
          * Find a Partner
          * Password Reset
          * Partner Portal Login

 * Resources
   Resources
   Threat Research
   Knowledge Centers
   Browse by Topic
    * Main Menu
    * Resources Overview
    * Resources
       * Resource Library
       * Webinars
       * Industry Reports
       * White Papers
       * Data Sheets
       * Case Studies
       * Podcasts
       * Blog
   
    * Threat Research
       * Threat Profiles
       * Threat Analysis and Advisories
       * Research & Intelligence
       * Executive Reports
   
    * Knowledge Centers
       * What is Ransomware?
       * What is XDR?
       * Endpoint Security: Enhanced Visibility via XDR and EDR
       * Cybersecurity Solutions
       * View All...
   
    * Browse by Topic
       * Content Vault
   
    * * * * Taegis™ XDR Adversary Software Coverage ToolAccess the Tool
        * Resources
          * Resource Library
          * Webinars
          * Industry Reports
          * White Papers
          * Data Sheets
          * Case Studies
          * Podcasts
          * Blog
        * Threat Research
          * Threat Profiles
          * Threat Analysis and Advisories
          * Research & Intelligence
          * Executive Reports
        * Knowledge Centers
          * What is Ransomware?
          * What is XDR?
          * Endpoint Security: Enhanced Visibility via XDR and EDR
          * Cybersecurity Solutions
          * View All...
        * Browse by Topic
          * Content Vault

 * Company
   About Us
   The Press Room
   Connect with Us
   COVID-19: Stay Secure
    * Main Menu
    * Company Overview
    * About Us
       * Corporate Overview
       * Office Locations
       * Our Leadership
       * Corporate Responsibility
   
    * The Press Room
       * Investor Relations
       * In the News
       * Events
       * Press Releases
   
    * Connect with Us
       * Careers
       * Partners
       * Open Letter to Customers
   
    * COVID-19: Stay Secure
       * COVID-19 Resources
       * Flexible Security Solutions
   
    * * * About Us
          * Corporate Overview
          * Office Locations
          * Our Leadership
          * Corporate Responsibility
        * The Press Room
          * Investor Relations
          * In the News
          * Events
          * Press Releases
        * Connect with Us
          * Careers
          * Partners
          * Open Letter to Customers
        * COVID-19: Stay Secure
          * COVID-19 Resources
          * Flexible Security Solutions
        * * Learning from Incident Response: 2021 Year in ReviewRead the Report

   
 * 
 * Contact Us
 * Events & Webinars
 * Blog
 * Support
 * Login
   

Close
0 Results Found
 * Products
 * Products, Services & Solutions
 * Insights
 * About
 * Contact
 * Other

Back To Results
 * 


Close Try Taegis XDR
 * Cybersecurity Threat Intelligence Blogs
 * Unsecured Elasticsearch Data Replaced with Ransom Note

Research & Intelligence



UNSECURED ELASTICSEARCH DATA REPLACED WITH RANSOM NOTE

Security controls such as MFA can limit access to internet-facing databases.
Wednesday, June 1, 2022 By: Counter Threat Unit Research Team
 * 
 * 
 * 
 * 

Secureworks® Counter Threat Unit™ (CTU) researchers identified indexes of
multiple unsecured internet-facing Elasticsearch databases replaced with a
ransom note. The note demands a Bitcoin payment in exchange for the data (see
Figure 1).


Figure 1. Ransom note dropped on exposed Elasticsearch database. (Source:
Secureworks)



The indexes reside on various versions of Elasticsearch and require no
authentication to read or write. In each case, data held in the databases was
replaced with a ransom note stored in the 'message' field of an index called
'read_me_to_recover_database'. Inside the 'email' field is a contact email
address. CTU™ researchers identified four distinct email addresses used in this
campaign.

CTU researchers identified over 1,200 Elasticsearch databases that contained the
ransom note. It is not possible to determine the actual number of victims
because the vast majority of the databases were hosted on networks operated by
cloud computing providers. It is likely that some databases belong to the same
organization, but identifying specific victims was not possible in most cases.

The campaign is broad, but the ransom payment is comparatively low. CTU
researchers identified over 450 individual requests for ransom payments,
totaling over $280,000 USD. The average ransom request was approximately $620
payable to one of two Bitcoin wallets. As of this publication, both wallets are
empty and do not appear to have been used to transact funds related to the
ransoms.

While this campaign appears to be unsuccessful, it represents a risk to
organizations hosting data on internet-facing databases. Unsecured Elasticsearch
instances are trivially easy to identify using the Shodan search engine.
Instructions on how to identify unsecured Elasticsearch databases are available.

The threat actor probably used an automated script to identify the vulnerable
databases, wipe the data, and drop the ransom note. While the threat actor could
have used a tool like Elasticdump to exfiltrate the data, the cost of storing
data from 1,200 databases would be prohibitively expensive. It is therefore
likely that the data was not backed up and that paying the ransom would not
restore it.

This malicious activity is not unique to Elasticsearch. In 2020, third-party
researchers discovered that approximately half of exposed MongoDB instances were
wiped and replaced with a similar ransom note. Exploiting unsecured databases is
not limited to data theft and extortion campaigns. Threat actors seeking
sensitive information relating to specific organizations could easily build
searches that identify relevant data in the indexes of internet-facing
databases.

When a database requires remote access, organizations should implement
multi-factor authentication (MFA) to protect internet-facing services.
Organizations should also review cloud providers' security policies and not
assume that data is secured by default.

To detect the presence of this threat, CTU researchers recommend that
organizations use available controls to monitor the indicators listed in Table
1.

Indicator Type Context read_me_to_recover_database Filename Ransom note used in
Elasticsearch compromise b1ackcr0w@protonmail.com Email address Threat actor
contact information in Elasticsearch compromise babadasa@protonmail.com Email
address Threat actor contact information in Elasticsearch compromise
erbard@mailfence.com Email address Threat actor contact information in
Elasticsearch compromise erbard@tutanota.com Email address Threat actor contact
information in Elasticsearch compromise 3BppAJxB4BfZWkh1bnagtNaZJYvnw5nEFh
Cryptocurrency wallet ID Bitcoin account for Elasticsearch compromise ransom
payments 34ubNu53uXxeMjSR1xXdmECpst71CFZLNG Cryptocurrency wallet ID Bitcoin
account for Elasticsearch compromise ransom payments

Table 1. Indicators for this threat.



While MFA is a fundamental security control, it must be configured properly.
Learn how the Secureworks Adversary Group bypassed misconfigured MFA in an
organization’s environment.

Get real-world insight into emerging threats and trends. Read the 2021 Incident
Response Year in Review

Download Report


STAY INFORMED

Get the latest in cybersecurity news, trends, and research 
SEND ME UPDATES


NOW TRENDING...


 * The Long Road Ahead to Ransomware Preparedness
 * EDR, XDR, MDR: Filtering Out the Alphabet Soup of Cybersecurity
 * Minimize the Noise of Cybersecurity Alerts
 * The Essential Cyber Defense Strategy Table
 * IDC MarketScape: Worldwide Incident Readiness Services 2021 Assessment








Secureworks Taegis™ XDR

Transform your SOC effectiveness and improve efficiency.


3 Ways to Try Taegis XDR


LATEST REPORT


Reports
Learning from Incident Response: 2021 Year in Review
Tags:
 * multi factor authentication

Enjoyed what you read? Share it!
 * 
 * 
 * 
 * 





RECOMMENDED CONTENT

Webinars

How Cybercriminals Are Adapting to Outwit Defenses and Rake in the Profits

Webinars

Is Ransomware Impacting Your Healthcare Organization?

Webinars

Ransomware Protection: Fighting Back Together

 * 
 * 
 * 
 * 

 * Careers
 * RSS Feed
 * Email Subscription
 * Sitemap
 * Privacy Policy
 * Supply Chain Transparency
 * Terms & Conditions
 * Accessibility Statement
 * Dell Technologies
 * Unsubscribe
 * Cookie Settings

English
 * 日本語

© 2022 Secureworks, Inc.











×
×