Elasticsearch databases are being hit hard by ransom attacks

Hundreds of Elasticsearch databases were wiped

When you purchase through links on our site, we may earn an affiliate commission.Here’s how it works.

Hundreds of misconfigured Elascticsearch databases were recently hit byransom attacks, security experts have found.

Cybersecurity researchers from Secureworks have uncovered 450 databases whose contents have been wiped, and in their place, a ransom note left.

The ransom note demands $620 per database, to restore the contents, adding up to a total of $279,000. Paying victims will receive a download link for theirdatabase, which should help them restore the data structure quickly, the attackers claim.

Share your thoughts on Cybersecurity and get a free copy of the Hacker’s Manual 2022. Help us find how businesses are preparing for the post-Covid world and the implications of these activities on their cybersecurity plans. Enter your email at theend of this surveyto get the bookazine, worth $10.99/£10.99.

The victims have a total of seven days to pay up, otherwise the ransom demand will double. If the victims fail to meet the extended deadline, they can expect never to see their data again.

Backing up

Backing up

ButBleepingComputerbelieves chances are - the victims will never see their data again, regardless of if they make the payment, or not. Apparently, it’s both practically and financially unfeasible for the attackers to keep all this data stored somewhere. Chances are, they probably deleted all of it anyway, and are now just trying the victims out to see who’ll pay up anyway.

The entire attack was fully automated, the researchers believe. Using an automated script, they parsed unprotected databases, wiped the data, and added the ransom note.

As usual, the demand is to be paid in bitcoin, and so far, one payment has been made, the publication confirmed.

Are you a pro? Subscribe to our newsletter

Are you a pro? Subscribe to our newsletter

Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!

Thousands of mobile app cloud databases have been left exposed online>Microsoft Azure bug left a bunch of cloud databases wide open>Sega left a huge database of user information open to hackers

Paying the ransom demand is never advised. There’s no guarantee the victims will get their data back, be it partially, or completely. It also motivates the attackers to keep the campaign going. The victim could be struck again, either by the same threat actor or by an entirely different one.

Instead, businesses are advised to protect their endpoints with ransomware protection services, set up afirewall, educate their employees on the dangers of phishing, and make sure they keep all of their software and hardware up-to-date. Last, but definitely not least, businesses should ensure a strong, and regularly updated, backup solution.

Via:BleepingComputer

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

Phishing attacks surge in 2024 as cybercriminals adopt AI tools and multi-channel tactics

This new phishing strategy utilizes GitHub comments to distribute malware

iStorage Group acquires Kanguru Solutions as it looks to expand security offering