After MongoDB, ransomware groups hit exposed Elasticsearch clusters

‘);
IDG.GPT.addDisplayedAd(“gpt-pin”, “true”);
IDG.GPT.addLazyloadedAd(“gpt-pin”, “true”);
document.write(”);
IDG.GPT.displayGoogleTagSlot(‘gpt-pin’);
离职员工通常会带走公司的重要文件,进而带来损失,我们必须加强用户和权限管理,只给用户完成其工作所需最少权限,另外还要及时停止离职员工的系统访问权限。
if (Object.keys(IDG.GPT.companions).length > 0) {
网络安全意识动画片展播个人隐私保护及信息安全意识基础
IDG.GPT.refreshAd(‘gpt-pin’);
}
//–>
After deleting data from thousands of publicly accessible MongoDB databases, ransomware groups have started doing the same with Elasticsearch clusters that are accessible from the internet and are not properly secured.
Elasticsearch is a Java-based search engine that’s popular in enterprise environments. It’s typically used in conjunction with log collection and data analytics and visualization platforms.
The first report of an Elasticsearch cluster being hit by ransomware appeared on the official support forums on Thursday from a user who was running a test deployment accessible from the internet.
All data from the cluster was wiped and a single index was left behind with a ransom message reading: “SEND 0.2 BTC TO THIS WALLET: 1DAsGY4Kt1a4LCTPMH5vm5PqX32eZmot4r IF YOU WANT RECOVER YOUR DATABASE! SEND TO THIS EMAIL YOUR SERVER IP AFTER SENDING THE BITCOINS.”

Niall Merrigan, a security researcher who has been keeping track of MongoDB databases wiped in a similar fashion over the past two weeks, reported on Twitter that over 600 Elasticsearch clusters have been affected so far.
This is likely only the beginning as some estimates put the number of internet-accessible Elasticsearch deployments at around 35,000. The number of wiped MongoDB databases grew from a few hundred to thousands in a matter of days, the number of victims eventually reaching over 34,000.
According to experts, there is no reason to expose Elasticsearch clusters to the internet. In response to these recent attacks, search technologies and distributed systems architect Itamar Syn-Hershko has published a blog post with recommendations for securing Elasticsearch deployments.
“Have a Single Page Application that needs to query Elastic and get jsons for display? Pass it through a software facade that can do request filtering, audit-logging and most importantly, password-protect your data,” Syn-Hershko said. “Without that, (a) you are for sure binding to a public IP and you shouldn’t, (b) you are risking unwanted changes to your data, (c) and the worst – you can’t control who accesses what and all your data is visible for all to see. Just what’s happening now with those Elasticsearch clusters.”
If you’re affected by these attacks, paying the ransom is not recommended because the attackers might not have actually have the data. Experts who helped MongoDB victims reported that they saw no evidence in the server logs of the data being exfiltrated before being wiped.
Ransomware attacks directed at servers are unlikely to stop anytime soon, especially since MongoDB and Elasticsearch are not the only type of data storage systems that are commonly left unprotected on the Internet.
To comment on this article and other PCWorld content, visit our Facebook page or our Twitter feed.
Related:
Security
Lucian Constantin is an IDG News Service correspondent. He writes about information security, privacy, and data protection.
邮件、短信,都是沟通的工具,当用于商业促销、欺凌甚至诈骗等不良目的时,却让人生厌。然而某些人眼中的垃圾,在另一些人眼中可能很有价值,为防垃圾短信立法时,更重要的是要引导和建立一种信息订阅的体系。

猜您喜欢

智慧城市建设对雾霾治理有什么帮助吗?
安全意识互动游戏之捕蛇者生存挑战赛
网络安全公益短片中间人攻击防范
微软“鉴黄师”怒告东家:要求赔偿工伤!
GGUSD PARKERHISTORY
五花八门的数据丢失渠道