Security Experts:

Connect with us

Hi, what are you looking for?



Cybercriminals Hold 1,200 Unsecured Elasticsearch Databases for Ransom

Secureworks warns of a new attack campaign targeting internet-exposed, improperly secured Elasticsearch databases to replace their data with a ransom note.

Secureworks warns of a new attack campaign targeting internet-exposed, improperly secured Elasticsearch databases to replace their data with a ransom note.

Over 1,200 databases that could be accessed without authentication have already fallen victim to the attackers, which replaced their indexes with a note demanding a payment of 0.012 Bitcoin in exchange for the data.

“In each case, data held in the databases was replaced with a ransom note stored in the ‘message’ field of an index called ‘read_me_to_recover_database’. Inside the ’email’ field is a contact email address,” Secureworks notes.

The researchers identified four email addresses used in these attacks, as well as two different Bitcoin wallets. The ransom requests total roughly $280,000, but no payment appears to have been made to date, suggesting that the campaign has been unsuccessful.

What Secureworks could not determine was the number of potential victims, because the databases were hosted on networks maintained by cloud computing providers.

“It is likely that some databases belong to the same organization, but identifying specific victims was not possible in most cases,” the researchers say.

This campaign shows the risk that internet-facing databases pose to organizations, especially if they are misconfigured or unsecured. Finding such instances is trivial and attackers can easily take control of them.

Elastic has long warned of the risks associated with exposing Elasticsearch databases to the internet, and has provided detailed instructions on how clusters can be properly secured.

According to Secureworks, while an automated script was likely used to access the vulnerable databases and replace indexes with the ransom note, it’s unlikely that the threat actor behind the campaign was able to exfiltrate the data from such a large number of databases.

“[T]he cost of storing data from 1,200 databases would be prohibitively expensive. It is therefore likely that the data was not backed up and that paying the ransom would not restore it,” the researchers say.

This is not the first campaign targeting improperly secured Elasticsearch databases. In 2017, hackers hit thousands of Elasticsearch clusters, after ransacking over 33,000 MongoDB databases. In 2020, thousands of MongoDB databases once again fell victim to a similar attack.

Related: Scanning Finds Over 3.6 Million Internet-Accessible MySQL Servers

Related: Unprotected MongoDB Instance Exposes 800 Million Emails

Related: Elasticsearch Instances Expose Data of 82 Million U.S. Users

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.


Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.


Expert Insights

Related Content


Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.


Satellite TV giant Dish Network confirmed that a recent outage was the result of a cyberattack and admitted that data was stolen.


The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.


The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Application Security

PayPal is alerting roughly 35,000 individuals that their accounts have been targeted in a credential stuffing campaign.


No one combatting cybercrime knows everything, but everyone in the battle has some intelligence to contribute to the larger knowledge base.


As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.


A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...