Cisco Talos’ security researchers warn of a spike in attacks on unsecured Elasticsearch clusters, coming from six distinct actors.
The assaults attempt to exploit vulnerabilities in older versions (1.4.2 and lower) and leverage scripts to drop both malware and crypto-currency miners on victim machines. The attackers attempt to exploit CVE-2014-3120 and CVE-2015-1427, old vulnerabilities that allow them to pass scripts to search queries.
The most active of the actors attempts to deploy two distinct payloads with the initial exploit, always using CVE-2015-1427, Talos reveals. Using different methods, both payloads download the same bash script, likely to ensure the exploit works on a broader range of platforms.
The bash script attempts to disable security protections and kill other malicious processes that might be running on the host, primarily other mining malware, and then place its RSA key in the authorized_keys file. The script achieves persistence and can be used to download miners and their configuration files.
The script also downloads a UPX-packed ELF executable that contains exploits targeting vulnerabilities in other systems for remote code execution: CVE-2018-7600 in Drupal, CVE-2017-10271 in Oracle WebLogic, and CVE-2018-1273 in Spring Data Commons. The exploits are usually served via HTTPS.
A second actor attempts to exploit CVE-2014-3120 to deliver a Bill Gates-derivative distributed denial-of-service malware.
A third actor exploits the same vulnerability to download a file named “LinuxT” from an HTTP file server, but the file is no longer hosted on the server. The researchers say this is likely a variant of the Spike Trojan targeting x86, MIPS and ARM architectures.
In some cases, hosts attempting to download LinuxT were also observed dropping payloads that execute the command “echo ‘qq952135763’,” this appears to be referencing to an account on QQ, a popular Chinese social media website.
Talos couldn’t link the account to the activity, although they did tie it to the potential attacker’s Gitee page (a Chinese code-sharing website similar to Github or Atlassian), to an account on Chinese hacking forum xiaoqi7, and to posts on topics related to exploits and malware on other forums.
Other attacks attempted to exploit CVE-2015-1427 to drop payloads that execute both “echo ‘qq952135763′” and “echo ‘952135763’,” but they did not attempt to also download “LinuxT.”
Three other actors observed targeting Elasticsearch did not deliver any malware through their exploits.
“Given the size and sensitivity of the data sets these [Elasticsearch] clusters contain, the impact of a breach of this nature could be severe. Talos urges readers to patch and upgrade to a newer version of Elasticsearch if at all possible. Additionally, Talos highly recommends disabling the ability to send scripts through search queries if that ability is not strictly necessary for your use cases,” Talos concludes.
Related: Elasticsearch Instances Expose Data of 82 Million U.S. Users
Related: POS Malware Abuses Exposed ElasticSearch Nodes for C&C

More from Ionut Arghire
- Millions Stolen in Hack at Cryptocurrency ATM Manufacturer General Bytes
- NBA Notifying Individuals of Data Breach at Mailing Services Provider
- Adobe Acrobat Sign Abused to Distribute Malware
- Latitude Financial Services Data Breach Impacts 300,000 Customers
- US Government Warns Organizations of LockBit 3.0 Ransomware Attacks
- New ‘Trigona’ Ransomware Targets US, Europe, Australia
- New Espionage Group ‘YoroTrooper’ Targeting Entities in European, CIS Countries
- CISA Seeks Public Opinion on Cloud Application Security Guidance
Latest News
- Aembit Scores $16.6M Seed Funding for Workload IAM Technology
- Millions Stolen in Hack at Cryptocurrency ATM Manufacturer General Bytes
- Waterfall Security, TXOne Networks Launch New OT Security Appliances
- Hitachi Energy Blames Data Breach on Zero-Day as Ransomware Gang Threatens Firm
- NBA Notifying Individuals of Data Breach at Mailing Services Provider
- Adobe Acrobat Sign Abused to Distribute Malware
- New York Man Arrested for Running BreachForums Cybercrime Website
- Huawei Has Replaced Thousands of US-Banned Parts With Chinese Versions: Founder
