{"id":3969,"date":"2017-01-16T16:02:12","date_gmt":"2017-01-16T21:02:12","guid":{"rendered":"http:\/\/local.brightwhiz\/?p=3969"},"modified":"2017-01-16T16:02:12","modified_gmt":"2017-01-16T21:02:12","slug":"elasticsearch-servers-ransom-attacks","status":"publish","type":"post","link":"http:\/\/local.brightwhiz\/elasticsearch-servers-ransom-attacks\/","title":{"rendered":"Elasticsearch Servers Being Wiped out in MongoDb Style Ransom Attacks"},"content":{"rendered":"
Just as victims are coming to terms with their MongoDB databases being hit<\/a> with mass random attacks, Elasticsearch<\/a> servers have become victim to the MongoDB<\/a> inspired mass attacks.<\/p>\n Elasticsearch is a Java<\/a> based search engine popularly used in the enterprise space for information cataloging and data analysis.<\/p>\n Within three days close to three thousand insecure servers had been wiped out after hackers <\/a>took over the systems. With more than 34,000 unsecured servers still open to the Internet<\/a>, this is proving to be another gold mine for ransom demanding hackers and coordinated hoaxes.<\/p>\n According to a Twit by John Matherly, founder of Shodan<\/a>, the world’s first search engine for Internet-connected devices. Of the close to the 35,000 exposed Elasticsearch servers, majority of them are hosted on Amazon Web Services infrastructure.<\/p>\n The hackers are taking over these servers by using tools and online services to detect open servers with no authentication at all. This is possible as like MongoDB databases<\/a> and Elasticsearch servers allow configurations without authentication.<\/p>\nThe Attacks Against Elasticsearch Servers<\/h2>\n