Elasticsearch databases are being hit hard by ransom attacks

(Image credit: Shutterstock / binarydesign)

Hundreds of misconfigured Elascticsearch databases were recently hit by ransom attacks, security experts have found. 

Cybersecurity researchers from Secureworks have uncovered 450 databases whose contents have been wiped, and in their place, a ransom note left.

The ransom note demands $620 per database, to restore the contents, adding up to a total of $279,000. Paying victims will receive a download link for their database, which should help them restore the data structure quickly, the attackers claim.

Share your thoughts on Cybersecurity and get a free copy of the Hacker's Manual 2022end of this survey

Share your thoughts on Cybersecurity and get a free copy of the Hacker's Manual 2022. Help us find how businesses are preparing for the post-Covid world and the implications of these activities on their cybersecurity plans. Enter your email at the end of this survey to get the bookazine, worth $10.99/£10.99.

The victims have a total of seven days to pay up, otherwise the ransom demand will double. If the victims fail to meet the extended deadline, they can expect never to see their data again.

Backing up

But BleepingComputer believes chances are - the victims will never see their data again, regardless of if they make the payment, or not. Apparently, it’s both practically and financially unfeasible for the attackers to keep all this data stored somewhere. Chances are, they probably deleted all of it anyway, and are now just trying the victims out to see who’ll pay up anyway.

The entire attack was fully automated, the researchers believe. Using an automated script, they parsed unprotected databases, wiped the data, and added the ransom note. 

As usual, the demand is to be paid in bitcoin, and so far, one payment has been made, the publication confirmed. 

Paying the ransom demand is never advised. There’s no guarantee the victims will get their data back, be it partially, or completely. It also motivates the attackers to keep the campaign going. The victim could be struck again, either by the same threat actor or by an entirely different one.

Instead, businesses are advised to protect their endpoints with ransomware protection services, set up a firewall, educate their employees on the dangers of phishing, and make sure they keep all of their software and hardware up-to-date. Last, but definitely not least, businesses should ensure a strong, and regularly updated, backup solution.

Via: BleepingComputer

Sead Fadilpašić

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.