Hacking

Multiple threat actors are targeting Elasticsearch Clusters

Security researchers at Cisco Talos are warning of a spike in attacks on unsecured Elasticsearch clusters to drop cryptocurrency miners.

Cisco Talos experts have reported a spike in the attacks that
leverage known flaws to compromise unsecured Elasticsearch clusters and use them to mine crypto-currencies.

At least six different threat actors are targeting installs running older versions (1.4.2 and lower) to compromise them and install the malicious code the exploit the CVE-2014-3120 and CVE-2015-1427 vulnerabilities.

“Through ongoing analysis of honeypot traffic, Talos detected an increase in attacks targeting unsecured Elasticsearch clusters. These attacks leverage CVE-2014-3120 and CVE-2015-1427, both of which are only present in old versions of Elasticsearch and exploit the ability to pass scripts to search queries.” reads the analysis published by Talos.

“Based on patterns in the payloads and exploit chains, Talos assesses with moderate confidence that six distinct actors are exploiting our honeypots.”

The most active of the threat actors involved in the wave of attacks attempts to deploy two distinct payloads with the initial exploit for the CVE-2015-1427 flaw. According to Talos, both payloads downloads the same bash script, the first one uses the wget to download the script, while the second one leverages obfuscated Java to invoke bash and download the same bash script with wget. Attackers are likely attempting to make the exploit work on a broader variety of platforms.
 The first payload invokes wget to download a bash script, while the second payload uses obfuscated Java to invoke bash and download the same bash script with wget. This is likely an attempt to make the exploit work on a broader variety of platforms.

The bash script is used to disable security protections and kill other malicious processes, primarily other cryptominers. Then the script places its RSA key in the authorized_keys file. The script achieves persistence by installing shell scripts as cron jobs, it can be also used to download additional miners.

Experts also discovered that the bash script also downloads a UPX-packed ELF executable that contains exploits to target other systems such as Drupal and Oracler Weblogic. Experts observed working exploits for the CVE-2018-7600 in Drupal (aka Drupalgeddon2) and the CVE-2017-10271 in Oracle WebLogic, and CVE-2018-1273 in Spring Data Commons.

The experts observed a second threat actor using the exploit for the CVE-2014-3120 to deliver a malicious code that is a derivative of the Bill Gates DDoS malware.

Another group of attackers exploits the same flaw to download a file named “LinuxT” from an HTTP file server that is a variant of the Spike Trojan targeting x86, MIPS and ARM architectures.

“As part of our research, we observed that, in some cases, hosts that attempted to download the “LinuxT” sample also dropped payloads that executed the command “echo ‘qq952135763.'” This behavior has been seen in elastic search error logs going back several years. QQ is a popular Chinese social media website, and it is possible that this is referencing a QQ account.” continues the experts.

The same QQ account is likely associated with other attacks that attempt to exploit the CVE-2015-1427 to drop payloads that execute both “echo ‘qq952135763′” and “echo ‘952135763’,” but they did not attempt to also download “LinuxT.”

Three other actors are also targeting Elasticsearch but they are not attempting to deliver any malware.

“Given the size and sensitivity of the data sets these clusters contain, the impact of a breach of this nature could be severe.” Talos concludes.

“Talos urges readers to patch and upgrade to a newer version of Elasticsearch if at all possible. Additionally, Talos highly recommends disabling the ability to send scripts through search queries if that ability is not strictly necessary for your use cases,”

[adrotate banner=”9″] [adrotate banner=”12″]

Pierluigi Paganini

(SecurityAffairs – Elasticsearch, hacking)

[adrotate banner=”5″]

[adrotate banner=”13″]

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Fintech firm Figure disclosed data breach after employee phishing attack

Fintech firm Figure confirmed a data breach after hackers used social engineering to trick an…

15 hours ago

U.S. CISA adds a flaw in BeyondTrust RS and PRA to its Known Exploited Vulnerabilities catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in BeyondTrust RS and…

17 hours ago

Suspected Russian hackers deploy CANFAIL malware against Ukraine

A new alleged Russia-linked APT group targeted Ukrainian defense, government, and energy groups, with CANFAIL…

21 hours ago

New threat actor UAT-9921 deploys VoidLink against enterprise sectors

A new threat actor, UAT-9921, uses the modular VoidLink framework to target technology and financial…

1 day ago

Attackers exploit BeyondTrust CVE-2026-1731 within hours of PoC release

Attackers quickly targeted BeyondTrust flaw CVE-2026-1731 after a PoC was released, enabling unauthenticated remote code…

2 days ago

Google: state-backed hackers exploit Gemini AI for cyber recon and attacks

Google says nation-state actors used Gemini AI for reconnaissance and attack support in cyber operations.…

2 days ago

This website uses cookies.