Over the past two weeks, a hacker has been breaching Elasticsearch servers left exposed on the internet without password protection attempting to delete their content, while attempting to put blame on a cyber-security firm, ZDNet reports.
The attacks have started around March 24 and appear to be carried out using an automated script that searches the internet for unprotected Elasticsearch servers, connects to the databases, attempts to wipe their content, and then creates a new empty index called nightlionsecurity.com.
Vinny Troia, the owner of Night Lion Security, has denied his company’s involvement in the attacks saying that he believes that the campaign has been conducted by the hacker he has been tracking for the past few years.
According to BinarySearch, in the past few days the number of compromised Elasticsearch servers where the nightlionsecurity.com index is now present has risen to more than 15,000. For comparison, BinaryEdge lists a total of 34,500 Elasticsearch servers that are directly exposed on the public internet.
Troia said he notified law enforcement about the attacks. The Elastic security team has also been informed about the issue and now is looking into the matter.