Remove File names Remove IT Remove Mining Remove Search queries
article thumbnail

Multiple threat actors are targeting Elasticsearch Clusters

Security Affairs

Cisco Talos experts have reported a spike in the attacks that leverage known flaws to compromise unsecured Elasticsearch clusters and use them to mine crypto-currencies. Then the script places its RSA key in the authorized_keys file. ” This behavior has been seen in elastic search error logs going back several years. .