{"id":17481,"date":"2020-01-17T12:10:03","date_gmt":"2020-01-17T20:10:03","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2020\/01\/17\/news-11216\/"},"modified":"2020-01-17T12:10:03","modified_gmt":"2020-01-17T20:10:03","slug":"news-11216","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2020\/01\/17\/news-11216\/","title":{"rendered":"Business in the front, party in the back: backdoors in elastic servers expose private data"},"content":{"rendered":"<p><strong>Credit to Author: Vasilios Hioureas| Date: Fri, 17 Jan 2020 18:58:47 +0000<\/strong><\/p>\n<p>It seems like every day we read another article about a data breach or leak of cloud storage exposing millions of users&#8217; data. <\/p>\n<p>The unfortunate truth is that the majority of these leaks require no actual &#8220;hacking&#8221; on the part of the attacker. Most of the time, this highly confidential data is just sitting in open databases, ripe for the picking. <br \/>It&#8217;s all too easy to discover data leaks online, especially in cloud services, which says a lot about the state of security and preparedness for cyberattacks\u2014we have a long way to go.<\/p>\n<p>Continuing my series on insecure cloud infrastructure, where I previously covered <a href=\"https:\/\/blog.malwarebytes.com\/researchers-corner\/2019\/09\/hacking-with-aws-incorporating-leaky-buckets-osint-workflow\/\">AWS<\/a> and <a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/05\/medical-industry-struggles-with-pacs-data-leaks\/\">PACS<\/a>, I will be going into some detail on elastic servers. Specifically, I will cover a number of cases in which I discovered a common misconfiguration, leading to open backdoors, which expose many records of personal data. <\/p>\n<hr class=\"wp-block-separator\"\/>\n<h3>Exposed databases using search<\/h3>\n<p>Before I go into detail on the accidental backdoors found in elastic servers, let&#8217;s take a look at just how easy it is to find one of these exposed databases online.<\/p>\n<p>While there are dozens of tools and methods for this discovery phase, for the purposes of this demonstration, I used <a href=\"https:\/\/www.shodan.io\">shodan<\/a>, a search engine that crawls the web for Internet-connected devices.<\/p>\n<p>Let&#8217;s do a quick experiment and see if it yields results. With a quick Google search on elastic databases, we learn that elastic databases by default listen on port 9200.<\/p>\n<figure class=\"wp-block-image\"><img decoding=\"async\" data-attachment-id=\"41924\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-spotlight\/2020\/01\/business-in-the-front-party-in-the-back-backdoors-in-elastic-servers-expose-private-data\/attachment\/screen-shot-2020-01-10-at-11-11-24-am\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/01\/Screen-Shot-2020-01-10-at-11.11.24-AM.png\" data-orig-size=\"1406,718\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Screen Shot 2020-01-10 at 11.11.24 AM\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/01\/Screen-Shot-2020-01-10-at-11.11.24-AM-300x153.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/01\/Screen-Shot-2020-01-10-at-11.11.24-AM-600x306.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/01\/Screen-Shot-2020-01-10-at-11.11.24-AM-600x306.png\" alt=\"\" class=\"wp-image-41924\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/01\/Screen-Shot-2020-01-10-at-11.11.24-AM-600x306.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/01\/Screen-Shot-2020-01-10-at-11.11.24-AM-300x153.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/01\/Screen-Shot-2020-01-10-at-11.11.24-AM.png 1406w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/figure>\n<figure class=\"wp-block-image\"><img decoding=\"async\" data-attachment-id=\"41986\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-spotlight\/2020\/01\/business-in-the-front-party-in-the-back-backdoors-in-elastic-servers-expose-private-data\/attachment\/screen-shot-2020-01-17-at-9-52-54-am\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/01\/Screen-Shot-2020-01-17-at-9.52.54-AM.png\" data-orig-size=\"1680,1218\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Screen Shot 2020-01-17 at 9.52.54 AM\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/01\/Screen-Shot-2020-01-17-at-9.52.54-AM-300x218.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/01\/Screen-Shot-2020-01-17-at-9.52.54-AM-600x435.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/01\/Screen-Shot-2020-01-17-at-9.52.54-AM-600x435.png\" alt=\"\" class=\"wp-image-41986\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/01\/Screen-Shot-2020-01-17-at-9.52.54-AM-600x435.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/01\/Screen-Shot-2020-01-17-at-9.52.54-AM-300x218.png 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/figure>\n<p>From there, we open up shodan and search:<br \/><strong>elastic port:9200<\/strong><\/p>\n<p>This will basically bring up IPs who have a service responding on port 9200 and whose content contains the word &#8220;elastic.&#8221; Ninety-nine percent of the time, this will bring up an elastic search server. <\/p>\n<p>For the sake of full comprehension, I will give a 10-second primer on how to use the elastic search API.<\/p>\n<p>Elastic can be compared to MYSQL in the following way:<\/p>\n<table class=\"wp-block-table is-style-regular\" border=\"2\">\n<tbody>\n<tr>\n<td>                    <strong>MYSQL<\/strong><\/td>\n<td>                    <strong>ELASTIC<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Databases<\/td>\n<td>Indices<\/td>\n<\/tr>\n<tr>\n<td>Tables<\/td>\n<td>Types<\/td>\n<\/tr>\n<tr>\n<td>Records &#8211; column and row<\/td>\n<td>Document with properties<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Here are a few key commands to help you navigate any elastic instance. The first is the <strong>\/_cat<\/strong> command and the second is the <strong>\/_search?pretty=true.<\/strong><br \/>The cat command simply lists information, and it is a good starting point to understand what indices or fields you have to work with. <\/p>\n<h3>Elastic servers<\/h3>\n<p>Jumping into shodan, we start our search for elastic databases.<\/p>\n<figure class=\"wp-block-image\"><img decoding=\"async\" data-attachment-id=\"41987\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-spotlight\/2020\/01\/business-in-the-front-party-in-the-back-backdoors-in-elastic-servers-expose-private-data\/attachment\/screen-shot-2020-01-13-at-3-56-41-pm-2\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/01\/Screen-Shot-2020-01-13-at-3.56.41-PM-1.png\" data-orig-size=\"2080,1406\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Screen Shot 2020-01-13 at 3.56.41 PM\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/01\/Screen-Shot-2020-01-13-at-3.56.41-PM-1-300x203.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/01\/Screen-Shot-2020-01-13-at-3.56.41-PM-1-600x406.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/01\/Screen-Shot-2020-01-13-at-3.56.41-PM-1-600x406.png\" alt=\"\" class=\"wp-image-41987\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/01\/Screen-Shot-2020-01-13-at-3.56.41-PM-1-600x406.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/01\/Screen-Shot-2020-01-13-at-3.56.41-PM-1-300x203.png 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/figure>\n<p>Let&#8217;s choose the a random IP that comes up from the shodan query. In this case, it is a server residing in China: <strong>https:\/\/www.shodan.io\/host\/47.104.101.159#9200<\/strong><\/p>\n<p>We can check if it is open to the world by typing in: <strong>http:\/\/47.104.101.159:9200\/_cat\/<\/strong> <\/p>\n<p>This brings up the following results:<\/p>\n<figure class=\"wp-block-image\"><img decoding=\"async\" data-attachment-id=\"41925\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-spotlight\/2020\/01\/business-in-the-front-party-in-the-back-backdoors-in-elastic-servers-expose-private-data\/attachment\/screen-shot-2020-01-10-at-12-04-39-pm\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/01\/Screen-Shot-2020-01-10-at-12.04.39-PM.png\" data-orig-size=\"592,912\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Screen Shot 2020-01-10 at 12.04.39 PM\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/01\/Screen-Shot-2020-01-10-at-12.04.39-PM-195x300.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/01\/Screen-Shot-2020-01-10-at-12.04.39-PM-389x600.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/01\/Screen-Shot-2020-01-10-at-12.04.39-PM-195x300.png\" alt=\"\" class=\"wp-image-41925\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/01\/Screen-Shot-2020-01-10-at-12.04.39-PM-195x300.png 195w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/01\/Screen-Shot-2020-01-10-at-12.04.39-PM-389x600.png 389w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/01\/Screen-Shot-2020-01-10-at-12.04.39-PM.png 592w\" sizes=\"(max-width: 195px) 100vw, 195px\" \/><\/figure>\n<p>Seems like no authentication so far. Let&#8217;s look at what indices exist here by typing in <strong>\/_cat\/indices<\/strong>, which gives us the following results:<\/p>\n<figure class=\"wp-block-image\"><img decoding=\"async\" data-attachment-id=\"41926\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-spotlight\/2020\/01\/business-in-the-front-party-in-the-back-backdoors-in-elastic-servers-expose-private-data\/attachment\/screen-shot-2020-01-10-at-12-10-14-pm\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/01\/Screen-Shot-2020-01-10-at-12.10.14-PM.png\" data-orig-size=\"1244,218\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Screen Shot 2020-01-10 at 12.10.14 PM\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/01\/Screen-Shot-2020-01-10-at-12.10.14-PM-300x53.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/01\/Screen-Shot-2020-01-10-at-12.10.14-PM-600x105.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/01\/Screen-Shot-2020-01-10-at-12.10.14-PM-600x105.png\" alt=\"\" class=\"wp-image-41926\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/01\/Screen-Shot-2020-01-10-at-12.10.14-PM-600x105.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/01\/Screen-Shot-2020-01-10-at-12.10.14-PM-300x53.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/01\/Screen-Shot-2020-01-10-at-12.10.14-PM.png 1244w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/figure>\n<p>So far so good. It is clear that at the moment we will not likely be facing any authentication stopping us from accessing the data. Now we can list the contents of one of these indices, similar to a <strong>Select * from TABLE_NAME<\/strong> in sql. Lets choose one at random, <strong>kms_news<\/strong>, which looks to have 37 records inside. <\/p>\n<p>We type <strong>http:\/\/47.104.101.159:9200\/dzkj_news\/_search?pretty=true<\/strong><br \/>and voila! All the data spits out for us with hardly any effort at all.<\/p>\n<figure class=\"wp-block-image\"><img decoding=\"async\" data-attachment-id=\"41927\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-spotlight\/2020\/01\/business-in-the-front-party-in-the-back-backdoors-in-elastic-servers-expose-private-data\/attachment\/screen-shot-2020-01-10-at-12-15-38-pm\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/01\/Screen-Shot-2020-01-10-at-12.15.38-PM.png\" data-orig-size=\"1134,498\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Screen Shot 2020-01-10 at 12.15.38 PM\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/01\/Screen-Shot-2020-01-10-at-12.15.38-PM-300x132.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/01\/Screen-Shot-2020-01-10-at-12.15.38-PM-600x263.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/01\/Screen-Shot-2020-01-10-at-12.15.38-PM-600x263.png\" alt=\"\" class=\"wp-image-41927\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/01\/Screen-Shot-2020-01-10-at-12.15.38-PM-600x263.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/01\/Screen-Shot-2020-01-10-at-12.15.38-PM-300x132.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/01\/Screen-Shot-2020-01-10-at-12.15.38-PM-195x85.png 195w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/01\/Screen-Shot-2020-01-10-at-12.15.38-PM.png 1134w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/figure>\n<p>As you can see, it was quite easy to find exposed data in a random elastic server online. In less than a minute, we found an exposed server and could continue to dump all the data. I am certain that if we spent a bit more time, we would find a database with a more critical leak. <\/p>\n<p>There is a reason, after all, that these databases have received so much press for their infamous leaks. <\/p>\n<hr class=\"wp-block-separator\"\/>\n<h3>The backdoor<\/h3>\n<p>Now lets get to the topic at hand&#8230; the misconfigurations leading to the backdoor. <\/p>\n<p>Along with elastic, you often hear the word Kibana. This is basically the GUI front end to an elastic database, allowing you to browse\/search data and configure the structure and details of the elastic instance. <\/p>\n<p>As such, it is common for companies to have an internal elastic DB on premise and expose the Kibana front end so that employees may access the data from their web browser, fully authenticated. In this case, the Kibana server could listen on port 5601, open to the Internet, and will access the data from an internal elastic DB behind the company&#8217;s local intranet.<\/p>\n<figure class=\"wp-block-image\"><img decoding=\"async\" data-attachment-id=\"41955\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-spotlight\/2020\/01\/business-in-the-front-party-in-the-back-backdoors-in-elastic-servers-expose-private-data\/attachment\/screen-shot-2020-01-14-at-9-48-08-am\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/01\/Screen-Shot-2020-01-14-at-9.48.08-AM.png\" data-orig-size=\"1316,888\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Screen Shot 2020-01-14 at 9.48.08 AM\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/01\/Screen-Shot-2020-01-14-at-9.48.08-AM-300x202.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/01\/Screen-Shot-2020-01-14-at-9.48.08-AM-600x405.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/01\/Screen-Shot-2020-01-14-at-9.48.08-AM-600x405.png\" alt=\"\" class=\"wp-image-41955\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/01\/Screen-Shot-2020-01-14-at-9.48.08-AM-600x405.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/01\/Screen-Shot-2020-01-14-at-9.48.08-AM-300x202.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/01\/Screen-Shot-2020-01-14-at-9.48.08-AM.png 1316w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><figcaption>Proper configuration<\/figcaption><\/figure>\n<p>So where does the backdoor lie? Well, after having done an exhaustive search of various Kibana servers online, I noticed something funny happening on a large number of results. <\/p>\n<p>I would browse to the Kibana instance and receive the login screen as expected, but after doing a port scan using nmap on the same IP, I noticed a familiar port being opened:<\/p>\n<figure class=\"wp-block-image\"><img decoding=\"async\" data-attachment-id=\"41988\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-spotlight\/2020\/01\/business-in-the-front-party-in-the-back-backdoors-in-elastic-servers-expose-private-data\/attachment\/login-8\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/01\/login-1.png\" data-orig-size=\"1154,1252\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"login\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/01\/login-1-277x300.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/01\/login-1-553x600.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/01\/login-1-553x600.png\" alt=\"\" class=\"wp-image-41988\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/01\/login-1-553x600.png 553w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/01\/login-1-277x300.png 277w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/01\/login-1.png 1154w\" sizes=\"(max-width: 553px) 100vw, 553px\" \/><\/figure>\n<p>The infamous 9200!  <\/p>\n<figure class=\"wp-block-image\"><img decoding=\"async\" data-attachment-id=\"41989\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-spotlight\/2020\/01\/business-in-the-front-party-in-the-back-backdoors-in-elastic-servers-expose-private-data\/attachment\/screen-shot-2020-01-14-at-10-04-48-am-2\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/01\/Screen-Shot-2020-01-14-at-10.04.48-AM-1.png\" data-orig-size=\"960,318\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Screen Shot 2020-01-14 at 10.04.48 AM\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/01\/Screen-Shot-2020-01-14-at-10.04.48-AM-1-300x99.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/01\/Screen-Shot-2020-01-14-at-10.04.48-AM-1-600x199.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/01\/Screen-Shot-2020-01-14-at-10.04.48-AM-1-600x199.png\" alt=\"\" class=\"wp-image-41989\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/01\/Screen-Shot-2020-01-14-at-10.04.48-AM-1-600x199.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/01\/Screen-Shot-2020-01-14-at-10.04.48-AM-1-300x99.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/01\/Screen-Shot-2020-01-14-at-10.04.48-AM-1.png 960w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/figure>\n<p>To be specific, I found more than 20 servers within a span of five minutes with this same misconfiguration. What&#8217;s going on here is that an admin set up elastic search and decided to allow access through the Kibana front end, restricted by proper authentication. The problem, however, is that the actual data store on port 9200 isn&#8217;t just communicating internally. It, too, is exposed to the Internet, allowing backdoor access to the data directly from elastic queries carried out by anyone who wants to look, just as we did in the example above.  <\/p>\n<p>Here is an illustration showing the misconfiguration, which should make it all the more clear.<\/p>\n<figure class=\"wp-block-image\"><img decoding=\"async\" data-attachment-id=\"41958\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-spotlight\/2020\/01\/business-in-the-front-party-in-the-back-backdoors-in-elastic-servers-expose-private-data\/attachment\/badmiconf\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/01\/badMiconf.png\" data-orig-size=\"1304,892\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"badMiconf\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/01\/badMiconf-300x205.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/01\/badMiconf-600x410.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/01\/badMiconf-600x410.png\" alt=\"\" class=\"wp-image-41958\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/01\/badMiconf-600x410.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/01\/badMiconf-300x205.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/01\/badMiconf.png 1304w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/figure>\n<p>Finding a port 9200 exposed to the public does not mean there will be something of value inside. However, the combination of these two ports being exposed and restricting access only on Kibana almost guarantees that there is data here the company wanted to keep private.<\/p>\n<h2>Elastic ready to snap<\/h2>\n<p>Elastic is likely the number one source of leaked data online, and after conducting this research, I would attribute that to how easy it is to misconfigure. The focus, of course, being on the relationship between the internal server on 9200 and the public-facing component on 5601. <\/p>\n<p>The purpose of this article was not to talk about a specific company or to put anyone on blast for exposing public data. Rather, I am hoping to explain just how many servers are sitting on the Internet with this backdoor. There are thousands of elastic servers open to the public and exposing data\u2014this is nothing new. What makes these specific cases unique is that there were clearly attempts to incorporate some type of security, however, the platform is clearly being misunderstood.<\/p>\n<p>Because elastic search is such a commonly used cloud database, it&#8217;s important to highlight this specific misconfiguration because it can easily be fixed.  <\/p>\n<p>Finding the exposed data was neither the result of a 1337 hack, nor a difficult side channel to discover. Hopefully this may help admins using elastic to better understand the danger of defaults, and for security analysts, this hopefully provided some useful information on researching new cloud infrastructures. <\/p>\n<p>Stay tuned for the next article in this series where I will be covering the details of various leaks found on elastic.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-spotlight\/2020\/01\/business-in-the-front-party-in-the-back-backdoors-in-elastic-servers-expose-private-data\/\">Business in the front, party in the back: backdoors in elastic servers expose private data<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/threat-spotlight\/2020\/01\/business-in-the-front-party-in-the-back-backdoors-in-elastic-servers-expose-private-data\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Vasilios Hioureas| Date: Fri, 17 Jan 2020 18:58:47 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/threat-spotlight\/2020\/01\/business-in-the-front-party-in-the-back-backdoors-in-elastic-servers-expose-private-data\/' title='Business in the front, party in the back: backdoors in elastic servers expose private data'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/01\/shutterstock_355847825.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>It&#8217;s all too easy to discover data leaks online, especially in cloud services. We take a look at misconfigurations in elastic servers that lead to exposed data on the Internet.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-spotlight\/\" rel=\"category tag\">Threat spotlight<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/aws\/\" rel=\"tag\">aws<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/aws-buckets\/\" rel=\"tag\">AWS buckets<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/cloud-database\/\" rel=\"tag\">cloud database<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/cloud-databases\/\" rel=\"tag\">cloud databases<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/cloud-infrastructure\/\" rel=\"tag\">cloud infrastructure<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/elastic-databases\/\" rel=\"tag\">elastic databases<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/elastic-servers\/\" rel=\"tag\">elastic servers<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/insecure-cloud\/\" rel=\"tag\">insecure cloud<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/pacs\/\" rel=\"tag\">pacs<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/personally-identifiable-information\/\" rel=\"tag\">personally identifiable information<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/port-9200\/\" rel=\"tag\">port 9200<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/threat-spotlight\/2020\/01\/business-in-the-front-party-in-the-back-backdoors-in-elastic-servers-expose-private-data\/' title='Business in the front, party in the back: backdoors in elastic servers expose private data'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-spotlight\/2020\/01\/business-in-the-front-party-in-the-back-backdoors-in-elastic-servers-expose-private-data\/\">Business in the front, party in the back: backdoors in elastic servers expose private data<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[12010,22939,23961,23962,23963,23964,23965,23966,17518,19130,23967,21161],"class_list":["post-17481","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-aws","tag-aws-buckets","tag-cloud-database","tag-cloud-databases","tag-cloud-infrastructure","tag-elastic-databases","tag-elastic-servers","tag-insecure-cloud","tag-pacs","tag-personally-identifiable-information","tag-port-9200","tag-threat-spotlight"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17481","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=17481"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17481\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=17481"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=17481"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=17481"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}