Trending

HomeBlog
“NightLion” Worm Strikes Again
Cyble-NightLion-Worm

“NightLion” Worm Strikes Again

Cyble analyzes the resurfaced "NightLion", a worm that targets vulnerable, openly-accessible Elasticsearch Servers.

Introduction

Elasticsearch (ES) is a search engine-based NoSQL database system that is widely used for storing and searching data. ES is typically hosted on internet-facing infrastructure, and organizations often forget to implement standard procedures to protect their ES instances.

Recently, Cyble Research Labs came across a worm targeting Elasticsearch servers that are openly accessible without authentication. The worm deletes indices and leaves a note mentioning Night Lion Security and Shadow Byte, which are companies owned by Vinny Troia (a well-known security researcher).

Technical Analysis

We observed 829 open Elasticsearch servers which were attacked by this worm, most of which affected the US, closely followed by China. Figure 1 shows the Shodan results analysis for these databases.

Figure 1 – Shodan Results Analysis for 829 ES databases

Among these 829 databases, only 4 of them have been tagged “compromised” by Shodan. The last active status of these 829 IPs ranges from May 24, 2022, to June 23, 2022.

These ES databases have most indices deleted, and a readme note is added to the ES. The readme note has the name in the form “read-me-hacked-by-nightlionsecurity.” Figure 2 shows the index name as seen on the ES.

Figure 2 – ES showing readme note index

Some of these ES databases contained sensitive datasets as large as 10GB. Figure 3 shows one such example of the dataset.

report-ad-banner
Figure 3 – Sensitive content from one of the indexes

The readme note specifies that the attack was carried out by Night Lion security, and they have wiped the data. If the attack victim wants their data back, they have to pay Night Lion security. The note contains the phone number and website URL for the Night Lion Security and Shadow Byte. Figure 4 shows the readme note put by the worm on the ES.

Figure 4 – Readme note put up by the worm on the ES server

The threat actors most probably automated the discovery and targeting of Elasticsearch servers. The worm identifies the openly accessible unauthenticated ES servers, deletes most of the indices, and adds a readme note blaming Night Lion security.

Related Previous Attacks

Night Lion Security and Shadow Byte (a rebrand of Night Lion security) are owned by Vinny Troia. Vinny Troia is a security researcher whose name has been used in a previous attack by threat actors. A notable example is an incident that compromised 15000+ Elasticsearch servers in 2020, blaming Night Lion security.

The threat actors utilized the same technique as the latest one, which automated the discovery and targeting of ES servers. After attacking the ES server, the worm leaves a note named “nightlionsecurity.com.” Figure 5 shows the index name in this previous attack.

Figure 5 – ES showing readme note for 2020 attack

Vinny Troia commented about this previous attack stating that the attack was carried out by hackers his company had been tracking for the past few years. Figure 6 shows one of his comments on Twitter.

Figure 6 – Comment made by Vinny Troia during 2020 ES attacks

Conclusion

Cyble Research Labs has seen multiple instances in the past wherein threat actors have tried to exfiltrate data from open accessible Elasticsearch servers. Discovery of these unauthenticated Elasticsearch servers is very easy, and threat actors leverage this fact to target these servers.

We have talked about Elasticsearch servers attacked by Ransomware in a previous blog. You can read it here. We will continue to see these attacks on openly accessible databases, and we recommend that enterprises monitor these servers carefully.

Our Recommendations

Our recommendations for the industry-wise enterprises to avoid breaches caused by the Elasticsearch misconfigurations are: 

  • Enabling strong authentication for both ES servers and Kibana instances.
  • Creating policies to track misconfigured Elasticsearch servers.
  • Regular audits over the technology workflow process to identify any possible loopholes in the process. 
  • Enterprises are also advised to implement Digital Risk Protection Services (DRPS) program to monitor their infrastructure at potential risk. 
  • Perform Vulnerability Assessment of Internet-facing database servers routinely.

Disclaimer: This blog is based on our research and the information available at the time of writing. It is for informational purposes only and does not constitute legal, financial, or professional advice. While we strive for accuracy, we do not guarantee the completeness or reliability of the content. If any sensitive information has been inadvertently included, please contact us for correction. Cyble is not responsible for any errors, omissions, or decisions made based on this content. Readers should verify findings and seek expert advice where necessary. All trademarks, logos, and third-party content belong to their respective owners and do not imply endorsement or affiliation. All content is presented “as is” without any guarantee that it is free of confidential, proprietary, or otherwise sensitive information. If you believe any portion of this content contains inadvertently shared or sensitive data, please contact us immediately so that we may address and rectify the issue. No Liability for Errors or Omissions Due to the dynamic nature of cyber threat activity, this [blog/report/article] may include partial, outdated, or otherwise incorrect information due to unverified sources, evolving security threats, or human error. We expressly disclaim any liability for errors or omissions or any potential consequences arising from the use, misuse, or reliance on this information.

Get Threat Assessment Report

Identify External Threats Targeting Your Business​
Free

Threat Landscape Reports 2025

Upcoming Webinars

CISO's Guide to Threat Intelligence 2024

CISO’s Guide to Threat Intelligence 2024: Best Practices

Stay Ahead of Cyber Threats with Expert Insights and Strategies. Download Free E-Book Now

Share the Post:
Scroll to Top

Discover more from Cyble

Subscribe now to keep reading and get access to the full archive.

Continue reading