The collections contained information collected by a UK research firm on data breaches from the years 2012 to 2019.
An open Elasticsearch instance has exposed more than 5 billion records in an incident discovered on March 16. The irony is that the data in two Elasticsearch collections appears to be information on data breaches collected by a UK-based research firm from 2012 to 2019.
The structured data includes extensive information on the breaches, including domain, source, contact email address, and password. While many of the incidents appear to have been public knowledge, some of the information in the database is not and therefore could present at least an enhanced phishing risk for the victims.
According to security researcher Bob Diachenko, who found the exposed instance, after notification the presumed owner of the data did not respond to his message, but the collections were taken offline within an hour.
For more, read here.
Check out The Edge, Dark Reading's new section for features, threat data, and in-depth perspectives. Today's featured story: "Security Lessons We've Learned (So Far) from COVID-19."
About the Author(s)
You May Also Like
Securing Code in the Age of AI
April 24, 2024Beyond Spam Filters and Firewalls: Preventing Business Email Compromises in the Modern Enterprise
April 30, 2024Key Findings from the State of AppSec Report 2024
May 7, 2024Is AI Identifying Threats to Your Network?
May 14, 2024Where and Why Threat Intelligence Makes Sense for Your Enterprise Security Strategy
May 15, 2024
Black Hat USA - August 3-8 - Learn More
August 3, 2024Cybersecurity's Hottest New Technologies: What You Need To Know
March 21, 2024