Security researchers discovered 257,287 legal documents from unprotected Elasticsearch cluster that hosted on a US-based Amazon AWS server.
The unprotected sensitive documents labeled as “not designated for publication‘” and the data contains 4.7GB highly sensitive legal documents.
Further investigation reveals that the data managed by Lex Machina, an IP litigation research company and division of LexisNexis.
LexisNexis responsible for develops legal analytics data and software, and sent them a security notification alert.
This unprotected Elasticsearch cluster discovered by Bob Diachenko, security researcher from securitydiscovery and the research is part of
identify and alert organizations that are misconfiguring noSql databases, such as MongoDB, CouchDB, Elasticsearch etc.
All the 250K sensitive documents were publicly available at the time when researcher discovered this unprotected Elasticsearch cluster let any one can access the all the files.
Researcher said, “However, upon a closer look at the cluster’s digital footprint, I tend to assume that database in question was handled by a company named LexSphere (based in India) which provides legal outsourcing services to a law firm called LexVisio.”
These unprotected server allows cyber criminals to take control the complete systems admin privilege and also high possibilities to install the malware and ransomware even attackers execute the code to take control the server remotely to steal and destroy the stored files.
You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.
Also Read:
Box Data Leak – Terabytes of Data Exposed from Companies Using cloud based Box Accounts
SBI Data Leak – Millions of Customers Data Leaked From Unsecured Server
New AWS Security Feature To Stop Accidental S3 Public Exposure
Tips and Practical Guidance for Getting Started AWS Lambda with Best Security Practices
Researchers observed Lumma Stealer activity across multiple online samples, including PowerShell scripts and a disguised…
Palo Alto Networks reported the Contagious Interview campaign in November 2023, a financially motivated attack…
The recent discovery of the NjRat 2.3D Professional Edition on GitHub has raised alarms in…
A critical vulnerability, CVE-2024-3393, has been identified in the DNS Security feature of Palo Alto…
Threat Analysts have reported alarming findings about the "Araneida Scanner," a malicious tool allegedly based…
A major dark web operation dedicated to circumventing KYC (Know Your Customer) procedures, which involves…