Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

OpenAI’s Promptfoo Deal Plugs Agentic AI Testing Gap

March 10, 2026

How to Protect Your SaaS from Bot Attacks with SafeLine WAF

March 10, 2026

Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials

March 10, 2026
Facebook X (Twitter) Instagram
Tuesday, March 10
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Threat Actor Exploits Flaws and Uses Elastic Cloud SIEM to Manage Stol
News

Threat Actor Exploits Flaws and Uses Elastic Cloud SIEM to Manage Stol

Team-CWDBy Team-CWDMarch 9, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A campaign exploiting multiple software vulnerabilities to steal system data and store it in a cloud-based security platform has been uncovered by cybersecurity researchers.

Investigators found that a threat actor used a free-trial instance of Elastic Cloud’s security information and event management (SIEM) platform to collect and analyse data from compromised systems across dozens of organisations.

The activity was discovered by researchers at Huntress, who observed attackers exploiting flaws in widely used enterprise software, including SolarWinds Web Help Desk.

Instead of using traditional command-and-control (C2) infrastructure, the attacker exfiltrated victim data directly into an attacker-controlled instance of Elastic Cloud, effectively turning a legitimate security monitoring tool into a repository for stolen information.

Elastic Trial as Data Hub and VPN Infrastructure

According to the investigation, the attacker deployed an encoded PowerShell command on compromised systems that gathered detailed host information. The script collected operating system details, hardware specifications, Active Directory data and installed patch information before transmitting it to an ElasticSearch index named “systeminfo”.

Researchers said the tactic allowed the operator to triage victims and prioritise targets using SIEM tools designed for defensive security monitoring.

The Elastic Cloud deployment was created on January 28, 2026, and remained active for several days. Telemetry showed the operator repeatedly interacting with the environment through the Kibana interface, logging hundreds of actions while examining incoming victim data.

Read more on cybersecurity threat intelligence: AI-Driven Insider Risk Now a “Critical Business Threat,” Report Warns

Further analysis revealed that the trial account was registered using a disposable email address linked to the domain quieresmail.com. Investigators believe the address format is tied to the Russian-registered temporary email network firstmail.ltd, which operates hundreds of throwaway domains.

Additional evidence suggested the attacker reused random eight-character identifiers across their infrastructure, including both email registrations and subdomains used to host tooling on Cloudflare worker pages.

Administrative logins to the SIEM instance were traced to IP addresses believed to originate from a SAFING VPN privacy network tunnel.

Hundreds of Systems Affected

Data recovered from the attacker’s Elastic environment indicated that the campaign affected at least 216 hosts across 34 Active Directory domains. The majority of compromised machines were servers, most commonly running Windows Server 2019 or 2022.

Victims appeared across numerous sectors, including:

  • Government organisations

  • Universities and educational institutions

  • Financial services companies

  • Manufacturing and automotive firms

  • IT service providers and retailers

Some hostnames suggested the attacker was also exploiting vulnerabilities in other enterprise platforms, including Microsoft SharePoint.

Researchers coordinated with Elastic and law enforcement to notify affected organizations and investigate the infrastructure. The cloud instance used in the campaign has since been taken offline.

“We have performed outreach and victim notification to organizations that we believe were indicated within the uncovered data, and we have coordinated with Elastic in a collaborative effort to further investigate and take down this threat actor infrastructure,” Huntress said in its blog. 



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticlePentagon Designates Anthropic Supply Chain Risk Over AI Military Dispute
Next Article Thousands of Public Google Cloud API Keys Exposed with Gemini Access After API Enablement
Team-CWD
  • Website

Related Posts

News

OpenAI’s Promptfoo Deal Plugs Agentic AI Testing Gap

March 10, 2026
News

How to Protect Your SaaS from Bot Attacks with SafeLine WAF

March 10, 2026
News

Russian Hackers Target WhatsApp and Signal Accounts

March 10, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views

Near-ultrasonic attacks on voice assistants

September 11, 20256 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views
Our Picks

2025’s most common passwords were as predictable as ever

January 21, 2026

Top IRS scams to look out for in 2026

February 10, 2026

How cybercriminals are targeting content creators

November 26, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.