• Categories
    Category
    {{ postCtrl.tags }}
    • {{ category.tag_type }}

      • {{tag.tag_name}}
      • View more
  • Categories
    Category
    {{ postCtrl.tags }}
    • {{ category.tag_type }}

      • {{tag.tag_name}}
      • View more
  • News
  • Tutorials
  • Forums
  • Tags
  • Users
Tutorial News Comments FAQ Related Articles

The University of Chicago Medicine Exposed ‘Perspective Givers’ Database With More Than A Million of Records

{{postValue.id}}

One of the top news of recent time is about Elasticsearch which is a multitenant-capable, distributed, full-text search engine based on Lucene library. It is noticed to suffer misconfigurations and related data incidents, even after the company introduced free security packs for all its users. This is a search engine that be capable of searching all kinds of documents. And SecurityDiscovery.com has reported to register at least 5-10 big cases every month and also that this number did not seem to go down.

On May 28th they have discovered an public and openly available Elasticserach instant where, data that appeared was a part of The University of Chicago Medicine. This was reported to be a huge database that has appeared with data about 'leads' and 'perspective and existing givers' of the organization. They also reported that a 34GB-sized cluster named as 'data-ucmbsd2' appeared to indexed by Shodan and was available to anyone who knew where to look for. This database was reported to contain 1,679,993 records of Personal Identity related data, including that of the alleged owner - which they used to notify the university. After the notification, the database was secured within 48 hours.

This proves how dangerous it is to have an exposed (passwordless) Elasticsearch or any other NoSql database is. Bob Diachenko, Securitydiscovery.com, added that he had already conveyed how the lack of authentication allowed installation of ransomware or malware into ES servers. And that the public configuration would allow or increase the possibility of hackers to manage the whole system with full root user privileges. Once if any malware get its place, the hackers can remotely access the server and its resources or can even launch a RCE - Remote Code Execution attack to steal or to entirely destroy any data the server hosts.

He added that, noticing this never-ending loop of such incidents, they at SecurityDiscovery.com have determined to host a live educational session for raising awareness on cyber security within any organization, to prevent such potential issues from happening. He said that, it can be an online webinar for about an hour long with Q&A session or as an offline meet at your premises. And that any clarifications can be made at alert(at)securitydiscovery.com or bob(at)securitydiscovery.com

Tags:
wilson
Author: 

Comments ( 0 )

No comments available

Add a comment
{{postCtrl.cmtErrMsg}}

Frequently asked questions ( 0 )

No questions available

Back To Top!
Rank
User
Points

Top Contributers

userNamenaveelansari
135850

Top Contributers

userNameayanbhatti
92510

Top Contributers

userNamehamzaahmed
32150

Top Contributers

1
userNamelinuxhelp
31040

Top Contributers

userNamemuhammadali
24500
Can you help Luk Van De Looverbosch ?
How to create a root ?

Hello,
How to create root@linuxhelp in Linux Mint 20.1 64-bit ?
Thanks in advance for your reply.
Best regards.

Networking
  • Routing
  • trunk
  • Netmask
  • Packet Capture
  • domain
  • HTTP Proxy
Server Setup
  • NFS
  • KVM
  • Memory
  • Sendmail
  • WebDAV
  • LXC
Shell Commands
  • Cloud commander
  • Command line archive tools
  • last command
  • Shell
  • terminal
  • Throttle
Desktop Application
  • Linux app
  • Pithos
  • Retrospect
  • Scribe
  • TortoiseHg
  • 4Images
Monitoring Tool
  • Monit
  • Apache Server Monitoring
  • EtherApe 
  • Arpwatch Tool
  • Auditd
  • Barman
Web Application
  • Nutch
  • Amazon VPC
  • FarmWarDeployer
  • Rukovoditel
  • Mirror site
  • Chef
Contact Us | Terms of Use| Privacy Policy| Disclaimer
© 2025 LinuxHelp.com All rights reserved. Linux™ is the registered trademark of Linus Torvalds. This site is not affiliated with linus torvalds in any way.