CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

Threat Actor Uses Elastic Cloud SIEM to Manage Stolen Data from Multiple Organizations

First reported
Last updated
1 unique sources, 1 articles

Summary

Hide ▲

A threat actor exploited multiple software vulnerabilities to steal data from at least 216 systems across 34 Active Directory domains. The attacker used a free-trial instance of Elastic Cloud's SIEM platform to collect, store, and analyze stolen data, turning a legitimate security tool into a repository for exfiltrated information. The campaign affected organizations across various sectors, including government, education, finance, and manufacturing. The infrastructure was taken down after discovery.

Timeline

  1. 09.03.2026 17:45 1 articles · 3h ago

    Threat Actor Exploits Software Flaws and Uses Elastic Cloud SIEM to Manage Stolen Data

    A threat actor exploited multiple software vulnerabilities to steal data from at least 216 systems across 34 Active Directory domains. The attacker used a free-trial instance of Elastic Cloud's SIEM platform to collect, store, and analyze stolen data. The campaign affected organizations across various sectors, including government, education, finance, and manufacturing. The infrastructure was taken down after discovery.

    Show sources

Information Snippets