Security Discovery, 3 Jun 2019: Elasticsearch misconfigurations and related data incidents have became top news recently, even after Elastic introduced free security packs for all their users. Nevertheless, we at SecurityDiscovery.com, are still registering 5-10 big cases every month and this number does not seem to be decreasing. On May 28th, I discovered an open and publicly available Elasticsearch instance with data that appeared to be part of The University of Chicago Medicine. This was a huge database with what appeared to be a collection of ‘leads’ and ‘perspective and existing givers’ for the organization. A 34GB-sized cluster named ‘data-ucmbsd2‘ was indexed by the Shodan search engine and could have been accessed by anybody who knew where to look. The database contained 1,679,993 records with a various information such as Full name, DOB and more. After further investigation I was able to discover the identification of the alleged owner and sent a notification to the University of Chicago Medicine. After my notification the database was secured within 48 hours. The organization provided me with the following statement: The danger of having an exposed (passwordless) Elasticsearch or similar NoSql databases is huge. I have previously reported that the lack of authentication allowed the installation of malware or ransomware on the ES servers. The public configuration allows the possibility of cybercriminals to manage the whole system with full administrative privileges. Once the malware is in place criminals could remotely access the server resources and even launch a code execution to steal or completely destroy any saved data the server contains.