<p>By <a rel="nofollow" href="https://www.hackread.com/author/hackread/">Waqas</a></p>
<p>Kromtech’s security researchers have identified two point-of-sale (POS) malware strains</p>
<p>This is a post from HackRead.com Read the original post: <a rel="nofollow" href="https://www.hackread.com/4000-elasticsearch-servers-caught-hosting-pos-malware/">4,000 ElasticSearch servers found hosting PoS malware</a></p>
{"cvss": {"score": 0.0, "vector": "NONE"}, "href": "https://www.hackread.com/4000-elasticsearch-servers-caught-hosting-pos-malware/", "references": [], "enchantments_done": [], "id": "HACKREAD:C36AD4DBFA2B305D26D12E7C4B6C667B", "modified": "2017-09-14T16:53:42", "lastseen": "2017-09-14T17:30:54", "published": "2017-09-14T16:53:42", "description": "<p>By <a rel=\"nofollow\" href=\"https://www.hackread.com/author/hackread/\">Waqas</a></p>\n<p>Kromtech\u2019s security researchers have identified two point-of-sale (POS) malware strains</p>\n<p>This is a post from HackRead.com Read the original post: <a rel=\"nofollow\" href=\"https://www.hackread.com/4000-elasticsearch-servers-caught-hosting-pos-malware/\">4,000 ElasticSearch servers found hosting PoS malware</a></p>", "title": "4,000 ElasticSearch servers found hosting PoS malware", "cvelist": [], "viewCount": 23, "enchantments": {"score": {"value": 1.9, "vector": "NONE"}, "dependencies": {}, "backreferences": {}, "exploitation": null, "vulnersScore": 1.9}, "reporter": "Waqas", "bulletinFamily": "blog", "type": "hackread", "immutableFields": [], "cvss2": {}, "cvss3": {}, "_state": {"dependencies": 1647554957, "score": 1659775931, "epss": 1678838010}}