Don’t let overlooked obligations become incidents. Learn how.
Utility navigation bar redirect icon
Portal LoginSupportContact
Search
Close search
Huntress Logo in Teal
  • Platform Overview
    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed ITDR

    Protect your Microsoft 365 identities and email environments.

    Managed ITDR

    Protect your Microsoft 365 identities and email environments.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Integrations
    Integrations
    Support Documentation
    Support Documentation
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
  • Threats We Stop
    Phishing
    Phishing
    Business Email Compromise
    Business Email Compromise
    Ransomware
    Ransomware
    Infostealers
    Infostealers
    View Allright arrowView Allright arrow
    Industries We Serve
    Education
    Education
    Financial Services
    Financial Services
    State and Local Government
    State and Local Government
    Healthcare
    Healthcare
    Law Firms
    Law Firms
    Manufacturing
    Manufacturing
    Utilities
    Utilities
    View Allright arrowView Allright arrow
    Tailored Solutions
    MSPs
    MSPs
    Resellers
    Resellers
    SMBs
    SMBs
    Compliance
    Compliance
    What Gets Overlooked Gets Exploited

    Most days, nothing happens. But one day, something will.

    Huntress Cybersecurity
    Cybercriminals Have Evolved

    Get the intel on today’s cybercriminal groups and learn how to protect yourself.

    Huntress Cybersecurity
  • Pricing
  • Community Series
    The Product Lab

    Shape the next big thing in cybersecurity together.

    The Product Lab

    Shape the next big thing in cybersecurity together.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    Resources
    Upcoming Events
    Upcoming Events
    Ebooks
    Ebooks
    On-Demand Webinars
    On-Demand Webinars
    Videos
    Videos
    Whitepapers
    Whitepapers
    Datasheets
    Datasheets
    Cybersecurity Education
    Cybersecurity 101
    Cybersecurity 101
    Cybersecurity Guides
    Cybersecurity Guides
    Threat Library
    Threat Library
    Real Tradecraft, Real Results
    Real Tradecraft, Real Results
    2026 Cyber Threat Report
    2026 Cyber Threat Report
    The Huntress Blog
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
  • Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    The Huntress SOC

    24/7 Security Operations Center

    The Huntress SOC

    24/7 Security Operations Center

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Community

    Get in touch with the Huntress Community team

    Community

    Get in touch with the Huntress Community team

    Compare Huntress
    Bitdefender
    Bitdefender
    Blackpoint
    Blackpoint
    Breach Secure Now!
    Breach Secure Now!
    Crowdstrike
    Crowdstrike
    Datto
    Datto
    SentinelOne
    SentinelOne
    Sophos
    Sophos
    Compare Allright arrowCompare Allright arrow
  • HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    Partners
    MSPs

    Join our partner community to deliver expert-led managed security.

    MSPs

    Join our partner community to deliver expert-led managed security.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Tech Alliances

    Driving innovation through global technology Partnerships

    Tech Alliances

    Driving innovation through global technology Partnerships

    Microsoft Partnership

    A Level-Up for Your Business Security

    Microsoft Partnership

    A Level-Up for Your Business Security

  • Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Awards
    Awards
    Contact Us
    Contact Us
  • Portal Login
  • Support
  • Contact
  • Search
  • Get a Demo
  • Start for Free
Portal LoginSupportContact
Search
Close search
Get a Demo
Start for Free
HomeBlog
Someone Else’s SIEM: A Threat Actor Abuses Another Free Trial
Published:
March 6, 2026

Someone Else’s SIEM: A Threat Actor Abuses Another Free Trial

By:
John Hammond
Anna Pham
Jamie Levy
Share icon
Glitch effectGlitch effectGlitch effect


TL; DR Huntress discovered a threat actor was exploiting vulnerabilities (like SolarWinds Web Help Desk) and exfiltrating victim data to a free trial instance of Elastic Cloud SIEM. The actor used the SIEM for victim triage, and the infrastructure revealed details about their campaign, including disposable email services (quieresmail.com), connections to a Russian-registered temporary email network (firstmail.ltd), use of a SAFING_VPN tunnel, and a possible connection to other opportunistic attacks against Microsoft SharePoint and other software. The instance has since been taken down.


Background

In a previous blog post, Huntress observed an adversary exploiting SolarWinds Web Help Desk and exfiltrating compromised victim data to an exposed Elastic Cloud instance. Immediately, we wanted to share threat intelligence on the intrusions, but amongst that investigation, we uncovered a new rabbit hole—live threat actor infrastructure they used for their campaigns. 

We’re no strangers to adversaries abusing free trials of security software, and this time we informed Elastic and the relevant parties so the activity could be investigated and the attacker’s activities addressed

To give further time for victim outreach and notification, as well as our multi-prong coordination with law enforcement and notification to Elastic, we opted to separate the findings of SolarWinds investigation into two parts: this write-up is the teased “Part 2” of our previous blog post.

We will continue onwards from this starting point: a threat actor ran an encoded PowerShell command with a hardcoded API key and credentials to exfiltrate data into a free instance of Elastic Cloud SIEM. 


Exfil to Elastic

To set context, you may remember there was an encoded PowerShell command executed by the threat actor on the victim’s computer. This ran the Get-ComputerInfo cmdlet to uncover detailed system information and then pushes that to an attacker-controlled ElasticSearch index with a hardcoded API key.


Loading Gist...

This process exfiltrated the operating system version, hardware details, Active Directory domain info, installed patches, and the overall general metadata about this host to an Elastic instance named systeminfo. 

While we have previously seen threat actors leveraging Velociraptor and other DFIR-focused tools for command and control, this was the first time we observed an adversary use Elastic Cloud for exfiltration. The attacker prepared their own Elastic Cloud free trial, using legitimate Elastic infrastructure, using it as a repository for stolen data across intrusions. They could then triage their victims and compromised endpoints, literally using SIEM technology. 

We notified Elastic of this abuse of their trial, and we collaborated to uncover more noteworthy insights about this adversary. As it turns out, the systeminfo index within the threat actor’s Elastic Cloud instance exposed details of not just a single victim, but multiple compromises across an entire campaign.


The deployment

The Elastic Cloud deployment was created on January 28, 2026 at 01:45 UTC under cloud account u_706752903_cloud, with deployment ID 7c00a38569a8471083b6b34e1511b9de. The instance was running Elasticsearch version 9.2.4 on GCP's us-central1 region. The deployment used default naming (“My deployment”). The Fleet agent remained online and healthy through February 7, indicating the infrastructure was actively maintained throughout the campaign.

Elastic confirmed the adversary registered their free trial account with an email address that had a unique format: what looked like eight random lowercase letters, and the  quieresmail[.]com domain.

This naming convention and domain indicate a disposable and temporary mail service. We have seen other email addresses with this quieresmail[.]com domain formatted with either a fake first name, last name, followed by four digits to represent a year, or an eight-character random string of letters like this one. We believe this is one of the disposable mail domains operated by the firstmail.ltd network, a Russian-registered temporary email service running hundreds of throwaway domains from the same infrastructure.


Figure 1: Screenshot of Firstmail website

Noting this, Elastic then shared with us that there were multiple other free trials that have been created with different disposable email addresses, but all following the same random string formatting. They indicated a few of the email addresses, and curiously, more than one of the very same random email prefixes matched the exact same subdomain that we observed used for the Cloudflare Worker pages: like one qgtxtebl.workers[.]dev as an example.

Figure 2: Screenshot of Cloudflare Workers page

While these FirstMail.ltd email addresses are randomly generated, the Cloudflare Worker Pages subdomains are configurable…but multiple instances of these matched and line up.

We believed this was very peculiar: it seemed the adversary treated the randomly generated email prefix as a key or identifier for parts of their infrastructure and campaigns. This random string was used for both their Elastic Cloud trial registration email as well as their Cloudflare Worker tooling to host their Velociraptor callbacks.


The activity

Kibana usage telemetry revealed the operator spent significant time triaging victim data through the Discover interface across seven days. 

On January 28 alone, the day the deployment was stood up, the operator logged 164 interactions over nearly 150 minutes of active use. Activity continued in the following days: 46 interactions on January 29, 105 on January 30, then a gap before returning on February 2 as the first wave of victim data arrived. February 4 marked the most targeted activity, with 106 field lookups, 23 filters applied, and 15 search queries submitted in just under 13 minutes, which is consistent with systematic triage of high-value targets such as domain controllers and domain-joined hosts. 

Across the full campaign, there were approximately 249 minutes of active Discover usage, 449 total interactions, and evidence that at least one index was deleted on February 2, possibly an earlier collection that was purged before the current dataset was populated.

Administrative login sessions to the Elastic Cloud instance were from these IP addresses:

  1. 154.26.156[.]181

  2. 51.161.152[.]26

In discussions with numerous other security teams and multiple law enforcement agencies, there is a consensus that these IP addresses stemmed from a SAFING_VPN tunnel. This looks to be Safing “SPN” or “SVPN”, an option for a specialized privacy network alternative to traditional VPNs and Tor.

Notably, the 51.161.152[.]26 was also observed by Unit 42 in a ToolShell exploitation case against Microsoft SharePoint—another opportunistic attack leveraging recent zero-day or n-day vulnerabilities that readily offer code execution to the adversary.

Other telemetry from the Elastic Cloud Kibana sessions also provided a fingerprint of the operator's web browser and suspected workstation:


Attribute

Value

User-Agent

Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/144.0.0.0 Safari/537.36

Operating System

Windows 10 x64

First Kibana login

January 28, 2026 03:05 UTC


The systeminfo index contained approximately 216 unique victim hosts at the time of analysis.

The victim data skewed overwhelmingly toward servers (91%), with the majority running Windows Server 2019 or 2022. Among the 47 domain-joined machines, we identified 34 unique Active Directory domains representing distinct organizations. The affected sectors included government agencies, higher education institutions, financial services, religious and nonprofit organizations, global manufacturing and automotive companies, IT service providers, retail, and construction. Victims span 37 different time zones across multiple continents.

Numerous hostnames within the victim dataset pointed to continued exploitation of other high-severity vulnerabilities of late, suggesting the actor continued to perform opportunistic attacks against whatever software had a critical weakness that led to immediate compromise. Namely, there were multiple instances of suggested Gladinet CentreStack, SmarterMail or SmarterTools, Solarwinds Web Help Desk, and ToolShell intrusions against Microsoft SharePoint. This evidence continued to be corroborated by the insights shared by Black Lotus Labs, with whom we also collaborated and spoke following our initial blog post. We were pleased to connect both them and Elastic for even more joined intelligence sharing.

Among the 216 records, a cluster of four hosts stood out as potentially the operator's own test VMs. The hosts Hajbepfy, Bekpaseb, Hhbhymne, and Vdfyivhy (randomized 8-character hostnames) shared an identical fingerprint: a custom SMBIOS build string (rel-1.16.3-0-ga6ed6b70-prebuilt.dady.org), a fabricated BIOS serial of DELL 1 serial, and identical QEMU hardware profiles (Broadwell CPU, ProcessorID 078BFBFF000306D2, 4GB RAM, Realtek RTL8139C+ NIC). 

Two of the four, Hajbepfy and Bekpaseb, also had the system manufacturer set to DADY with model Dady super powerfulPC, while the other two retained default QEMU identifiers.

One noteworthy finding within the attacker-controlled Elastic instance was a saved Kibana search query, named “oooo”. The threat actor created and saved this search on February 4th, and specifically selected the columns for the victim domain, caption, timezone, and IP addresses. They filtered out standalone workstations, and specifically focused on one victim domain. Their target of interest had 6 servers already compromised with their data present in the Elastic systeminfo index, with one hostname suggesting it was a domain controller. Our investigation leads us to believe this victim organization presents itself as an “AI-powered SaaS platform.”

We have performed outreach and victim notification to organizations that we believe were indicated within the uncovered data, and we have coordinated with Elastic in a collaborative effort to further investigate and take down this threat actor infrastructure. Elastic has confirmed to us that this instance has been taken down.




Categories
Response to Incidents
Summarize this postClose Speech Bubble
ChatGPTClaudePerplexityGoogle AI

Step inside the dark world of cybercrime

Join us on March 18 (12pm EST) for _declassified, a raw intel drop where John Hammond and Jim Browning break down how modern cybercrime runs like a real business.
Register now
Share
Facebook iconTwitter X iconLinkedin iconDownload icon
Glitch effect

You Might Also Like

  • Active Exploitation of SolarWinds Web Help Desk

    Huntress has observed active exploitation of a deserialization and remote code execution against the SolarWinds Web Help Desk software (CVE-2025-26399).
  • RMMs: A Gateway for Bulk Attacks on MSP Customers, Pt. II

    When a threat actor exploited an MSP's RMM tool to target businesses, Huntress investigated and uncovered another eerily similar incident with key differences that reveal evolving tactics
  • Velociraptor Misuse, Pt. II: The Eye of the Storm

    Huntress reports an uptick in threat actors abusing the Velociraptor open-source DFIR tool, linked to incidents involving WSUS exploitation, VS Code tunnels, and more.
  • Data Exfiltration and Threat Actor Infrastructure Exposed

    Threat actors are people, too, and like everyone else, make mistakes. These mistakes can reveal insights into the threat actor, or even expose access to their infrastructure.
  • Bitter Pill: Third-Party Pharmaceutical Vendor Linked to Pharmacy and Health Clinic Cyberattack

    Huntress has uncovered a series of unauthorized access, revealing a threat actor using ScreenConnect to infiltrate multiple healthcare organizations.
  • Supply Chain Exploitation of SolarWinds Orion Software

    Huntress covers the breaking news about Solarwinds’ Orion platform being exploited as part of a coordinated attack to distribute malware.
  • Managed SIEM and the Art of Perfecting Cyber Defense

    How Huntress Managed SIEM turns signal recognition into defensive mastery.
  • Using Shodan Images to Hunt Down Ransomware Groups

    In this blog, we’re going to focus on how Shodan helps us unveil some of the infrastructure that supports ransomware actors.

Sign Up for Huntress Updates

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.
Privacy • Terms
By submitting this form, you accept our Terms of Service & Privacy Policy
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Huntress Managed Security PlatformManaged EDRManaged EDR for macOSManaged EDR for LinuxManaged ITDRManaged SIEMManaged Security Awareness TrainingManaged ISPMManaged ESPMBook a Demo
PhishingComplianceBusiness Email CompromiseEducationFinanceHealthcareManufacturingState & Local Government
Managed Service ProvidersResellersIT & Security Teams24/7 SOCCase Studies
BlogResource CenterCybersecurity 101Upcoming EventsSupport Documentation
Our CompanyLeadershipNews & PressCareersContact Us
Huntress white logo

Protecting 215k+ customers like you with enterprise-grade protection.

Privacy PolicyCookie PolicyTerms of UseCookie Consent
Linkedin iconTwitter X iconYouTube iconInstagram icon
© 2025 Huntress All Rights Reserved.

Join the Hunt

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.

By submitting this form, you accept our Terms of Service & Privacy Policy