NordVPN Confirms Hack After Data Centre Mistake
NordVPN has confirmed that it has been hacked, but it insisted that it was an “isolated case” and that no usernames or passwords were impacted.
The Panama-based VPN provider confirmed the hack in a blog post and said the breach was because of a mistake by a data centre provider based in Finland.
The unnamed Finnish data centre provider had apparently left an insecure remote management system installed on the server, that NordVPN was unaware of. The attacker was able to exploit this unsecured route.
“A few months ago, we became aware that, on March 2018, one of the data centres in Finland we had been renting our servers from was accessed with no authorisation,” explained the security firm in the blog post.
“The attacker gained access to the server by exploiting an insecure remote management system left by the data centre provider,” it added. “We were unaware that such a system existed. The server itself did not contain any user activity logs; none of our applications send user-created credentials for authentication, so usernames and passwords couldn’t have been intercepted either.”
NordVPN also said that the exact configuration file found on the internet by security researchers ceased to exist on March 5, 2018.
“This was an isolated case, and no other data centre providers we use have been affected,” insisted the firm.
It said that once it found out about the incident, it had immediately launched a thorough internal audit to check its entire infrastructure.
“We double-checked that no other server could possibly be exploited this way and started creating a process to move all of our servers to RAM, which is to be completed next year,” said NordVPN. “We have also raised the bar for all data centres we work with. Now, before signing up with them, we make sure that they meet even higher standards.”
NordVPN said that once it had learned about the vulnerability the data centre had, it immediately terminated the contract with the server provider and shredded all the servers it had been renting from them.
“We did not disclose the exploit immediately because we had to make sure that none of our infrastructure could be prone to similar issues,” said NordVPN. “This couldn’t be done quickly due to the huge number of servers and the complexity of our infrastructure.”
NordVPN insisted that no user credentials had been intercepted.
“Even though only 1 of more than 3000 servers we had at the time was affected, we are not trying to undermine the severity of the issue,” it said. “We failed by contracting an unreliable server provider and should have done better to ensure the security of our customers. We are taking all the necessary means to enhance our security.”
Security experts were quick to point out that the breach should not put people off from using a VPN product.
“No doubt privacy purists will jump on this and try to call Nord and other services out, but using a VPN is still hugely advised to protect online anonymity,” said Jake Moore, a cybersecurity specialist at ESET. “This is especially true in hostile states, where some apps or websites are banned.”
“VPNs are also extremely useful when using public Wi-Fi, and this news shouldn’t put you off,” said Moore. “It will still be more secure to use a VPN than not using one at all. Ideally, you should avoid using public Wi-Fi at all, where possible. However, this is not always feasible and as some places, “not spots”, do not have any data coverage. In these cases, a VPN provider of choice is necessary.”
“In recent years there have been similar stories of password managers being “breached” but similarly, using a password manager is still safer than using the same password everywhere online,” he concluded.
Earlier this month both the US National Security Agency (NSA) and the GQHC agency in the United Kingdom issued warnings about “multiple vulnerabilities in Virtual Private Network (VPN) applications.
The NSA and the UK’s National Cyber Security Centre (NCSC) warned that advanced persistent threat (APT) actors are actively exploiting “known vulnerabilities affecting Virtual Private Network (VPN) products from vendors Pulse Secure, Fortinet and Palo Alto.”
Industry: Cyber Security
- IAM Consultant- One Identity Manager- UK Wide
- Upto £75,000 plus excellent benefits
One Identity IAM consultant is needed for this expanding UK based business, you will be responsible for: Developing and Supporting the Identity and Access management system based-on One Identity products Active Roles Server and Identity Manager. Further develop One Identity Manager’s integration with Service Now to provide automated JML processes and application access requests and fulfilment. Work across the business ensuring that the IAM solutions integrates into both the technology and business systems and processes, ideally automating as mush as possible. Work with the Governance Risk & Compliance (GRC) team to provide application access attestations and toxic combination alerting and reporting. Work on a mixture of IAM related projects to help to integrate new ideas and technology into the business to ensure the business stays fully compliant Assist in ensuring that all IAM capabilities are mapped to internal processes, policies, and standards. Develop metrics to measure and improve and also compile reports around the solution If you are interested in this opportunity we are looking for someone who is skilled within Identity Acess management, you will need to have worked with the One Identity product, ideally both Active Roles Server and Identity Manager Experience in managing and integrating with Microsoft systems (on-premise and cloud), such as Active Directory, Exchange, Office, SharePoint, etc.
- SailPoint Integration Consultant
- Upto £75000 plus benefits
SailPoint Integration Consultant. SailPoint Integration Consultant is needed for this expanding service business to help them with complex deployment with their FTSE focused customer base. They are looking for experienced SailPoint Integration Consultants who have: • Strong solution designing experience with in depth understanding of IAM concepts and thorough understanding of Sailpoint domain. • Thorough understanding of Identity and Access Governance concepts • Leading and creating Identity & Access Management (IAM) technical architecture • Secure by Design principles in Identify Access management, Privilege Access management • Familiar with cloud architectures, data management and source control from a security perspective. This is a great opportunity to join a business that is growing and looking for individuals who want to grow and develop and work on some of the most complex Sailpoint deployments.
- CyberArk Integration Consultant
- Greater London
- upto 75,000 plus benefits
CyberArk Integration Consultant. CyberArk Integration Consultant is needed for this expanding service business to help them with complex deployment with their FTSE focused customer base. They are looking for experienced CyberArk Integration Consultants who have: • Strong solution designing experience with in depth understanding of IAM concepts and thorough understanding of CyberArk domain. • Thorough understanding of Identity and Access Governance concepts • Leading and creating Identity & Access Management (IAM) technical architecture • Secure by Design principles in Identify Access management, Privilege Access management • Familiar with cloud architectures, data management and source control from a security perspective. This is a great opportunity to join a business that is growing and looking for individuals who want to grow and develop and work on some of the most complex CyberArk deployments.
- Penetration Tester, UK based. Ability to achieve SC clearance
- United Kingdom
Experienced Penetration tester- UK based with the ability to achieve SC clearance. On-going training and development and paid certifications / renewals. Interested to hear from all areas of penetration testing, web app, infrastructure, mobile, etc. MUST have current hands on experience delivering penetration testing. Ideally from a consultancy background with experience working with multiple clients. OSCP / CREST / CHECK / Tigerscheme penetration testing experience / certifications desirable. Apply today for more details. All information kept in the strictest of confidence.