NordVPN Confirms Hack After Data Centre Mistake
NordVPN has confirmed that it has been hacked, but it insisted that it was an “isolated case” and that no usernames or passwords were impacted.
The Panama-based VPN provider confirmed the hack in a blog post and said the breach was because of a mistake by a data centre provider based in Finland.
The unnamed Finnish data centre provider had apparently left an insecure remote management system installed on the server, that NordVPN was unaware of. The attacker was able to exploit this unsecured route.
“A few months ago, we became aware that, on March 2018, one of the data centres in Finland we had been renting our servers from was accessed with no authorisation,” explained the security firm in the blog post.
“The attacker gained access to the server by exploiting an insecure remote management system left by the data centre provider,” it added. “We were unaware that such a system existed. The server itself did not contain any user activity logs; none of our applications send user-created credentials for authentication, so usernames and passwords couldn’t have been intercepted either.”
NordVPN also said that the exact configuration file found on the internet by security researchers ceased to exist on March 5, 2018.
“This was an isolated case, and no other data centre providers we use have been affected,” insisted the firm.
It said that once it found out about the incident, it had immediately launched a thorough internal audit to check its entire infrastructure.
“We double-checked that no other server could possibly be exploited this way and started creating a process to move all of our servers to RAM, which is to be completed next year,” said NordVPN. “We have also raised the bar for all data centres we work with. Now, before signing up with them, we make sure that they meet even higher standards.”
NordVPN said that once it had learned about the vulnerability the data centre had, it immediately terminated the contract with the server provider and shredded all the servers it had been renting from them.
“We did not disclose the exploit immediately because we had to make sure that none of our infrastructure could be prone to similar issues,” said NordVPN. “This couldn’t be done quickly due to the huge number of servers and the complexity of our infrastructure.”
NordVPN insisted that no user credentials had been intercepted.
“Even though only 1 of more than 3000 servers we had at the time was affected, we are not trying to undermine the severity of the issue,” it said. “We failed by contracting an unreliable server provider and should have done better to ensure the security of our customers. We are taking all the necessary means to enhance our security.”
Security experts were quick to point out that the breach should not put people off from using a VPN product.
“No doubt privacy purists will jump on this and try to call Nord and other services out, but using a VPN is still hugely advised to protect online anonymity,” said Jake Moore, a cybersecurity specialist at ESET. “This is especially true in hostile states, where some apps or websites are banned.”
“VPNs are also extremely useful when using public Wi-Fi, and this news shouldn’t put you off,” said Moore. “It will still be more secure to use a VPN than not using one at all. Ideally, you should avoid using public Wi-Fi at all, where possible. However, this is not always feasible and as some places, “not spots”, do not have any data coverage. In these cases, a VPN provider of choice is necessary.”
“In recent years there have been similar stories of password managers being “breached” but similarly, using a password manager is still safer than using the same password everywhere online,” he concluded.
Earlier this month both the US National Security Agency (NSA) and the GQHC agency in the United Kingdom issued warnings about “multiple vulnerabilities in Virtual Private Network (VPN) applications.
The NSA and the UK’s National Cyber Security Centre (NCSC) warned that advanced persistent threat (APT) actors are actively exploiting “known vulnerabilities affecting Virtual Private Network (VPN) products from vendors Pulse Secure, Fortinet and Palo Alto.”
Industry: Cyber Security
- Critical Facilities M&E Shift Lead
Critical Facilities M&E Shift Lead A Critical Facilities Shift Lead is needed for a niche, ultramodern Data Centre business in Hertfordshire. The Critical Facilities Shift Lead will be responsible for leading a team of shift engineers and sub-contractors and providing high-level engineering support on M&E / Mechanical & Electrical Data Centre equipment Other responsibilities include but not limited to; Maintenance and Improving current facilities/equipment. Health & Safety Operational Activities Providing Critical engineering best practice processes and procedures Requirements include; Current and considerable experience in a management role within an M&E/Data Centre/Data Center business or in a critical environment Electrical Engineering Degree / HNC / HND UK Based commutable to Hertfordshire – Sponsorship cannot be supplied to Non-EU Candidates. Salary: Competitive Location: Hertfordshire Ref PG7678
- Data Centre Change Manager
Data Centre Change Manager A Data Centre Change Manager is needed for a niche, ultramodern Data Centre business in Hertfordshire. The Data Centre Change Manager will be responsible for supervising and implementing change & permit management with the UK to help decrease/nullify potential incidents. Other Responsibilities include but not limited to; Audit & Risk Assessment or current change and permit processes Accepting & Dismissing changes Escalation Support Internal training to increase change & permit awareness Requirements include; Current and considerable experience in a change management role with a Data Centre/Data Center business or in a critical environment. It would be extremely beneficial to hold an ITIL qualification. UK Based commutable to Hertfordshire – Sponsorship cannot be supplied to Non-EU Candidates. Salary: Competitive Location: Hertfordshire Ref PG7677
- Channel Account Director
- Up to £75,000 + Double OTE
One of the fastest-growing IT managed service providers in London are looking for a Channel Account Director. The Channel Account Director will be responsible for managing some of their largest UK based accounts. Requirements Working for an IT managed services business selling a combination of Connectivity, UC, Cloud or Security into channel customers Consistency of tenure in current and recent job roles Current experience solely managing a multimillion-pound account. Commutable to London In return, you will be working for a growing & highly successful SME organisation with excellent sales support from pre-sales, post-sales, project management, service management, bid management, pricing and customer service. Candidates must be UK Based. Sponsorship is not available for Non-Eu Candidates. Ref BD7675 Salary: Up to £75,000 + Double OTE (Telecommunications Jobs, Telecoms Jobs, Channel Sales Jobs, Cloud Jobs, Cloud Computing Jobs, Cloud Sales Jobs)
- Cyber Incident Response Consultant (DFIR)
- Up to £70,000 Base
Cyber Incident Response Consultant (DFIR) is needed to join a global consultancy to focus on leading the Incident response capability in the UK. The team are actively growing, are globally recognised and work on varied, high profile and interesting projects. Given the nature of the role, this individual must be available and happy to travel. The Cyber Incident Response Consultant (DFIR) will have a blend of technical hands-on and client-facing consultancy. Any mentorship experience is always desirable. In-depth technical experience is a must; specific experience working with clients in the ‘eye of the storm’ of an incident is essential. APT, active threat hunting, IR triage/planning experience is critical. Just as important is the ability to coordinate the response across multiple client stakeholders, team members and other team members; such as Legal, PR. It is essential that the Cyber Incident Response Consultant (DFIR) is able to identify, scope, manage, remediate/eradicate the threat for the clients. Any previous experience in identifying and generating revenue is obviously valued, but not essential. A broad forensic background would be highly desirable also. An ideal candidate will be CREST CCIR, CCIM certified, Key attributes should also include; stakeholder engagement, mentoring of team members, a collaborative working style. Technical experience must include; demonstrable experience within cyber incident response, Forensic, cyber etc. Additional certifications could / should include GIAC certified (Intrusion analyst, incident handler, forensic handler) Career development and the opportunity to influence, apply today for more information or call Chris Holt on 07884666351 email@example.com Ref CH7625 Candidates must be UK Based. Sponsorship is not available for Non-Eu Candidates.