NordVPN Confirms Hack After Data Centre Mistake
NordVPN has confirmed that it has been hacked, but it insisted that it was an “isolated case” and that no usernames or passwords were impacted.
The Panama-based VPN provider confirmed the hack in a blog post and said the breach was because of a mistake by a data centre provider based in Finland.
The unnamed Finnish data centre provider had apparently left an insecure remote management system installed on the server, that NordVPN was unaware of. The attacker was able to exploit this unsecured route.
“A few months ago, we became aware that, on March 2018, one of the data centres in Finland we had been renting our servers from was accessed with no authorisation,” explained the security firm in the blog post.
“The attacker gained access to the server by exploiting an insecure remote management system left by the data centre provider,” it added. “We were unaware that such a system existed. The server itself did not contain any user activity logs; none of our applications send user-created credentials for authentication, so usernames and passwords couldn’t have been intercepted either.”
NordVPN also said that the exact configuration file found on the internet by security researchers ceased to exist on March 5, 2018.
“This was an isolated case, and no other data centre providers we use have been affected,” insisted the firm.
It said that once it found out about the incident, it had immediately launched a thorough internal audit to check its entire infrastructure.
“We double-checked that no other server could possibly be exploited this way and started creating a process to move all of our servers to RAM, which is to be completed next year,” said NordVPN. “We have also raised the bar for all data centres we work with. Now, before signing up with them, we make sure that they meet even higher standards.”
NordVPN said that once it had learned about the vulnerability the data centre had, it immediately terminated the contract with the server provider and shredded all the servers it had been renting from them.
“We did not disclose the exploit immediately because we had to make sure that none of our infrastructure could be prone to similar issues,” said NordVPN. “This couldn’t be done quickly due to the huge number of servers and the complexity of our infrastructure.”
NordVPN insisted that no user credentials had been intercepted.
“Even though only 1 of more than 3000 servers we had at the time was affected, we are not trying to undermine the severity of the issue,” it said. “We failed by contracting an unreliable server provider and should have done better to ensure the security of our customers. We are taking all the necessary means to enhance our security.”
Security experts were quick to point out that the breach should not put people off from using a VPN product.
“No doubt privacy purists will jump on this and try to call Nord and other services out, but using a VPN is still hugely advised to protect online anonymity,” said Jake Moore, a cybersecurity specialist at ESET. “This is especially true in hostile states, where some apps or websites are banned.”
“VPNs are also extremely useful when using public Wi-Fi, and this news shouldn’t put you off,” said Moore. “It will still be more secure to use a VPN than not using one at all. Ideally, you should avoid using public Wi-Fi at all, where possible. However, this is not always feasible and as some places, “not spots”, do not have any data coverage. In these cases, a VPN provider of choice is necessary.”
“In recent years there have been similar stories of password managers being “breached” but similarly, using a password manager is still safer than using the same password everywhere online,” he concluded.
Earlier this month both the US National Security Agency (NSA) and the GQHC agency in the United Kingdom issued warnings about “multiple vulnerabilities in Virtual Private Network (VPN) applications.
The NSA and the UK’s National Cyber Security Centre (NCSC) warned that advanced persistent threat (APT) actors are actively exploiting “known vulnerabilities affecting Virtual Private Network (VPN) products from vendors Pulse Secure, Fortinet and Palo Alto.”
Industry: Cyber Security
- IAM Consultant- OKTA
- upto €90,000 plus benefits
I am looking for an experienced IAM process Manager to help drive forward a series of IAM implementation for a global Manufacturing business, Ideally you will be skilled with Okta and have knowledge of PAM Solutions, You will be responsible for: Driving the design and continuous improvement of complex IAM solutions in close collaboration with business partners Consult on the optimisation of IAM processes and design proper IT-based solutions to meet availability and quality targets Define technical specifications for SW-development (standards, design patterns, test cases, scenarios) and manage the life cycle of designed solutions Actively scan for relevant innovations and new technologies to identify further potential for improving IAM solutions and processes using OKTA Analyse new features of the regular Okta releases We are looking for someone with strong IAM experience as an Architect, Analyst, Technical Engineer, or similar role in the Identity and Security domain Experience with relevant certifications in development/administration, design and configuration of the Okta IAM platforms Familiar with LCM - joiners, movers, leavers, application federation - SAML, OIDC, SCIM and many other IAM terms Good mix of competences in IAM business process and project management concepts and tools e.g., ServiceNow, Jira, PRINCE2, SCRUM (agile)
- SAP Security Consultant
- upto €70,000 plus benefits
I am looking for an experienced SAP Security Consultant. The ideal candidate will have a strong understanding of SAP security concepts and be able to apply them to real-world scenarios. ideally you will also have experience with Securitybridge or Onapsis, or a similar SAP security tool. Your responsibilities will include: Reviewing and auditing SAP security settings and controls Identifying and remediating security vulnerabilities Implementing security best practices Educating users on SAP security Experience experience in SAP security Experience with Securitybridge or Onapsis, or a similar SAP security tool would be very advantageous Strong understanding of SAP security concepts Excellent problem-solving and analytical skills Excellent communication and presentation skills Fluent in French & English
- Post Grad MSc Cyber security - Junior Cyber Risk Analyst wanted. UK
- United Kingdom
- Entry role
The perfect start to your new Cyber Security Career. Post Graduate Cyber Risk Analyst Wanted. Are you are fresh from earning your Cyber Security MSc and eager to start your career in Cyber Security? We are looking for a recent post graduate to join a forward thinking Cyber Security Consultancy for the ideal entry role into Cyber Security. Whilst employed industry experience is not expected, as full training and support will be provided, a history of recent education in Cyber Security / Cyber Risk is essential. We are looking for someone with an inquisitive mind, who is confident to ask the right questions and who isn't afraid to challenge the status quo. Superb communication skills are a must (in person, written and verbal) This is a UK based role that is remote first with monthly travel (1-2 a month) to meet with the team and in time to meet clients. If you aren’t available to travel this isn’t the opportunity. We are unable to provide VISA sponsorship as there will be a requirement to achieve Security clearance If you're adaptable, open to fresh perspectives, and excited to be part of a forward-thinking team and looking for an opportunity to help make a difference in a Cyber consulting role, this opportunity is for you. For more information apply here……
- Microsoft Exchange Contractor | London | OUTSIDE IR35 | SC Cleared
- OUTSIDE IR35
Microsoft Exchange Contractor | London | OUTSIDE IR35 | SC Cleared • We require someone that has experience of migration exchange from windows server 2012 to 2019. • In depth understand of On-Prem exchange server management and deployment. • Experience migrating On-Prem exchange servers from 2012 upwards. • Secure Email Gateway experience essential Due to the nature of the requirement the individual must be commutable to London 2-3 days a week.