Both CloudNordic and Azero said that they were working to rebuild customers’ web and email systems from scratch, albeit without their data.
Yea… Don’t bother. But, do expect to hear from my lawyers…
CloudNordic said that it “had no knowledge that there was an infection.” CloudNordic and Azero are owned by Denmark-registered Certiqa Holding, which also owns Netquest, a provider of threat intelligence for telcos and governments.
Edit-
deleted by creator
yea, that was my thoughts as well… Lol, I wouldn’t touch them with a 10 foot pole.
Crazy that an admin had full access to all files on all drives including backups without requiring any kind of elevation, where a ransomware could encrypt it all.
At this point 8 don’t even know if paying would be the way to go to at lease rexover the files and rethink their security from the ground-up.
rethink their security from the ground-up.
After reading the post, I don’t think they did any thinking at all for their security… or redundancies, access controls… etc…
Danish cloud host says customers ‘lost all data’ after ransomware attack
I’d hazard that that Danish cloud host probably lost all customers after that happened too
If, I were a customer- I would be leaving for sure.
When- you pay a cloud vendor, you are generally paying to ensure a few things…
- That this stuff doesn’t happen.
- That when this type of stuff does happen, they have a recovery plan / working backups.
And, when this hit the news, and I discovered they are owned by a company with a stake in cyber-security, I’d be jumping to a replacement pretty quickly… and staying far away from this company.
How do you fuck up this badly in 2023? I can see this happening in 1999.
Ransomware attacks aren’t new. Although, I find it weird that a cloud host doesn’t have backups.
CloudNordic said: “The attackers succeeded in encrypting all servers’ disks, as well as on the primary and secondary backup system, whereby all machines crashed and we lost access to all data
They did. They were affected too, if you read the article.
If your backups are online and not in a warehouse, you are doing it wrong. Even my own personal backups are on disconnected disks. What a bunch of amateurs.
If you don’t know you are infected and you’ve been infected for a couple months, your backups are worthless.
That’s why you do regular restore tests on separate systems. That should be standard procedure for any company. A fully encrypted disk should be noticable immediately.
They should have stored a backup in the cloud, I hear it’s very safe there.
Hm, so I can’t rely on the Hetzner backup and should backup manually to a hard drive at home at least every now and then.
The fire ovh had created this problem for many. Some people’s backups were in that data centre and they lost everything.
Yes, home backup and or cloud backup with a separate provider.
3 2 1 for a reason…
So what is the safest encrypted cloud service these days?
safest encrypted cloud service these days
None. Use your own encryption keys, and pre-encrypt your data.
If the cloud provider I use for storing my backups got pwned, the attacker would gain access to… well, nothing, without my private keys. And- if you follow the 3.2.1. rule, you would lose nothing, because you have at least two other copies.
Thanks. What program do you use to easily encrypt before uploading?
Duplicacy has worked well for me
This is the solution I use as well.
Although, rclone is also a viable solution.
Restic is really good too. I use it for my stuff.
This is the best summary I could come up with:
Cloud host CloudNordic says most of its customers have “lost all data with us” following a ransomware attack on its datacenter systems, including its backups.
In a notice on its website translated from Danish, CloudNordic said: “The attackers succeeded in encrypting all servers’ disks, as well as on the primary and secondary backup system, whereby all machines crashed and we lost access to all data.”
The cloud host said that it believes the hackers had access to the company’s administrative systems “from which they could encrypt entire disks.”
It’s not clear how the ransomware attack began, but the company said that the attack happened — or was at least exacerbated — by moving infected systems from one datacenter to another datacenter that was “unfortunately wired to access our internal network that is used to manage all of our servers.” CloudNordic said that it “had no knowledge that there was an infection.”
At the time of writing, no ransomware group has appeared to publicly acknowledge or take credit for the cyberattack.
Both CloudNordic and Azero said that they were working to rebuild customers’ web and email systems from scratch, albeit without their data.
The original article contains 432 words, the summary contains 192 words. Saved 56%. I’m a bot and I’m open source!
Ouch, cannot imagine what everyone, who are involved in this, are thinking. Wonder how many customers they had and how many will go broke.
I might venture a guess how many customers they will have after this…
If you’ve ever heard of ‘Chili Klaus’ (maybe from Hot Ones), his entire website is completely gone.
And that’s exactly why I don’t use seedboxes.
Seed boxes are inherently handling replaceable data, bar unpopular torrents. This is such a silly comparison.