Aug 25 2023

Cloud Hosting Provider Lost all Customer Data Following Ransomware Attack

Category: Information Security,Ransomwaredisc7 @ 10:01 am

Cloud Hosting Provider Lost all Customer Data Following Ransomware Attack

There has been a cyber attack on two cloud hosting providers, namely CloudNordic and Azero Cloud, which Certiqa Holding owns. The cyberattack has resulted in complete data loss for all their customers.

The cloud attack was reportedly on Friday, April 18, 2023, at around 4 AM when CloudNordic and Azero cloud were exposed to a ransomware attack in which the threat actors shut down all the systems, including customer systems, e-mail systems, customersā€™ websites, and everything they gained access to.

Both companies mentioned that they could not and didnā€™t want to pay the ransom demanded by the threat actors. However, the IT teams of CloudNordic and Azero Cloud are working with external experts to get complete information about the attack and possible recreation.

Unfortunately, the companies could not recover or recreate any customer data, and they have lost every piece of data on their customers, mail servers, web servers, etc.

Current Status

CloudNordic and Azero Cloud are highly affected by this cyber attack, and they have lost largely critical customer data but have re-established communications.

This means they have now deployed blank systems, including name servers, web servers, and mail servers. However, none of them contain any previous data.

The company has sorted out a way to restore the DNS administration interface that can enable users to get email and the web working again.

Attack Explanation

As per the report submitted to Cyber Security News, both companies attempted to migrate between data centers and had some infected systems before the migration, which the company did not know. 

Nevertheless, some servers used to manage all the servers were still wired to the previous network. Threat actors gained access to the administration systems with this network misconfiguration, which paved their way toward the backup systems (both primary and secondary backup).

The attackers encrypted all the systems they had access to, including all the virtual machines. Large amounts of data were reported to have been encrypted by the ransomware, but there seems to be no evidence of data being copied.

Both companies claimed there seemed to be no evidence of a data breach and regretted the inconvenience caused to their customers.

With the rise in cyberattacks and cybercriminals, every organization must implement multiple security measures and monitor every piece of traffic to prevent these kinds of cyberattacks.

Ransomware – Understand Prevent Recover

InfoSec toolsĀ |Ā InfoSec servicesĀ |Ā InfoSec booksĀ |Ā Follow our blogĀ |Ā DISC llc is listed on The vCISO Directory

Tags: ransomware


Jul 12 2023

Staying ahead of the ā€œprofessionalsā€: The service-oriented ransomware crime industry

Category: Ransomwaredisc7 @ 12:14 pm

The Ransomware Hunting Team: A Band of Misfits’ Improbable Crusade to Save the World from Cybercrime 

Ransomware Protection Playbook

CISSP training course

InfoSec tools | InfoSec services | InfoSec books

Tags: ransomware, ransomware hunting, ransomware playbook


Jan 04 2023

Ransomware Risk Management

Category: Ransomware,Risk AssessmentDISC @ 12:15 pm

A Cybersecurity Framework Profile

Infosec booksĀ |Ā InfoSec toolsĀ |Ā InfoSec services

Tags: ransomware, Ransomware Protection Playbook


Dec 24 2021

Anti-Ransomware Checklist

Category: RansomwareDISC @ 12:41 pm

Ransomware Protection Playbook

https://www.facebook.com/DISCInfoSec/shop/

https://www.amazon.com/shop/discinfosec

Tags: ransomware, ransomware checklist, Ransomware Protection Playbook


Oct 21 2021

Problems with Multifactor Authentication

Category: 2FADISC @ 9:04 am

Tags: authentication, MFA, phishing, Problems with Multifactor Authentication, ransomware, social engineering, Two-factor authentication


May 26 2021

New Disk Wiping Malware Targets Israel

Category: MalwareDISC @ 10:51 am

Advanced malware analysis

Tags: data destruction, Malware, ransomware