this post was submitted on 23 Aug 2023
112 points (100.0% liked)

Technology

59052 readers
6622 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
 

Both CloudNordic and Azero said that they were working to rebuild customers’ web and email systems from scratch, albeit without their data.

Yea.... Don't bother. But, do expect to hear from my lawyers.....

CloudNordic said that it “had no knowledge that there was an infection.” CloudNordic and Azero are owned by Denmark-registered Certiqa Holding, which also owns Netquest, a provider of threat intelligence for telcos and governments.

Edit-

https://www.cloudnordic.com/

top 21 comments
sorted by: hot top controversial new old
[–] FredericChopin_@feddit.uk 39 points 1 year ago (1 children)

I couldn’t help but laugh when the article mentions the parent company that does threat intelligence. I think those governments might want to look elsewhere.

[–] xtremeownage@lemmyonline.com 6 points 1 year ago

yea, that was my thoughts as well.... Lol, I wouldn't touch them with a 10 foot pole.

[–] TimeSquirrel@kbin.social 7 points 1 year ago (1 children)

How do you fuck up this badly in 2023? I can see this happening in 1999.

[–] HellAwaits@lemm.ee 1 points 1 year ago (1 children)

Ransomware attacks aren't new. Although, I find it weird that a cloud host doesn't have backups.

[–] On@kbin.social 6 points 1 year ago (1 children)

CloudNordic said: “The attackers succeeded in encrypting all servers’ disks, as well as on the primary and secondary backup system, whereby all machines crashed and we lost access to all data

They did. They were affected too, if you read the article.

[–] exi@feddit.de 4 points 1 year ago (1 children)

If your backups are online and not in a warehouse, you are doing it wrong. Even my own personal backups are on disconnected disks. What a bunch of amateurs.

[–] GenEcon@lemm.ee 0 points 1 year ago (1 children)

If you don't know you are infected and you've been infected for a couple months, your backups are worthless.

[–] exi@feddit.de 0 points 1 year ago* (last edited 1 year ago)

That's why you do regular restore tests on separate systems. That should be standard procedure for any company. A fully encrypted disk should be noticable immediately.

[–] jeena@jemmy.jeena.net 5 points 1 year ago (1 children)

Hm, so I can't rely on the Hetzner backup and should backup manually to a hard drive at home at least every now and then.

[–] r00ty@kbin.life 5 points 1 year ago (1 children)

The fire ovh had created this problem for many. Some people's backups were in that data centre and they lost everything.

Yes, home backup and or cloud backup with a separate provider.

[–] Appoxo@lemmy.dbzer0.com 3 points 1 year ago

3 2 1 for a reason...

[–] TwoGems@lemmy.world 5 points 1 year ago (1 children)

So what is the safest encrypted cloud service these days?

[–] xtremeownage@lemmyonline.com 12 points 1 year ago (1 children)

safest encrypted cloud service these days

None. Use your own encryption keys, and pre-encrypt your data.

If the cloud provider I use for storing my backups got pwned, the attacker would gain access to.... well, nothing, without my private keys. And- if you follow the 3.2.1. rule, you would lose nothing, because you have at least two other copies.

[–] TwoGems@lemmy.world 2 points 1 year ago (2 children)

Thanks. What program do you use to easily encrypt before uploading?

[–] andrew@lemmy.stuart.fun 1 points 1 year ago

Restic is really good too. I use it for my stuff.

[–] Nugget@lemm.ee 0 points 1 year ago

Duplicacy has worked well for me

[–] autotldr@lemmings.world 4 points 1 year ago

This is the best summary I could come up with:


Cloud host CloudNordic says most of its customers have “lost all data with us” following a ransomware attack on its datacenter systems, including its backups.

In a notice on its website translated from Danish, CloudNordic said: “The attackers succeeded in encrypting all servers’ disks, as well as on the primary and secondary backup system, whereby all machines crashed and we lost access to all data.”

The cloud host said that it believes the hackers had access to the company’s administrative systems “from which they could encrypt entire disks.”

It’s not clear how the ransomware attack began, but the company said that the attack happened — or was at least exacerbated — by moving infected systems from one datacenter to another datacenter that was “unfortunately wired to access our internal network that is used to manage all of our servers.” CloudNordic said that it “had no knowledge that there was an infection.”

At the time of writing, no ransomware group has appeared to publicly acknowledge or take credit for the cyberattack.

Both CloudNordic and Azero said that they were working to rebuild customers’ web and email systems from scratch, albeit without their data.


The original article contains 432 words, the summary contains 192 words. Saved 56%. I'm a bot and I'm open source!

[–] OfficerBribe@lemm.ee 3 points 1 year ago

Ouch, cannot imagine what everyone, who are involved in this, are thinking. Wonder how many customers they had and how many will go broke.

[–] cholesterol@lemmy.wtf 2 points 1 year ago

If you've ever heard of 'Chili Klaus' (maybe from Hot Ones), his entire website is completely gone.