Attacks/Breaches

2/12/2019
04:15 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

Devastating Cyberattack on Email Provider Destroys 18 Years of Data

All data belonging to US users-including backup copies-have been deleted in catastrophe, VMEmail says.

An unknown attacker appears to have deleted 18 years' worth of customer emails, along with all backup copies of the data, at email provider VFEmail.

A note on the firm's website Tuesday described the attack, first reported by KrebsOnSecurity, as causing "catastrophic destruction."

"This person has destroyed all data in the US, both primary and backup systems. We are working to recover what data we can," the note read. VFEmail was established in 2001 and provides free and paid email services, including bulk email services in the US and elsewhere.

The attack, described in a series of tweets from the firm, seems to have occurred on Monday and had targeted all VFEmail's externally facing servers across data centers. Though the servers were running different operating systems and not all shared the same authentication, the attacker managed to access each one and reformat them all the same.

The firm apparently caught the perpetrator in the middle of formatting a VFEmail backup server hosted in the Netherlands. But by that time, the attacker had already managed to form all disks on every other VFEmail server. "Every VM is lost. Every file server is lost, every backup server is lost," according to one of the company's tweets.

The attacker sent no ransom notes and appears not to have made any attempt at contacting VFEmail. The motive seems to have been "just attack and destroy," the company said.

Restoration

An update posted late Monday afternoon said the firm had restored webmail and was once again delivering incoming mail to users of its paid services. Mailboxes were being created upon new mail delivery. "There is currently no delivery mechanism for free accounts," the update said.

The system used in the attack on the server hosted in the Netherlands had an IP address belonging to a service provider in Bulgaria. But besides that scrap of information, VFEmail did not appear to have any other information on the attacker or the attacker's motives.

Several security experts are viewing the attack as an example of the devastating consequences of not having a well thought-out strategy for secure data backup and recovery.

"This raises questions of what disaster recovery strategy was in place and why data wasn't backed up into cold storage, thus making it unavailable to attackers," said Fausto Oliveira, principal security architect at Acceptto. Companies with a strategy in place for dealing with such attacks should have been able to recover at least a substantial part of the deleted data, Oliveira said.

Chris Morales, head of security analytics at Vectra, said attacks that have such extreme consequences are rare and highlight the value of maintaining offline backups and archives of data.

"Offline backups might not give a full restore to the exact date data was lost, but it would prevent the complete loss of all historical user data," he said. Many organizations have begun using offline backups to counter potential loss from ransomware, he noted.

Such attacks also highlight the need for proper authorization controls for access to critical data, says Balaji Parimi, CEO at CloudKnox Security, told Dark Reading. "Just having a backup and disaster recovery plan is not sufficient," he says.

Organizations should also take care to avoid providing a single identity with complete administrative privileges on both primary and backup data, or having the ability to wipe data from multiple servers, he says. "Proper authorization controls need to be in place to mitigate these types of risks and reduce the blast radius," Parimi says.

Related Content:

 

 

 

 

Join Dark Reading LIVE for two cybersecurity summits at Interop 2019. Learn from the industry's most knowledgeable IT security experts. Check out the Interop agenda here.

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
REISEN1955
50%
50%
REISEN1955,
User Rank: Ninja
2/13/2019 | 12:45:39 PM
Another obvious error
OFFSITE BACKUPS?  Wow, what a concept.  I am disgusted actually, a firm should always have an offsite storage bin (often cloud these days which is a bad choice).  What if the building burns down?  Flood?  Bad storm?  Any event that destroys the primary campus and some data centers should have duplicate data centers as redundancy elements.  (Delta in Atlanta for example).  i know from personal experience how offsite is.  Aon Consutling had our backup tapes go offiste one Monday morning in September, 2001.  Aon Risk services did not have that offsite removal on that day.  Steven Poulos of Risk Services was leaving the building but, well, went back up to the 103rd floor of the south tower of the World Trade Center to retrive them.  He did not make it out.  

 

Offsite - very important indeed.
New Free Tool Scans for Chrome Extension Safety
Dark Reading Staff 2/21/2019
Making the Case for a Cybersecurity Moon Shot
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  2/19/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
How Enterprises Are Attacking the Cybersecurity Problem
How Enterprises Are Attacking the Cybersecurity Problem
Data breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-10078
PUBLISHED: 2019-02-23
Vembu StoreGrid 4.4.x has XSS in interface/registercustomer/onlineregsuccess.php, interface/registerreseller/onlineregfailure.php, interface/registerclient/onlineregfailure.php, and interface/registercustomer/onlineregfailure.php.
CVE-2014-10079
PUBLISHED: 2019-02-23
In Vembu StoreGrid 4.4.x, the front page of the server web interface leaks the private IP address in the "ipaddress" hidden form value of the HTML source code, which is disclosed because of incorrect processing of an index.php/ trailing slash.
CVE-2018-20785
PUBLISHED: 2019-02-23
Secure boot bypass and memory extraction can be achieved on Neato Botvac Connected 2.2.0 devices. During startup, the AM335x secure boot feature decrypts and executes firmware. Secure boot can be bypassed by starting with certain commands to the USB serial port. Although a power cycle occurs, this d...
CVE-2019-9037
PUBLISHED: 2019-02-23
An issue was discovered in libmatio.a in matio (aka MAT File I/O Library) 1.5.13. There is a buffer over-read in the function Mat_VarPrint() in mat.c.
CVE-2019-9038
PUBLISHED: 2019-02-23
An issue was discovered in libmatio.a in matio (aka MAT File I/O Library) 1.5.13. There is an out-of-bounds read problem with a SEGV in the function ReadNextCell() in mat5.c.