The VPN company said that one of its 3,000 servers in a third-party data center was open to exploitation through a misconfigured management tool.

Dark Reading Staff, Dark Reading

October 23, 2019

1 Min Read

NordVPN, a popular consumer VPN provider, has provided details on an intrusion that affected one of its 3,000 servers. According to the company, the March 2018 cyberattack did not expose any user credentials or history to outsiders.

In a NordVPN blog post, blog editor Daniel Markuson wrote that the breach was due to the actions of a third-party provider. He explained that the breach occurred in "…an insecure remote management system account that the datacenter had added without our knowledge. The datacenter deleted the user accounts that the intruder had exploited rather than notify us." NordVPN has since terminated its contract with the provider.

NordVPN was not alone in being hit by the attack; VPN providers TorGuard and VikingVPN were also affected. All three have said that no user data or credentials were exposed by the events.

For more, read here and here.

Virtual.Event-Fall19-380x50_DRVE.jpg

This free, all-day online conference offers a look at the latest tools, strategies, and best practices for protecting your organization’s most sensitive data. Click for more information and, to register, here.

About the Author(s)

Dark Reading Staff

Dark Reading

Dark Reading is a leading cybersecurity media site.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights