» » Rackspace Completes Investigation Into Ransomware Attack

Rackspace Completes Investigation Into Ransomware Attack

Rackspace Completes Investigation Into Ransomware Attack

Dwelling › Incident Response

Rackspace Completes Investigation Into Ransomware Assault

By Eduard Kovacs on January 06, 2023

Tweet

Cloud firm Rackspace has accomplished its investigation into the current ransomware assault and located that the hackers did entry some buyer assets.

The ransomware assault solely hit Rackspace’s Hosted Trade atmosphere, which the corporate was compelled to close down because of the incident. In its final replace, Rackspace stated the cybercriminals accessed the Private Storage Desk (PST) of 27 clients out of a complete of almost 30,000 clients.

PSTs are usually used to retailer copies of messages, calendar occasions and different objects related to Microsoft Trade and different Microsoft merchandise.

Nevertheless, Rackspace stated that CrowdStrike, which helped it examine the incident, has not discovered any proof that “the menace actor truly seen, obtained, misused, or disseminated emails or information within the PSTs for any of the 27 Hosted Trade clients in any method.”

Following the incident, the corporate has determined to not rebuild the Hosted Trade e-mail atmosphere, noting that it had already deliberate emigrate to Microsoft 365 even earlier than the hack.

After the breach got here to mild, Rackspace began advising clients to maneuver to Microsoft 365. Within the meantime, the cloud agency has been engaged on recovering the e-mail information saved on compromised servers, with greater than 50% being recovered thus far. Then again, solely lower than 5% of consumers have truly downloaded the recovered e-mail information, which signifies that many impacted customers already had their very own backups or don’t really want the previous information, Rackspace stated.

Rackspace confirmed that the Play ransomware group was behind the assault. The corporate is at present not listed on the cybercrime gang’s leak web site. It’s unclear if Rackspace has paid any ransom.

The attackers gained preliminary entry to Rackspace’s Trade servers by chaining a few identified vulnerabilities in a brand new exploitation methodology. The assault concerned one of many flaws referred to as ProxyNotShell and CVE-2022-41080, each of which have been patched by Microsoft in November, earlier than the assault on Rackspace. CrowdStrike just lately printed a weblog publish detailing the exploit chain.

An exterior Rackspace advisor revealed that the corporate had utilized ProxyNotShell mitigations in September, when the flaw got here to mild, however didn’t set up the November patches as a consequence of considerations that the fixes may trigger operational points.

As for CVE-2022-41080, it seems that Rackspace didn’t rush to patch it as a consequence of Microsoft’s advisory describing it as ‘solely’ a privilege escalation problem and never mentioning distant code execution — though, Microsoft did assign it an ‘exploitation extra doubtless’ score.

Rackspace won’t be sharing every other updates concerning the incident on its standing web page, nevertheless it has promised to share extra particulars concerning the assault sooner or later to assist different defenders forestall such assaults sooner or later. 

A number of class motion lawsuits have been filed in opposition to Rackspace in response to the breach.

Associated: LastPass Says Password Vault Information Stolen in Information Breach

Associated: Lloyd’s of London Cyber Incident Investigation Finds No Proof of Compromise

Get the Each day Briefing

 
 
 

  • Most Current
  • Most Learn
  • XDR and the Age-old Downside of Alert Fatigue
  • Lots of 13 New Mac Malware Households Found in 2022 Linked to China
  • SASE Firm Netskope Raises $401 Million
  • Russian Turla Cyberspies Leveraged Different Hackers’ USB-Delivered Malware
  • Consumer Paperwork Overwritten With Malicious Code in Current Dridex Assaults on macOS
  • Ransomware Hit 200 US Gov, Schooling and Healthcare Organizations in 2022
  • Qualcomm UEFI Flaws Expose Microsoft, Lenovo, Samsung Units to Assaults
  • Rackspace Completes Investigation Into Ransomware Assault
  • France Regulator Raps Apple Over App Retailer Advertisements
  • Extra Political Storms for TikTok After US Authorities Ban

On the lookout for Malware in All of the Fallacious Locations?

First Step For The Web’s subsequent 25 years: Including Safety to the DNS

Tattle Story: What Your Pc Says About You

Be in a Place to Act By Cyber Situational Consciousness

Report Exhibits Closely Regulated Industries Letting Social Networking Apps Run Rampant

2010, A Nice 12 months To Be a Scammer.

Do not Let DNS be Your Single Level of Failure

How you can Establish Malware in a Blink

Defining and Debating Cyber Warfare

The 5 A’s that Make Cybercrime so Engaging

How you can Defend Towards DDoS Assaults

Safety Budgets Not in Line with Threats

Anycast – Three Causes Why Your DNS Community Ought to Use It

The Evolution of the Prolonged Enterprise: Safety Methods for Ahead Pondering Organizations

Utilizing DNS Throughout the Prolonged Enterprise: It’s Dangerous Enterprise

SecurityWeek Podcast

author-Orbit Brain
Orbit Brain
Orbit Brain is the senior science writer and technology expert. Our aim provides the best information about technology and web development designing SEO graphics designing video animation tutorials and how to use software easy ways
and much more. Like Best Service Latest Technology, Information Technology, Personal Tech Blogs, Technology Blog Topics, Technology Blogs For Students, Futurism Blog.

Cyber Security News Related Articles