OVH hack prompts calls for tigher system admin security controls

Web hosting firm confirms European database breach.

The multi-stage cyber attack carried out against web hosting giant OVH has prompted calls for firms to tighten up security access to privileged accounts.

The French firm confirmed this week that an email account belonging to one of its system administrators was breached by hackers, allowing them to gain access to its European customer database.

We were not paranoid enough so now we're switching to a higher level of paranoia.

The hackers also acquired access to the firm's installation server system in Canada.

In a post on the company's web forum, OVH said the European database contains the names, addresses, telephone numbers and encrypted passwords of its customers, but no credit card information.

The company said it would take a lot of "technical means" for hackers to recover the "salted" passwords, but as a precaution it is encouraging its customers to reset them anyway.

The database breach resulted from the hackers using the system admin's email account to gain access to another employee's internal VPN, which in turn allowed them to take control of the person who handles the firm's internal back office systems.

The hack has prompted an overhaul of OVH's internal security policies, the post confirmed, including the introduction of automatically generated passwords for employees and the creation of a new VPN with highly restricted access.

"Consulting internal emails is now only possible from the office/VPN," the post continued.  "All those who have critical access now have three verification levels: IP source, password, [and a] staff USB security token," it added.

OVH said it has filed a criminal complaint about the incident to the judicial authorities.

"In the coming months the back office will be under PCI-DSS, which will allow us to ensure the incident related to a specific hack on specific individuals will have no impact on our databases," it said.

"In short, we were not paranoid enough so now we're switching to a higher level of paranoia. The aim is to guarantee and protect your data in the case of industrial espionage that would target people working at OVH."

Sol Cates, chief security officer at database encryption vendor Vormetric, said system admins are a common target for hackers because it makes delving deeper into the company's IT infrastructure much easier.

"By taking over the access rights of someone already on the system, hackers are able to easily circumvent the traditional perimeter defences that would have once foiled their efforts, and gain access to the corporate network," Cates explained.

"It's time to limit what impact these accounts have within our walls, to reduce exposure to data, detect activity, while allowing them to continue to perform their expected functions. 

"A layered approach, where data is firewalled' with sophisticated encryption and buffered by security intelligence capable of detecting this type of malicious and anomalous behaviour, is essential," Cates added.

Featured Resources

Digital document processes in 2020: A spotlight on Western Europe

The shift from best practice to business necessity

Download now

Four security considerations for cloud migration

The good, the bad, and the ugly of cloud computing

Download now

VR leads the way in manufacturing

How VR is digitally transforming our world

Download now

Deeper than digital

Top-performing modern enterprises show why more perfect software is fundamental to success

Download now

Recommended

Lumen's digital portal simplifies the ordering of IT solutions
Business strategy

Lumen's digital portal simplifies the ordering of IT solutions

20 Oct 2020
US charges six Russians behind NotPetya and Olympics hacks
Security

US charges six Russians behind NotPetya and Olympics hacks

20 Oct 2020
Microsoft becomes the most-spoofed brand for phishing attacks
Security

Microsoft becomes the most-spoofed brand for phishing attacks

20 Oct 2020
Managing employee security risks during lockdown
Security

Managing employee security risks during lockdown

20 Oct 2020

Most Popular

The top 12 password-cracking techniques used by hackers
Security

The top 12 password-cracking techniques used by hackers

5 Oct 2020
Google blocked record-breaking 2.5Tbps DDoS attack in 2017
Security

Google blocked record-breaking 2.5Tbps DDoS attack in 2017

19 Oct 2020
What is a 502 bad gateway and how do you fix it?
web hosting

What is a 502 bad gateway and how do you fix it?

5 Oct 2020