NordVPN confirms 2018 data centre breach

Personal virtual private network provider admits to a breach in March 2018 but claims no data was exfiltrated

NordVPN has admitted it was hacked in March 2018, after rumours circulated around a data breach the virtual private network (VPN) service provider had suffered. 

The company said that an expired internal private key, a tool that provides and secures machine identity, became exposed earlier this year, allowing for the construction of insecure NordVPN imitation servers.

Despite touting its VPN services as "a hack-proof, encrypted tunnel for online traffic to flow", an attacker accessed a data centre hosting NordVPN servers. 

By exploiting a remote management system left by the Finnish data centre provider, which NordVPN was not aware existed, the hacker managed to gain access to one of its servers which had only been active for about a month. The server essentially gave the hacker access some of the encryption keys that secure NordVPN user data. 

The company's blog post responding to the data breach claims: "No user credentials have been intercepted. No other server on our network has been affected. The affected server does not exist anymore and the contract with the server provider has been terminated."

While the breach occurred more than a year ago, NordVPN only discovered it "a few months ago", and had not revealed its existence until recently due to security concerns. 

"We did not disclose the exploit immediately because we had to make sure that none of our infrastructure could be prone to similar issues. This couldn't be done quickly due to the huge number of servers and the complexity of our infrastructure," the company said. 

VPN providers, which protect a customer's browsing traffic privacy from the internet provider and visiting sites, continue to gain popularity, particularly among journalists and activists working in hostile states.

VPNs make tracking a customer's internet and app usage more difficult by channelling their traffic through one encrypted pipeline, which typically relocates their browsing history from their internet provider to their VPN provider. This function has brought VPNs under increased scrutiny, as it is unclear whether each provider logs users' internet history.

"We don't track, collect, or share your private data," NordVPN claims. "It's none of our business."

For this reason, spokesperson Laura Tyrell told IT Pro, "even if the hacker could have viewed the traffic while being connected to the server, he could only see what an ordinary ISP would see, but in no way could it be personalised or linked to a particular username or email."

However, an anonymous security researcher told TechCrunch: "While this is unconfirmed and we await further forensic evidence, this is an indication of a full remote compromise of this provider's systems. That should be deeply concerning to anyone who uses or promotes these particular services."

In the wake of the breach, NordVPN reported it is "taking all the necessary means to enhance [its] security", including pursuing application security and no-logs audits as well as launching a bug bounty programme. Next year, the company plans to launch an independent external audit of its entire infrastructure.

Data security researchers project that similar breaches of machine identity will become increasingly common.

"It is imperative organisations have the agility to automatically replace every key and certificate that may have been exposed in breaches," said Kevin Bocek, vice president of security strategy and threat intelligence for Venafi.

"Quickly replacing machine identities is the reliable way to ensure privacy and security in a world where businesses run and depend on the cloud."

Featured Resources

Managing security risk and compliance in a challenging landscape

How key technology partners grow with your organisation

Download now

Security best practices for PostgreSQL

Securing data with PostgreSQL

Download now

Transform your MSP business into a money-making machine

Benefits and challenges of a recurring revenue model

Download now

The care and feeding of cloud

How to support cloud infrastructure post-migration

Watch now

Recommended

Your essential guide to internet security
Security

Your essential guide to internet security

27 Jan 2021
Hackers leak data from dark web marketplace
cyber security

Hackers leak data from dark web marketplace

9 Apr 2021
Hackers are using fake messages to break into WhatsApp accounts
instant messaging (IM)

Hackers are using fake messages to break into WhatsApp accounts

8 Apr 2021
Hackers sell $38 million in gift cards on Russian marketplace
hacking

Hackers sell $38 million in gift cards on Russian marketplace

7 Apr 2021

Most Popular

Microsoft is submerging servers in boiling liquid to prevent Teams outages
data centres

Microsoft is submerging servers in boiling liquid to prevent Teams outages

7 Apr 2021
Data belonging to 500 million LinkedIn users found for sale on hacker marketplace
hacking

Data belonging to 500 million LinkedIn users found for sale on hacker marketplace

8 Apr 2021
How to find RAM speed, size and type
Laptops

How to find RAM speed, size and type

8 Apr 2021