NordVPN fesses up to data center breach, insists network is ‘still safe’
A Finnish data center hosting NordVPN servers was breached early last year, the company admitted in a blog post earlier today.
It fingered a remote management system used by the data center provider as being responsible for the breach, a system that NordVPN claims it was entirely unaware of. Though it did not name the vendor, the VPN company has terminated its contract with the data center provider and has also shredded all the servers it was renting at the facility.
With regard to activity logs and user credentials, the company insisted that “none of [its] applications send user-created credentials for authentication,” so these are secure. The company also makes a big point of its “no logging policy,” meaning the former should not exist in the first place.
Alongside this, the company stated that upon its discovery of the breach last year, it immediately commended an extensive audit of its entire network to ensure any other parts of its network were not similarly exposed. That, it explains, was the reason behind the delay in disclosing the breach till now.
However, as researchers cautioned users of the service this week, a (now expired) private security key was also exposed due to the breach, which could allow anyone to set up their own servers disguised as NordVPN.
“However, the key couldn’t possibly have been used to decrypt the VPN traffic of any other server. On the same note, the only possible way to abuse website traffic was by performing a personalized and complicated MiTM attack to intercept a single connection that tried to access nordvpn.com,” said the company’s Daniel Markuson.
To keep its network secure in the future, the company is purportedly moving all of its servers to RAM, something that it says will be completed by next year. It’s also launching an application security audit and a no-logs audit, and is preparing a bug bounty program to ensure the continued safety of its network.