What you need to know
- NordVPN is one of the most popular virtual private network service providers.
- One of its data centers was breached back in March of 2018, the company recently admitted.
- It claims no user activity logs or credentials were compromised.
A Finnish data center hosting NordVPN servers was breached early last year, the company admitted in a blog post earlier today.
It fingered a remote management system used by the data center provider as being responsible for the breach, a system that NordVPN claims it was entirely unaware of. Though it did not name the vendor, the VPN company has terminated its contract with the data center provider and has also shredded all the servers it was renting at the facility.
With regard to activity logs and user credentials, the company insisted that "none of [its] applications send user-created credentials for authentication," so these are secure. The company also makes a big point of its "no logging policy," meaning the former should not exist in the first place.
Alongside this, the company stated that upon its discovery of the breach last year, it immediately commended an extensive audit of its entire network to ensure any other parts of its network were not similarly exposed. That, it explains, was the reason behind the delay in disclosing the breach till now.
However, as researchers cautioned users of the service this week, a (now expired) private security key was also exposed due to the breach, which could allow anyone to set up their own servers disguised as NordVPN.
"However, the key couldn't possibly have been used to decrypt the VPN traffic of any other server. On the same note, the only possible way to abuse website traffic was by performing a personalized and complicated MiTM attack to intercept a single connection that tried to access nordvpn.com," said the company's Daniel Markuson.
To keep its network secure in the future, the company is purportedly moving all of its servers to RAM, something that it says will be completed by next year. It's also launching an application security audit and a no-logs audit, and is preparing a bug bounty program to ensure the continued safety of its network.
We test and review VPN services in the context of legal recreational uses. For example:
1. Accessing a service from another country (subject to the terms and conditions of that service).
2. Protecting your online security and strengthening your online privacy when abroad.
We do not support or condone the illegal or malicious use of VPN services. Consuming pirated content that is paid-for is neither endorsed nor approved by Future Publishing.
We may earn a commission for purchases using our links. Learn more.
Amazon says employees are not being forced to delete TikTok
Amazon is the latest entity to lash out at TikTok, with the retail giant now requiring all of its employees to delete the app from their phones.
Everything we know (so far) about the Google Pixel 5
We're still months out from Google unveiling the Pixel 5, but that doesn't mean it's too early to speculate what it might offer. Here's everything we know so far!
Technostalgia: A series about the Golden Age of mobile tech
Join us for a look back at the best (and worst) of Android and Google over the years in our series Technostalgia.
New to PS4? You can't go wrong with these titles!
It's never too late to kick off your PS4 experience in style. Not sure where to start? Here are some of the best games in your favorite genres!