www.isssource.com
Open in
urlscan Pro
35.242.224.42
Public Scan
Submitted URL: https://cnp.technologypub.com/tracking/?trackID=11A4C8C97A8BC5D48408EB2D121CD80E&redirectID=6111
Effective URL: https://www.isssource.com/cloud-provider-hit-in-ransomware-attack-expects-losses/
Submission: On December 12 via manual from PH — Scanned from DE
Effective URL: https://www.isssource.com/cloud-provider-hit-in-ransomware-attack-expects-losses/
Submission: On December 12 via manual from PH — Scanned from DE
Form analysis
2 forms found in the DOMGET https://www.isssource.com/
<form role="search" method="get" class="et-search-form" action="https://www.isssource.com/">
<input type="search" class="et-search-field" placeholder="Search …" value="" name="s" title="Search for:">
</form>
POST https://www.isssource.com/wp-comments-post.php
<form action="https://www.isssource.com/wp-comments-post.php" method="post" id="commentform" class="comment-form">
<p class="comment-notes"><span id="email-notes">Your email address will not be published.</span> <span class="required-field-message">Required fields are marked <span class="required">*</span></span></p>
<p class="comment-form-comment"><label for="comment" style="display: none;">Comment <span class="required">*</span></label> <textarea id="comment" name="comment" cols="45" rows="8" maxlength="65525" required="required"></textarea></p>
<p class="comment-form-author"><label for="author" style="display: none;">Name <span class="required">*</span></label> <input id="author" name="author" type="text" value="" size="30" maxlength="245" autocomplete="name" required="required"></p>
<p class="comment-form-email"><label for="email" style="display: none;">Email <span class="required">*</span></label> <input id="email" name="email" type="text" value="" size="30" maxlength="100" aria-describedby="email-notes" autocomplete="email"
required="required"></p>
<p class="comment-form-url"><label for="url" style="display: none;">Website</label> <input id="url" name="url" type="text" value="" size="30" maxlength="200" autocomplete="url"></p>
<p class="form-submit"><input name="submit" type="submit" id="submit" class="submit et_pb_button" value="Submit Comment"> <input type="hidden" name="comment_post_ID" value="76902" id="comment_post_ID">
<input type="hidden" name="comment_parent" id="comment_parent" value="0">
</p>
<p style="display: none;"><input type="hidden" id="akismet_comment_nonce" name="akismet_comment_nonce" value="9ddedc2a6c"></p>
<p style="display: none !important;"><label>Δ<textarea name="ak_hp_textarea" cols="45" rows="8" maxlength="100"></textarea></label><input type="hidden" id="ak_js_1" name="ak_js" value="1670830018758">
<script>
document.getElementById("ak_js_1").setAttribute("value", (new Date()).getTime());
</script>
</p>
</form>
Text Content
* Twitter * Home * Archives * Focal Points * Technology Update * Company/Product News * Training and Certification * Government * Incidents * Research * Careers * News * Contact Us * Sign Up for Our Weekly Newletter Select Page * Home * Archives * Focal Points * Technology Update * Company/Product News * Training and Certification * Government * Incidents * Research * Careers * News * Contact Us * Sign Up for Our Weekly Newletter CLOUD PROVIDER HIT IN RANSOMWARE ATTACK, EXPECTS LOSSES Dec 6, 2022 | News Cloud computing provider Rackspace said Tuesday morning a ransomware attack is behind its ongoing Hosted Exchange outage that started early Friday morning. “As you know, on Friday, December 2nd, 2022, we became aware of suspicious activity and immediately took proactive measures to isolate the Hosted Exchange environment to contain the incident,” the company said in an update to the initial incident report. “We have since determined this suspicious activity was the result of a ransomware incident.” The investigation, led by a cyber defense firm and Rackspace’s own internal security team, is in its early stages and is still investigating if any data ended up purloined. RELATED STORIES * Grocery Chain Hit in Cyberattack * Cyberattack at Canadian Food Producer * Trains Halted in Denmark * Continental Auto Group Cyberattack Continues The San Antonio, Texas-based cloud service provider said it will notify customers if it finds evidence attackers gained access to their sensitive information. Rackspace said in its daily advisory: Updated Advisory “We appreciate your patience as we continue to work through the security issues that have affected our Hosted Exchange environment. As you know, on Friday, December 2nd, 2022, we became aware of suspicious activity and immediately took proactive measures to isolate the Hosted Exchange environment to contain the incident. We have since determined this suspicious activity was the result of a ransomware incident. “Alongside our internal security team, we have engaged a leading cyber defense firm to investigate. Our investigation is still in its early stages, and it is too early to say what, if any, data was affected. If we determine sensitive information was affected, we will notify customers as appropriate. “Based on the investigation to date, we believe that this incident was isolated to our Hosted Exchange business. The Company’s other products and services are fully operational, and we have not experienced any impact to our Rackspace Email product line and platform. Out of an abundance of caution, we have put additional security measures in place and will continue to actively monitor for any suspicious activity. “Rackspace is making available resources so that customers can migrate their users and domains to Microsoft 365. At this time, we are unable to provide a timeline for restoration of the Hosted Exchange environment. We are working to provide customers with archives of inboxes where available, to eventually import over to Microsoft 365. “As a temporary solution while you set up Microsoft 365, it is possible to also implement a forwarding option that will allow mail destined for a Hosted Exchange user to be routed to an external email address. Please log in to your customer account for a ticket with instructions to request this option. Customers should reply to the ticket to request the forwarding rule be put into place for each of their users. Email Options “If you do not see this ticket in your account and would like to take advantage of this option, please open a support ticket with the title: REQUESTING FORWARDING FOR HOSTED EXCHANGE. We will work with you to get this set up. NEW mail that is sent after the forwarding rule is put in place will be forwarded to the external address specified. “Notably, the forwarding rule will not apply retroactively to mail sent before the rule is put into place. This option can be used as a temporary solution while you set up Microsoft 365. Once you have fully set up Microsoft 365 and updated your DNS MX records, this forwarding rule will no longer be needed. “We understand the frustration this situation has caused for our customers and are doing everything we can to support them in migrating to Microsoft 365. We have surged our support staff and will be taking additional steps to help guide our customers through this process in order to limit the impact to their own operations. “We appreciate your continued patience and apologize for the inconvenience this situation has had on our valued customers. We are doing everything we can to make this right and will continue to provide updates and resources as available,” the advisory said. Other Services Operational Rackspace said its other products and services are fully operational, and the company has not experienced an impact to its email product line and platform. The company also said it expects a loss of revenue because of the ransomware attack. “Although Rackspace Technology is in the early stages of assessing this incident, the incident has caused and may continue to cause an interruption in its Hosted Exchange business and may result in a loss of revenue for the Hosted Exchange business, which generates approximately $30 million of annual revenue in the Apps & Cross Platform segment. In addition, Rackspace Technology may have incremental costs associated with its response to the incident,” the company said in a release. No further information was immediately available on who was behind the ransomware attack and how much the attackers were asking for. SUBMIT A COMMENT Your email address will not be published. Required fields are marked * Comment * Name * Email * Website Δ This site uses Akismet to reduce spam. Learn how your comment data is processed. Copyright 2022 ISSSource.com Privacy Policies * Twitter Designed by Elegant Themes | Powered by WordPress ISSSource PIN IT ON PINTEREST * * * * * Share This * Facebook * Twitter * LinkedIn * Pinterest * Gmail ╳