Incident: Data Breach at NordVPN's Finland Data Center in 2018

Published Date: 2019-10-22

Postmortem Analysis
Timeline 1. The software failure incident, a data breach at NordVPN, happened in March 2018 [90791].
System 1. NordVPN's lone server in a Finland data center [90791] 2. Unnamed provider's security measures [90791]
Responsible Organization 1. An unauthorized user who accessed a server in a Finland data center rented by NordVPN [90791]
Impacted Organization 1. NordVPN [90791]
Software Causes 1. The software cause of the failure incident was a data breach in March 2018 where an unauthorized user accessed a server in a Finland data center rented by NordVPN [90791].
Non-software Causes 1. The data breach incident was caused by an unauthorized user accessing a lone server in a Finland data center that NordVPN was renting from an unnamed provider, who did not disclose the hack [90791].
Impacts 1. The impact from the data breach at NordVPN in 2018 was reported to be minor, with no usernames or passwords intercepted [90791].
Preventions 1. Implementing stricter security measures such as multi-factor authentication and encryption could have prevented unauthorized access to the server [90791]. 2. Regular security audits and monitoring of server activity could have detected the breach earlier, preventing further data exposure [90791]. 3. Ensuring better communication and transparency between the VPN company and its data center provider could have led to quicker detection and response to the breach [90791].
Fixes 1. Enhancing security measures such as undergoing application security audits, working on a second no-logs audit, and preparing a bug bounty program [90791]. 2. Launching an independent external audit of the infrastructure to ensure no other vulnerabilities are present [90791]. 3. Implementing stricter requirements for data centers contracted with to prevent similar incidents in the future [90791].
References 1. TechCrunch [90791]

Software Taxonomy of Faults

Category Option Rationale
Recurring unknown (a) The software failure incident having happened again at one_organization: The article does not mention any previous incidents of a similar nature happening again within NordVPN or with its products and services. Therefore, there is no information available to suggest that a similar incident has occurred before within the same organization [90791]. (b) The software failure incident having happened again at multiple_organization: The article does not provide any information about similar incidents happening at other organizations or with their products and services. Hence, there is no indication of this software failure incident occurring at multiple organizations [90791].
Phase (Design/Operation) design (a) The software failure incident related to the design phase: NordVPN experienced a data breach in 2018 where an unauthorized user accessed a server in a Finland data center that NordVPN was renting. The breach was due to a vulnerability in the system's design, as the unnamed provider of the data center did not disclose the hack to NordVPN. This incident highlights a failure in the system development and the procedures to operate or maintain the system [90791]. (b) The software failure incident related to the operation phase: The data breach incident at NordVPN was not directly caused by the operation or misuse of the system. Instead, it was due to a vulnerability in the system's design and the lack of disclosure by the data center provider. Therefore, the failure was more related to the design phase rather than the operation phase [90791].
Boundary (Internal/External) within_system (a) The software failure incident reported in the article is within_system. NordVPN disclosed that an unauthorized user accessed a lone server in a Finland data center that they were renting from a provider, which did not disclose the hack. This breach originated from within the system as it involved a server under NordVPN's control [90791]. Additionally, NordVPN mentioned undergoing an application security audit, preparing a bug bounty program, and planning an independent external audit of their infrastructure to enhance security measures internally, indicating that they are taking steps to address issues within their system.
Nature (Human/Non-human) non-human_actions, human_actions (a) The software failure incident in the NordVPN data breach was primarily due to non-human actions. An unauthorized user accessed a server in a Finland data center that NordVPN was renting, indicating a breach caused by external factors beyond human control [90791]. Additionally, the company mentioned enhancing security measures, conducting audits, and launching bug bounty programs to mitigate such non-human actions in the future. (b) Human actions also played a role in the NordVPN data breach incident. The delay in confirming the leak was attributed to an intensive review of NordVPN's infrastructure, indicating that human actions, such as the internal audit process, contributed to the handling of the aftermath of the breach [90791]. Additionally, NordVPN mentioned raising standards for the data centers it contracts with, indicating a human-driven effort to prevent similar incidents in the future.
Dimension (Hardware/Software) hardware, software (a) The software failure incident related to hardware: - NordVPN experienced a data breach in 2018 where an unauthorized user accessed a server in a Finland data center that NordVPN was renting from an unnamed provider [90791]. - The breach was due to a vulnerability in the hardware infrastructure of the data center, which allowed the unauthorized access to occur [90791]. (b) The software failure incident related to software: - NordVPN's response to the data breach included enhancing security measures such as undergoing an application security audit, working on a second no-logs audit, preparing a bug bounty program, and planning an independent external audit of their infrastructure [90791]. - The company mentioned that they are taking all necessary means to enhance their security, indicating that the failure was also related to software vulnerabilities that needed to be addressed [90791].
Objective (Malicious/Non-malicious) malicious (a) The software failure incident in this case was malicious. NordVPN reported being the victim of a data breach in 2018 where an unauthorized user accessed a server in a Finland data center. The breach was not disclosed by the provider, indicating malicious intent to hide the intrusion. NordVPN took steps to enhance security and conduct audits to prevent such incidents in the future [90791].
Intent (Poor/Accidental Decisions) poor_decisions (a) The software failure incident related to NordVPN's data breach in 2018 was primarily due to poor decisions. NordVPN was using a server in a Finland data center that they were renting from an unnamed provider. An unauthorized user was able to access this server, leading to the data breach. NordVPN mentioned that the provider did not disclose the hack, indicating a lack of transparency and potentially poor decision-making on the part of the provider [90791]. Additionally, NordVPN acknowledged that better practices could have been applied in selecting data centers and ensuring security measures were in place to prevent such incidents in the future [90791].
Capability (Incompetence/Accidental) accidental (a) The software failure incident related to development incompetence is not explicitly mentioned in the provided article. Therefore, it is unknown if the failure was due to contributing factors introduced due to lack of professional competence by humans or the development organization. (b) The software failure incident related to accidental factors is evident in the article. NordVPN reported a data breach in 2018 where an unauthorized user accessed a server in a Finland data center that NordVPN was renting. The breach was not disclosed by the data center provider, indicating an accidental failure in security measures [90791].
Duration temporary (a) The software failure incident in this case was temporary. NordVPN experienced a data breach in 2018 where an unauthorized user accessed a lone server in a Finland data center. The breach was discovered a few months ago, leading to a security audit and the cancellation of the contract with the data center. NordVPN is taking steps to enhance its security measures, including undergoing audits and preparing a bug bounty program to prevent such incidents in the future [90791].
Behaviour unknown (a) crash: The software failure incident in the NordVPN data breach incident did not involve a crash where the system lost state and did not perform any of its intended functions. The breach was related to unauthorized access to a server in a data center, leading to a data breach. NordVPN took steps to enhance security and conduct audits to prevent such incidents in the future [90791]. (b) omission: The incident did not involve omission where the system omitted to perform its intended functions at an instance(s). Instead, it was a case of unauthorized access to a server leading to a data breach. NordVPN responded by canceling its contract with the data center and implementing enhanced security measures [90791]. (c) timing: The failure was not related to timing, where the system performed its intended functions correctly but too late or too early. The incident was about unauthorized access to a server, leading to a data breach. NordVPN took steps to improve security and conduct audits to prevent similar incidents in the future [90791]. (d) value: The software failure incident was not due to the system performing its intended functions incorrectly. Instead, it was a case of unauthorized access to a server in a data center, resulting in a data breach. NordVPN responded by enhancing security measures and conducting audits to prevent future breaches [90791]. (e) byzantine: The incident did not involve a byzantine failure where the system behaved erroneously with inconsistent responses and interactions. It was a case of unauthorized access to a server in a data center, leading to a data breach. NordVPN took steps to improve security and conduct audits to prevent similar incidents in the future [90791]. (f) other: The behavior of the software failure incident in the NordVPN data breach incident does not fall under the categories of crash, omission, timing, value, or byzantine failures. The incident was related to unauthorized access to a server in a data center, prompting NordVPN to enhance security measures and conduct audits to prevent future breaches [90791].

IoT System Layer

Layer Option Rationale
Perception None None
Communication None None
Application None None

Other Details

Category Option Rationale
Consequence property (d) property: People's material goods, money, or data was impacted due to the software failure The software failure incident involving NordVPN was a data breach in 2018 where an unauthorized user accessed a server in a Finland data center. While NordVPN stated that no usernames or passwords were intercepted, the breach did impact the security of the data stored on the server. NordVPN took measures to enhance its security efforts, including canceling its contract with the data center and undergoing security audits to prevent similar incidents in the future [90791].
Domain information (a) The failed system in the NordVPN data breach incident was related to the information industry. NordVPN is a virtual private network (VPN) service that provides secure access to the internet for its users, emphasizing privacy and data security [90791]. The breach involved unauthorized access to a server in a data center, highlighting the importance of securing information and data in the digital age.

Sources

Back to List