Categories: Tech NewsTechCrunch+

Rackspace says hackers accessed customer data during ransomware attack

Cloud computing giant Rackspace has confirmed hackers accessed customer data during last month’s ransomware attack.

The attack, which Rackspace first confirmed on December 6, impacted the company’s hosted Exchange email environment, forcing the web giant to shut down the hosted email service following the incident. At the time, Rackspace said it was unaware “what, if any, data was affected.”

In its latest incident response update published on Friday, Rackspace admitted that the hackers gained access to the personal data of 27 customers. Rackspace said the hackers accessed PST files, typically used to store backup and archived copies of emails, calendar events and contacts from Exchange accounts and email inboxes.

Advertisement

Rackspace said about 30,000 customers used its hosted Exchange service — which it will now discontinue — at the time of the ransomware attack.

“We have already communicated our findings to these customers proactively, and importantly, according to Crowdstrike, there is no evidence that the threat actor actually viewed, obtained, misused, or disseminated any of the 27 Hosted Exchange customers’ emails or data in the PSTs in any way,” said Rackspace. The company added that customers that haven’t been contacted directly can “be assured” that their data was not accessed by attackers.

Rackspace attributed the breach to the Play ransomware group, a relatively new gang that recently claimed attacks on the Belgian port city of Antwerp and the H-Hotels hospitality chain. Rackspace’s stolen data is not currently listed on the ransomware group’s leak site, and it’s unclear if Rackspace has paid a ransom demand.

Advertisement

According to the incident report update, Play threat actors gained access to Rackspace’s networks by exploiting CVE-2022-41080, a zero-day flaw patched by Microsoft in November that has been linked to previous ransomware incidents.

Rackspace says hackers accessed customer data during ransomware attack by Carly Page originally published on TechCrunch

Advertisement

Recent Posts

Unlocking the Secrets of JSON.stringify(): More Than Meets the Eye

JSON (JavaScript Object Notation) is a lightweight data-interchange format widely used in web development. At…

3 days ago

How to Handle AJAX GET/POST Requests in WordPress

AJAX (Asynchronous JavaScript and XML) is a powerful technique used in modern web development that…

1 month ago

Page Speed Optimization: Post-Optimization Dos and Don’ts

Introduction After successfully optimizing your website for speed, it's essential to maintain and build upon…

1 month ago

Ultimate Guide to Securing WordPress Folders: Protect Your Site from Unauthorized Access

Securing your WordPress folders is crucial to safeguarding your website from unauthorized access and potential…

2 months ago

HTML CSS PHP File Upload With Circle Progress Bar

Creating a file upload feature with a circular progress bar involves multiple steps. You'll need…

3 months ago

Using WP Rocket with AWS CloudFront CDN

Integrating WP Rocket with AWS CloudFront CDN helps to optimize and deliver your website content…

3 months ago