A code-hosting and project management services provider was forced to shut down operations indefinitely after a hacker broke into its cloud infrastructure and deleted customer data, including most of the company’s backups.
The customers of CodeSpaces.com, run by a company based in Wayne, New Jersey, called AbleBots, were informed Wednesday that their data might have been permanently lost following the compromise of the company’s account on Amazon’s Elastic Compute Cloud (EC2).
The devastating security breach happened over a span of 12 hours and initially started with a distributed denial-of-service attack followed by an attempt to extort money from the company.
The attacker also gained access to Cloud Spaces’ control panel on EC2 and deleted the company’s digital assets from Amazon’s infrastructure when the company tried to regain control of its account.
“We finally managed to get our panel access back but not before he had removed all EBS [Amazon Elastic Block Store] snapshots, S3 [Amazon Simple Storage Service] buckets, all AMI’s [Amazon Machine Images], some EBS instances and several machine instances,” Cloud Spaces said in an announcement on its website. “In summary, most of our data, backups, machine configurations and offsite backups were either partially or completely deleted.”
According to a cached version of the Cloud Spaces site, the company said that “more than 200 companies a week” used the service.
It’s not clear how the attacker managed to gain access to the company’s backups, especially since Cloud Spaces boasted before the attack that its hosting services had full redundancy, high availability and performed real-time backups to multiple off-site locations. The company had also claimed to have “a full recovery plan that has been proven to work and is, in fact, practiced.”
Despite those assurances, it seems that a single security incident was enough to put the company out of business.
“Code Spaces will not be able to operate beyond this point, the cost of resolving this issue to date and the expected cost of refunding customers who have been left without the service they paid for will put Code Spaces in an irreversible position both financially and in terms of on going credibility,” the company said following the security incident. “As such at this point in time we have no alternative but to cease trading and concentrate on supporting our affected customers in exporting any remaining data they have left with us.”
While technical details of the actual attack are lacking, the incident overall is an unfortunate example of the challenges companies face when it comes to securing their cloud-based environments and assets.
“When you don’t control the infrastructure, your options to regain trust in the environment are limited,” said Tim Erlin, director of security and risk, at Tripwire. “A business that relies on cloud-based infrastructure and tools can’t avoid the same kinds of threat modeling and controls required for any organization.”
Some businesses act on the misconception that when they put data into the cloud they somehow transfer responsibility and liability to the cloud provider and this is simply not true, said Amichai Shulman, CTO of Imperva.
“The cloud is a tool,” Shulman said. “The responsibility is with the owner of the data. Businesses have the responsibility to define what is the correct data security and monitoring policy for them.”
The challenge with doing that in the cloud is the lack of visibility into who is accessing the applications, according to Schulman. Fortunately, there are an increasing number of security products that address this problem, for example, by forcing log-ins to cloud accounts through a proxy server that can detect unauthorized locations or unusual activity patterns and enforce restrictions.
“Cloud services such as EC2 rely heavily on access keys for authentication,” said Craig Young, security researcher at Tripwire. “One of the big challenges faced by users of these services is how to manage this authentication material securely. We have seen thousands of EC2 accounts abused after storing EC2 keys in public code repositories or inadvertent sharing. When a business relies on a third-party infrastructure it is crucial to solidify backup and disaster recovery plans even more so than with on-premise systems.”
Security incidents like the one involving Code Spaces are avoidable if companies take effective steps to apply strict automated controls to privileged access and to whitelist applications, said Calum MacLeod, vice president of EMEA at Lieberman Software.
Code Spaces should have been using certificate-based authentication in combination with normal user IDs and passwords, MacLeod said. “Additionally credentials for such a critical application should have been on a schedule of being changed every few hours, combined with continuous discovery of the systems and applications to check if there were any changes to account settings, such as happened here with the creation of new privileged accounts that would allow sustainment of the attacker. In fact, this reads like a cyberattack 101 scenario, where ultimately the victim was breached because of their failure to properly manage privileged credentials.”