Hacker puts 'full redundancy' code-hosting firm out of business

CodeSpaces.com shut down after a hacker gained access to its Amazon EC2 account and deleted most data, including backups

A code-hosting and project management services provider was forced to shut down operations indefinitely after a hacker broke into its cloud infrastructure and deleted customer data, including most of the company's backups.

The customers of CodeSpaces.com, run by a company based in Wayne, New Jersey, called AbleBots, were informed Wednesday that their data might have been permanently lost following the compromise of the company's account on Amazon's Elastic Compute Cloud (EC2).

The devastating security breach happened over a span of 12 hours and initially started with a distributed denial-of-service attack followed by an attempt to extort money from the company.

The attacker also gained access to Cloud Spaces' control panel on EC2 and deleted the company's digital assets from Amazon's infrastructure when the company tried to regain control of its account.

"We finally managed to get our panel access back but not before he had removed all EBS [Amazon Elastic Block Store] snapshots, S3 [Amazon Simple Storage Service] buckets, all AMI's [Amazon Machine Images], some EBS instances and several machine instances," Cloud Spaces said in an announcement on its website. "In summary, most of our data, backups, machine configurations and offsite backups were either partially or completely deleted."

According to a cached version of the Cloud Spaces site, the company said that "more than 200 companies a week" used the service.

It's not clear how the attacker managed to gain access to the company's backups, especially since Cloud Spaces boasted before the attack that its hosting services had full redundancy, high availability and performed real-time backups to multiple off-site locations. The company had also claimed to have "a full recovery plan that has been proven to work and is, in fact, practiced."

Despite those assurances, it seems that a single security incident was enough to put the company out of business.

"Code Spaces will not be able to operate beyond this point, the cost of resolving this issue to date and the expected cost of refunding customers who have been left without the service they paid for will put Code Spaces in an irreversible position both financially and in terms of on going credibility," the company said following the security incident. "As such at this point in time we have no alternative but to cease trading and concentrate on supporting our affected customers in exporting any remaining data they have left with us."

While technical details of the actual attack are lacking, the incident overall is an unfortunate example of the challenges companies face when it comes to securing their cloud-based environments and assets.

"When you don't control the infrastructure, your options to regain trust in the environment are limited," said Tim Erlin, director of security and risk, at Tripwire. "A business that relies on cloud-based infrastructure and tools can't avoid the same kinds of threat modeling and controls required for any organization."

Some businesses act on the misconception that when they put data into the cloud they somehow transfer responsibility and liability to the cloud provider and this is simply not true, said Amichai Shulman, CTO of Imperva.

"The cloud is a tool," Shulman said. "The responsibility is with the owner of the data. Businesses have the responsibility to define what is the correct data security and monitoring policy for them."

The challenge with doing that in the cloud is the lack of visibility into who is accessing the applications, according to Schulman. Fortunately, there are an increasing number of security products that address this problem, for example, by forcing log-ins to cloud accounts through a proxy server that can detect unauthorized locations or unusual activity patterns and enforce restrictions.

"Cloud services such as EC2 rely heavily on access keys for authentication," said Craig Young, security researcher at Tripwire. "One of the big challenges faced by users of these services is how to manage this authentication material securely. We have seen thousands of EC2 accounts abused after storing EC2 keys in public code repositories or inadvertent sharing. When a business relies on a third-party infrastructure it is crucial to solidify backup and disaster recovery plans even more so than with on-premise systems."

Security incidents like the one involving Code Spaces are avoidable if companies take effective steps to apply strict automated controls to privileged access and to whitelist applications, said Calum MacLeod, vice president of EMEA at Lieberman Software.

Code Spaces should have been using certificate-based authentication in combination with normal user IDs and passwords, MacLeod said. "Additionally credentials for such a critical application should have been on a schedule of being changed every few hours, combined with continuous discovery of the systems and applications to check if there were any changes to account settings, such as happened here with the creation of new privileged accounts that would allow sustainment of the attacker. In fact, this reads like a cyberattack 101 scenario, where ultimately the victim was breached because of their failure to properly manage privileged credentials."

Join the Good Gear Guide newsletter!

Error: Please check your email address.

Tags amazonsecurityTripwireCloud SpacesAccess control and authenticationdata breachAbleBotsdata protectionLieberman SoftwareintrusionImperva

Struggling for Christmas presents this year? Check out our Christmas Gift Guide for some top tech suggestions and more.

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Lucian Constantin

IDG News Service

Most Popular Reviews

Follow Us

Best Deals on GoodGearGuide

Shopping.com

Latest News Articles

Resources

GGG Evaluation Team

Kathy Cassidy

STYLISTIC Q702

First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.

Anthony Grifoni

STYLISTIC Q572

For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.

Steph Mundell

LIFEBOOK UH574

The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.

Andrew Mitsi

STYLISTIC Q702

The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.

Simon Harriott

STYLISTIC Q702

My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.

Latest Jobs

Shopping.com

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?