

On the same note, the only possible way to abuse the website traffic was by performing a personalized and complicated man-in-the-middle attack to intercept a single connection that tried to access NordVPN."Įven if there is no evidence that the attacker used the stolen certificate to set up a spoofed NordVPN server for use in MitM attacks, it still raises interesting questions about certain "security-related" services. "The server itself did not contain any user activity logs none of our applications send user-created credentials for authentication, so usernames and passwords couldn’t have been intercepted either. As for any other attacker activity on the system, NordVPN commented: The attacker was able to gain full remote access of the compromised server and use that access to steal an expired TLS certificate key that is used to securely connect customers to the company's web servers. Apparently, an attacker was able to exploit a vulnerability in a remote management interface utilized by the service provider. It first emerged that NordVPN had an expired internal private key exposed, potentially allowing anyone to spin up their own servers in an attempt to imitate NordVPN in sophisticated man-in-the-middle (MitM) attacks.Īccording to a statement by NordVPN, the attack occurred in March 2018 at a Finnish data center rented by NordVPN. In October 2019 they announced that they were the victim of a data breach, dating back to March 2018. NordVPN, is a popular virtual private networking (VPN) service that helps encrypt internet traffic and protect online identities. The blogs discuss successful detection, response and mitigation actions that can improve your defensive capabilities. “Life in the SOC” is a Blog Series that shares experiences of the BlueVoyant SOC defending against the current and prevalent attacks encountered by our clients. Learn from industry experts and discover how rock-solid cyber defense can benefit your organization. Maximize Your Microsoft Technology Investment.We provide diversified and robust solutions catered to your cyber defense requirements. Penetration Testing & Vulnerability Analysis.

VISIBL Vulnerability Identification Services.Maturity, Gap, and Compliance Assessments.Incident Response Team Threat Exercises.Our world-class cyber experts provide a full range of services with industry-best data and process automation. Kill-switch: They have two different kinds of kill-switches: a user can now choose whether to close a particular app or completely terminate the Internet connection in case of unexpected dropout (system-wide kill-switch).Converging internal and external cybersecurity capabilities into a single, unified platform. PGP keys can be used to encrypt communications between you and NordVPN and are practically unbreakable. Wait – there’s more – To further protect your privacy, NordVPN makes use of PGP keys in customer contact and to protect your account details. Like all top-tier VPN service providers around, they use 256-bit Advanced Encryption Standard (AES). In addition to their great location for privacy NordVPN also uses boasts superior encryption standards. This means that legally, NordVPN does not need to retain logs of its users’ activities – great for your privacy! Panama has no data retention laws and their government does not (as far as we know) carry out Internet surveillance. NordVPN is headquartered in Panama, which although not usually important for most service providers, is significant for VPN services. OpenVPN configuration isn’t user-friendly.Torrenting only supported on some servers.Cryptocurrencies and cash accepted as payment.More than 5,000 servers in 59 countries.Connect 6 devices on many platform types.Kill switch prevents privacy compromise.Ways to secure yourself and your business online.
