US email provider wiped out by hacker
Company has its entire infrastructure remotely formatted
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
You are now subscribed
Your newsletter sign-up was successful
US-based email provider VFEmail.net has been the victim of a catastrophic cyber attack, as unknown hackers destroyed its entire infrastructure for no apparent reason.
In chilling messages posted to VFEmail's Twitter account last night, the provider warned that all of its external-facing systems across multiple data centres had gone offline.
Two hours later, VFEmail revealed that the attacker had been caught formatting the company's backup server, lamenting "I fear all US based data may be lost".
Shortly afterwards, the account confirmed via Twitter that "all the disks on every server" had been erased, virtually wiping out the company's entire infrastructure overnight. In an alert status posted during the attack, the company warned it had "suffered catastrophic destruction".
The motivation behind the attack is currently unclear. There was no ransom demand, and the perpetrator did not appear to be interested in stealing any data; the company confirmed to one concerned customer that although the data was encrypted, "it doesn't matter. They just formatted everything".
The company also noted in a tweet that all its VMs were destroyed even though they used different authentication, suggesting that the perpetrator may have been operating with inside information.
The individual behind the company's Twitter account mooted the possibility of recovering the single file server that they caught the hacker formatting, but warned that "most of the infrastructure is lost".
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Ian Thornton-Trump, IT Pro panellist andEMEA head of cyber security for AmTrust International, compared the incident to the2014 attack on code-hosting service Code Spaces.
"They got nuked so bad they went out of business," he said. "This is business destruction at cloud speed. I will bet money they did not have MFA on the privileged accounts and/or a vulnerability management program in place."
"The thing that does make me sympathetic," he continued, "is this attack could happen to any '100% cloud' business. So figure out your plan to recover or not get hit in the first place - do yourself a favour, the customers a favour and the regulator a favour: take the security seriously before you find out just how bad your security is from a free pentest."
VFEmail's website is currently inaccessible, and the full status of its customer-facing services is unknown. IT Pro has reached out to VFEmail for more information on the potential motivation behind the hack and its current status, and will update this story as it develops.
Adam Shepherd has been a technology journalist since 2015, covering everything from cloud storage and security, to smartphones and servers. Over the course of his career, he’s seen the spread of 5G, the growing ubiquity of wireless devices, and the start of the connected revolution. He’s also been to more trade shows and technology conferences than he cares to count.
Adam is an avid follower of the latest hardware innovations, and he is never happier than when tinkering with complex network configurations, or exploring a new Linux distro. He was also previously a co-host on the ITPro Podcast, where he was often found ranting about his love of strange gadgets, his disdain for Windows Mobile, and everything in between.
You can find Adam tweeting about enterprise technology (or more often bad jokes) @AdamShepherUK.
-
How data storage underpins and powers the modern telcoSponsored Storage is evolving from the endpoint of data to the starting point of business, where data needs to be online, connected, and flowing
-
Zero trust: how to prepare for modern threatsIn-depth Meeting the demands of the latest zero trust guidelines involves ditching legacy apps and positioning for non-human identities
-
Ubuntu vulnerability exposes enterprises to root escalation, complete system compromiseNews The high-severity Ubuntu vulnerability allows an unprivileged local attacker to escalate privileges through the interaction of two standard system components
-
Security agencies issue warning over critical Cisco Catalyst SD-WAN vulnerabilityNews Threat actors have been exploiting the vulnerability to achieve root access since 2023
-
Millions of developers could be impacted by flaws in Visual Studio Code extensions – here's what you need to know and how to protect yourselfNews The VS Code vulnerabilities highlight broader IDE security risks, said OX Security
-
CVEs are set to top 50,000 this year, marking a record high – here’s how CISOs and security teams can prepare for a looming onslaughtNews While the CVE figures might be daunting, they won't all be relevant to your organization
-
Microsoft patches six zero-days targeting Windows, Word, and more – here’s what you need to knowNews Patch Tuesday update targets large number of vulnerabilities already being used by attackers
-
Experts welcome EU-led alternative to MITRE's vulnerability tracking schemeNews The EU-led framework will reduce reliance on US-based MITRE vulnerability reporting database
-
Veeam patches Backup & Replication vulnerabilities, urges users to updateNews The vulnerabilities affect Veeam Backup & Replication 13.0.1.180 and all earlier version 13 builds – but not previous versions.
-
Two Fortinet vulnerabilities are being exploited in the wild – patch nowNews Arctic Wolf and Rapid7 said security teams should act immediately to mitigate the Fortinet vulnerabilities
