Linode Resets Passwords as DDoS Attacks Continue
The cloud hosting provider forces users to change passwords after an unauthorized log-in is detected.Linode is having a rough start to 2016. The cloud hosting provider has been suffering from a series of distributed denial-of-service attacks that were first reported on Dec. 25, impacting multiple Linode data center locations, including Dallas; Atlanta; Newark, N.J.; Fremont, Calif.; Singapore; Frankfurt, Germany; and London. Adding to Linode's woes, on Jan. 5, after an unauthorized access was discovered, the company informed its customers that they all need to reset their passwords. The Linode status page provides a running tally of the ongoing attacks and Linode's attempts to mitigate to the issue. The company optimistically wrote on Dec. 26 that "the attacks have subsided for long enough that we believe this incident can be considered resolved." Unfortunately for Linode and its customers, attacks have continued against various pieces of Linode's global footprint. "Over the course of the last week, we have seen over 30 attacks of significant duration and impact," Alex Forster, network engineer at Linode, wrote. "As we have found ways to mitigate these attacks, the vectors used inevitably change." As Linode worked tirelessly to mitigate the DDoS attacks, it also discovered unauthorized access into three user accounts. A security investigation into the unauthorized access turned up another disturbing detail—that an external machine had a pair of Linode user credentials on it.
"This implies user credentials could have been read from our database, either offline or on, at some point," Linode warned in a status update. "The user table contains usernames, email addresses, securely hashed passwords and encrypted two-factor seeds."