No support linux hosting

Web hosting service shuts after systems breached

A web hosting provider known as No Support Linux Hosting has announced it is closing down following a cybercriminal attack that saw a hacker breach the firm’s internal network. The result of the infiltration has compromised the web hosting company’s entire operation.

Forced to close by a malicious hack

In an advisory message that was posted on No Support Linux Hosting’s official site, the firm explained that its systems had been hit on February 8. Investigation indicated that the network intruder had effectively compromised the web hosting company’s dedicated infrastructure, including its admin section and customer database packed with personally identifiable information (PII), along with its official website.

Approached by business technology news site ZDNet.com, a spokesperson for No Support Linux Hosting (NSLH) declined to comment on the incident. However, while the exact details of the breach are as of yet unclear, the dedicated attack would seem to have been exceptionally destructive in design.

On account of the malicious attack, the web hosting company officially acknowledged it was no longer able to operate, and it urged its clients to take emergency action:

“We can no longer operate the No Support Linux Hosting business. All customers should immediately download backups of their websites and databases through cPanel.”

Whether the hacker wiped or downloaded the firm’s backups and database is unknown. There has been no indication that the attack involved encryption – using ransomware tactics to leverage funds from the firm in return for a decryption key.

Additional attacks reported by two other web hosting companies

Although it has not been confirmed if the events are related, hacks have been aimed at two more web hosting providers subsequently.

A blog that focuses on piracy and digital rights, TorrentFreak, issued a report that two web hosting companies based here in the United Kingdom, which deliver IPTV services to streaming sites operated by pirates, were also hit by hacks with many similarities. The attacks saw both KS-Hosting.com and SapphireSecure.net briefly show a message on the front page of their websites from a hacker.

In the hacker’s message displayed on the two sites, personal information was shared pertaining to the individuals behind both KS-Hosting.com and SapphireSecure.net. The message threatened the two web hosting enterprises, stating the hacker would provide both copyright protection regulators and the police with copies of their databases listing customers.

Читайте также:  Linux file server project

This attack, however, was clearly a ransomware assault, as the message made a formal request for a ransom of $92,000 in Bitcoin in return for not sharing the customer databases with the authorities.

A potential link between the ransomware hacks on KS-Hosting.com and SapphireSecure.net and the web hosting company No Support Linux Hosting could be that both firms were offered the option of closing down their operation completely to mitigate the release of their databases and the disclosure of their client’s details, as well as a chance to pay the ransom.

ZDNet commented that with all three attacks so close together on the timeline, there is at least the possibility that they were all made by the same hacker.

Источник

No support linux hosting

‘No Support Linux Hosting’ Shuts Down After Cyberattack (zdnet.com) 25 —> 25

A web hosting company named No Support Linux Hosting announced today it was shutting down after a hacker breached its internal systems and compromised its entire operation. From a report: According to a message posted on its official site, the company said it was breached on Monday, February 8. The hacker appears to have «compromised» the company’s entire operation, including its official website, admin section, and customer database. A No Support Linux Hosting (NSLH) spokesperson did not return a request for comment seeking details about the attack. But while details about the intrusion are unclear, the attack appears to have been destructive in its nature. «We can no longer operate the No Support Linux Hosting business,» the company flatly acknowledged today. «All customers should immediately download backups of their websites and databases through cPanel,» NSLH said, urging clients to do so before servers go down for good. At the time of writing, the nature of the NSLH attack is unclear, and we don’t know if the hacker downloaded & wiped the company’s database and backups or if we’re talking about a classic ransomware attack where the intruder encrypted files and demanded a ransom for the decryption key.

You may like to read:

Remote Work Is Gutting Downtowns, Will Cost Cities $453 Billion

‘Job Interviews are a Nightmare — and Only Getting Worse’

If IT Workers Stay Home, What Happens to ‘the Most Empty Downtown in America’?

SVB Employees Blame Remote Work For Bank Failure

After ‘Quiet Quitting’, Here Comes ‘Quiet Firing’

‘No Support Linux Hosting’ Shuts Down After Cyberattack More Login

‘No Support Linux Hosting’ Shuts Down After Cyberattack

The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.

Pretty sure I wouldn’t want a back up ( Score: 3)

pulled from a company so completely hosed by a hacker they shut down entirely.

Also, couldn’t they just call tech support for help getting their servers back up? Oh, wait.

Re: ( Score: 3)

This. You should be downloading a backup of your site and saving it elsewhere. What if they had just disappeared?

Fire alarm for small business SAAS customers ( Score: 1)

Had two different SAAS vendors shut down with 30 days notice which my business used for invoicing and CRM. Small, cheap SAAS means high risk they will shut down without enough warning, tell you to pull your own data, and be unable to do any any data extract even if you pay them.

Читайте также:  Принудительное удаление пакетов linux

End result, we ran reports, got our data in PDF files or manually saved html pages and had to RE-ENTER it MANUALLY into our next system

Needless to say, we did not go with a mom and pop SAAS after those two disasters.

Re: ( Score: 2)

Re:Pretty sure I wouldn’t want a back up ( Score: 4, Informative)

I remember a long time back when I was a teenager, I was a rabid Linux Fan Boy, and I though that Linux would have me immune to all attacks and viruses. So I had my RedHat (Back when RedHat was mostly for consumer use) Linux install with all the Services Installed and running, seeing how cool I was because I had my own Web Server, Email Server, Talk server. While the other guys using Windows were using their ISP services like rubes.
However after a few years, and actually having access to the colleges T1 line, I started to find, that my system was starting to get hacked, because of all the backdoor I had opened, and how the old systems were so vulnerable to buffer overflow errors, that I had learned my lesson. Linux may be more secure compared to windows, but it isn’t secure against stupid. After that I learned to shutoff any services I don’t need, do not have root as my main login, just because it was easier. use SSH over Telent.
Luckily I learned that lesson when I was a kid, and when the internet was still repetitively innocent where such a hack was inconvenient and embarrassing, but not something where I could be really damaging. A site called no support Linux hosting. sounds like something that would have gotten my attention when I was young. Getting a Linux server that I can use, without any of those silly rules and expenses that a supported hosting company would push on you. I don’t doubt for an instant it got shut down.

Источник

[Hacked] No Support Linux Hosting is Shutting Down

«On February 8, 2021, a hacker successfully compromised all the servers we use to operate our business including the No Support Linux Hosting web site, Admin section, and our customer database. We can no longer operate the No Support Linux Hosting business.»

Comments

DP

DP Administrator, The Domain Guy

At least they have the decency to close down instead of pretending its all okay and never telling anyone so they can milk the last profits from it

Actually respected them, thought they were p cool. «Do you like paying extra so other people can ask amateur questions? That’s how it is at other hosting companies where beginners and experts pay the same price. Beginners drive up the cost by asking a lot of novice support questions while the experts don’t contact support. That is great for amateurs, and unfair to the experts like you. No Support Linux Hosting has a completely different business model. We ignore the support questions, and pass the savings on to you! If you are an expert who does not want to pay extra for help with amateur support issues, then you can host with us and save big money. Experts like you can sign up now for free. We charge $1/month per website, and there is no limit to the number of websites you can host in your account. This is the best deal in the web hosting industry, as long as you are the type of person who can find his or her own answers.»

Читайте также:  Linux copy with permissions and owner

Are you guys related?

It sounds a lot like the person who’s running the company is just shutting it down and selling off customer data, any reasonable host would handle this better with better communications (what data was taken? working with authorities for an investigation if the attack was big enough? if there were backups, set the service back up, and many customers will stay if the company explains how they will patch the issue and prevent the next attack!)

thats a hell of a exit strategy, this guy is playing 4d chess

Admit mistakes, accept the consequences, explain your plan to do better. It’s the only recipe for success because you can have a giant team of the most skilled in the industry and you’re going to screw up. Giving up is lame.

DP

DP Administrator, The Domain Guy

They’ve been around for a long time. 2010 or earlier. Solid business plan — shared hosting for $1/mo, lots of great tutorials on their site, no support. They did well. Not of interest to the typical LET reader but for the average guy who’s got one brochure site, knows the basics of WordPress, and doesn’t want to pay Dreamhost $10/mo? Good deal. I just got an email from them 2 days ago saying they didn’t want to do an interview for LEB.

The shared hosting page on that site mentions its a sister company: http://nosupportvpshosting.com/sharedhosting.php

May be he got bored and closing down. Or may be he never had offsite backups, everything got compromised, nothing to restore either.

DP

DP Administrator, The Domain Guy

The shared hosting page on that site mentions its a sister company: http://nosupportvpshosting.com/sharedhosting.php

I think the story as written seems plausible. There is speculation in the thread on HN that they were attacked by not patching for last month’s sudo privilege escalation bug in a timely manner.

But yes, I would consider this minimal information even from a company proclaiming no support. Without that information we have to assume the answer is «we don’t know, could be everything including payment methods, change any shared passwords and watch your credit card statements carefully just in case».

I think leaving responsibility for all backups to the user could come under their definition of «no support». Unless a provider boasts of having regular (and tested) backups I always assume it takes none. The statement says «All customers should immediately download backups of their websites and databases through cPanel.» so it sounds like user data is still present. But back in the HN thread someone stated «but somebody had already changed my password and recovery email in cPanel» so that might not be the case for all (unless this user just lost their credentials really).

Given they ran with cPanel maybe they don’t want the customers to stay. The change to from per-server licensing to per-account licensing in 2019 would have hit «high volume of small users» hosts like this significantly — perhaps not enough to make the service run at a loss but likely the little margin left is not worth the hassle of cleaning up after the hack and trying to restart.

Источник

Оцените статью
Adblock
detector