![]() ![]() This type of Ransomware would not have been successful in a CloudJumper built platform due to our security parameters and practices. This impacted less than 1% of our partner base. That said, we are coordinating a third-party forensic investigation and will promptly let clients know if we learn of anything to the contrary.We believe we have identified the origination point. ![]() We understand the vector of attack the program used.We caught and halted the infection in the process of spreading and as precaution isolated all systems from the public internet almost immediately.There were no outbound data spikes to indicate a transfer of data.This was a fast moving programmatic virus-based ransomware and not a data theft tool.Further, we do not believe any such access or acquisition has or will occur for the following reasons: While our investigation remains ongoing, our immediate focus is on supporting impacted clients and restoring functionality.Īt this time, we have no knowledge and no indication that client data has been accessed or acquired. We continue to work diligently to restore impacted systems as quickly as possible. Upon learning of the incident, CloudJumper immediately took efforts to address the disruption. Initially, it had hit in December of 2018 when it impacted a number of American Newspapers and extorted over 600,000 bitcoins. The name of the virus that hit CloudJumper was RYUK – which according to sources was re-written and re-released in March of 2019. This environment was obtained in an acquisition and CloudJumper has been actively migrating these customers to our standardized platforms. JD Helms, president of CloudJumper, sent MSSP Alert the following statement:ĬloudJumper recently discovered a virus-based strain of ransomware as it was in the process of impacting one of our legacy multi-tenant environments. But in a phone conversation and email exchange with MSSP Alert, company executives emphasized their ongoing commitment to those impacted partners. The attack impacted less than one percent of CloudJumper’s partners. The target was CloudJumper, a workspace as a service (WaaS) provider that partners closely with MSPs. ![]()
0 Comments
Leave a Reply. |