Rackspace Hacked in December 2022: How to Protect Your Organization from a Ransomware Attack

Share This

On December 2nd, 2022, Rackspace experienced a security incident that later determined to be a ransomware attack impacting tens of thousands of people. Rackspace is a public cloud computing company and an early service provider of cloud solutions. This article will discuss what happened, and how you can protect your organization from a ransomware attack on itself or its technology vendors in the future.

Rackspace ransomware incident impacts tens of thousands

“…this suspicious activity was the result of a ransomware incident.” In response Rackspace is continuing to move “tens of thousands of users” to Microsoft Office 365.

The entry point for the ransomware attack has not been disclosed, though based on circumstantial evidence we would infer that it came from an unpatched Microsoft Exchange vulnerability. We based this assumption on the fact that Microsoft Exchange vulnerabilities have been frequently exploited in 2022.

What is a ransomware attack?

rackspace ransomware

A ransomware attack is a combination of encryption software and hackers. The software encrypts your data preventing you from being able to access it unless a hacker provides you a decryption key which most frequently you need to pay for. The software can be initially installed in many different ways post compromising your environment.

An additional element of ransomware attacks that has become the norm since 2021 is exporting your data during the attack to cloud storage and then demanding payment for both providing you a decryption key and to prevent you from publicly selling or disclosing your data.

How to Protect Your Organization from a Ransomware Attack

There is no simple answer here. Ransonware attacks happen after you have already been compromised in any number of ways. Frequently the entry point is human error and/or lack of multi factor authentication system (MFA). Almost as frequently it is unpatched security weaknesses that hackers exploit.

Our best recommendation is to follow the Center for Information Security (CIS) 18 critical security controls from top to bottom – CIS regularly updates the critical controls based on findings of why compromises occur most frequently, and the controls address 98% of risk. Additionally, ensure that you have adequate cyberattack insurance as no one can be 100% protected.

How to Protect Your Organization from technology vendors security incidents

Again, there is no simple answer. We recommend minimally implementing two ISO standards

  1. ISO 27001 Section 15 – Supplier Relationships. This allows you to get control and awareness of your suppliers and vendors so you can determine before an event what your risk might be.
  2. ISO 22301 Security and resilience — Business continuity management systems. This allows you to put together a plan that you regularly test various incident scenarios to better prepare.

Though the Rackspace hack is unfortunate, having such a public company be visibly hacked, serves as a lesson that the rest of us can apply and prevent being hacked ourselves.

Check Out Some of Our Latest Blog Articles

it, it management, network

    The shift towards cloud computing has become a defining trend...

it, it management, network

  Navigating the complexities of managing a remote company can be daunting...

it, it management, network

In a world where technology constantly evolves, businesses must adapt quickly to...

it, it management, network

  Every day, countless businesses and individuals fall victim to cyber threats,...

it, it management, network

  In today’s world, where every click, every save, and every upload...

it, it management, network

  Businesses often face a critical challenge in scaling their workforce...

it, it management, network

  As modern IT systems grow in complexity, many businesses, particularly...