(844) 915-5155
(844) 915-5155

Rackspace Hacked in December 2022: How to Protect Your Organization from a Ransomware Attack

Rackspace Hacked in December 2022: How to Protect Your Organization from a Ransomware Attack
Your technology is key to your company’s performance
At XL.net, we make sure that your technology aligns with your business goals through our reliable and managed IT solutions.
Free and No Obligations
Published Dec 06, 2022

On December 2nd, 2022, Rackspace experienced a security incident that later determined to be a ransomware attack impacting tens of thousands of people. Rackspace is a public cloud computing company and an early service provider of cloud solutions. This article will discuss what happened, and how you can protect your organization from a ransomware attack on itself or its technology vendors in the future.

Rackspace ransomware incident impacts tens of thousands

“…this suspicious activity was the result of a ransomware incident.” In response Rackspace is continuing to move “tens of thousands of users” to Microsoft Office 365.

The entry point for the ransomware attack has not been disclosed, though based on circumstantial evidence we would infer that it came from an unpatched Microsoft Exchange vulnerability. We based this assumption on the fact that Microsoft Exchange vulnerabilities have been frequently exploited in 2022.

What is a ransomware attack?

rackspace ransomware

A ransomware attack is a combination of encryption software and hackers. The software encrypts your data preventing you from being able to access it unless a hacker provides you a decryption key which most frequently you need to pay for. The software can be initially installed in many different ways post compromising your environment.

An additional element of ransomware attacks that has become the norm since 2021 is exporting your data during the attack to cloud storage and then demanding payment for both providing you a decryption key and to prevent you from publicly selling or disclosing your data.

How to Protect Your Organization from a Ransomware Attack

There is no simple answer here. Ransonware attacks happen after you have already been compromised in any number of ways. Frequently the entry point is human error and/or lack of multi factor authentication system (MFA). Almost as frequently it is unpatched security weaknesses that hackers exploit.

Our best recommendation is to follow the Center for Information Security (CIS) 18 critical security controls from top to bottom – CIS regularly updates the critical controls based on findings of why compromises occur most frequently, and the controls address 98% of risk. Additionally, ensure that you have adequate cyberattack insurance as no one can be 100% protected.

How to Protect Your Organization from technology vendors security incidents

Again, there is no simple answer. We recommend minimally implementing two ISO standards

  1. ISO 27001 Section 15 – Supplier Relationships. This allows you to get control and awareness of your suppliers and vendors so you can determine before an event what your risk might be.
  2. ISO 22301 Security and resilience — Business continuity management systems. This allows you to put together a plan that you regularly test various incident scenarios to better prepare.

Though the Rackspace hack is unfortunate, having such a public company be visibly hacked, serves as a lesson that the rest of us can apply and prevent being hacked ourselves.

You may also like

Jul 18, 2022

Why XL.net Exists

Dear Small businesses, the people within them and XLnetters, I have struggled since early 2009, b...

Oct 19, 2020

We were published on Forbes.com!!

Thank you to the wonderful editors and proofreaders at Forbes.com for launching our article Four Tec...

May 21, 2020

Chicago IT Support and Outsourcing Selection Guide

Your business has decided it's time to change your Information IT support / Information Technology d...

Apr 27, 2023

The 4 Biggest Security Threats in Cloud Computing

As your business operations evolve, cloud computing has grown to be an integral part of your busines...

Apr 19, 2023

The 4 Most Important Benefits of Outsourcing IT Services

As a small business owner, you are likely constantly seeking ways to optimize your operations, strea...

Apr 12, 2023

7 Important Types of IT Managed Services

Managed IT services have become a crucial component of doing business today, with over 87% of compan...