Experts Insight On Web Hosting Giant Managed.com Hit By Ransomware And Taken Offline

It has been reported that Managed.com, one of the biggest providers of managed web hosting solutions, has taken down all its servers in order to deal with a ransomware attack. The ransomware impacted the company’s public-facing web hosting systems resulting in some of the customer sites having their data encrypted.The company is now working with law enforcement to identify the attackers and also working on to restore their customers’ data which were lost as part of this attack. This included WordPress and DotNetNuke managed hosting solutions, email servers, DNS servers, RDP access points, FTP servers, and online databases.

Subscribe
Notify of
guest

2 Expert Comments
Most Voted
Newest Oldest
Inline Feedbacks
View all comments
Jake Moore
Jake Moore , Cybersecurity Specialist
InfoSec Expert
November 19, 2020 11:48 am

Managed.com will no doubt have a huge amount on their plate right now, as they tackle the upheaval of getting back online and try to deal with the reputational damage – or even potential public backlash.

Companies continue to avoid admitting a ransomware attack until they have to, associating it with too much stigma. These attacks can largely be prevented, but persistent attackers act like water looking for cracks and when they add enough pressure, problems can and do occur.

It is always best to come clean at the earliest possible time to avoid any future backlash when the truth emerges, but businesses tend to think they will be able to brush off any reputational issues. It does, however, highlight the importance of a test and restore business function, and the benefits of including simulation attacks should a crisis occur.

Last edited 2 years ago by Jake Moore
James McQuiggan
James McQuiggan , Security Awareness Advocate
InfoSec Expert
November 18, 2020 10:26 am

It\’s essential to have documented procedures for handling various incidents and responses to support an event within any organization. These repeatable, established procedures should include communication paths and outlined responsibilities for all people involved in the incidents, whether it\’s an endpoint system infected with malware or an enterprise server environment compromised by ransomware.

It can damage the brand, reputation and possible bottom-line revenue if an outage source is not transparent to an organization’s customers. All communications should be internally authorized before making them public to avoid any confusion or concern by those who might use the victimized organization\’s product or service.

Last edited 2 years ago by James McQuiggan
Information Security Buzz
2
0
Would love your thoughts, please comment.x
()
x