Why the NordVPN network is safe

Why the NordVPN network is safe

Wednesday 23 October 2019

Why the NordVPN network is safe after a third-party provider breach.

Information has recently surfaced about a NordVPN breach caused by vulnerabilities in a third-party datacenter. Here are the key facts about the NordVPN breach situation:

  • One server was affected in March 2018 in Finland. The rest of our service was not affected. No other servers of any type were put at risk. This was an attack on our server, not our entire service.
  • The breach was made possible by poor configuration on a third-party datacenter’s part that we were never notified of. Evidence suggests that when the datacenter became aware of the intrusion, they deleted the accounts that had caused the vulnerabilities rather than notify us of their mistake. As soon as we learned of the breach, the server and our contract with the provider were terminated and we began an extensive audit of our service.
  • No user credentials were affected.
  • There are no signs that the intruder attempted to monitor user traffic in any way. Even if they had, they would not have had access to those users’ credentials.
  • The attacker did acquire TLS keys that, under extraordinary circumstances, could be used to attack a single user on the web using a specifically targeted and highly sophisticated MITM attack that we detail further below. These keys could not and cannot be used to decrypt any encrypted NordVPN traffic in any form.
  • Two other VPN providers were impacted in attacks published by the same intruder. We do not believe that this was a targeted attack against NordVPN.
  • The incident effectively showed that the affected server did not contain any user activity logs. To prevent any similar incidents, among other means, we encrypt the hard disk of each new server we build. The security of our customers is the highest priority to us and we will continue to raise our standards further and further.

— NordVPN

Tor Guide - Freedom & Privacy Online

Tor Powering Digital Resistance. “The Onion Router” protects your privacy. Tor is an invaluable tool for protecting online freedom and guarding against state surveillance and censorship (...)

Tor Project

Keywords

Privacy VPN

Translation

Anonymous Public DNS

Anonymous Public DNS

A message from Anonymous and RedHack Turkey. Anonymous Public DNS with OpenNIC: Are you looking for an alternative DNS provider that is open (...)


Metadata Anonymisation Toolkit

Metadata Anonymisation Toolkit

MAT is a toolbox to anonymize/remove metadata. Proudly powered by Python, MAT was originally written during the “Google Summer of Code 2011”, (...)


Europe's dire dependency on Microsoft

Europe’s dire dependency on Microsoft

Why Europe’s dependency on Microsoft is a huge security risk. We, nine experienced journalists from eight European countries, are "Investigate (...)


NordVPN is an excellent VPN for online privacy

NordVPN is an excellent VPN for online privacy

Warning – Numerous VPN service providers assure not to keep users’ log files of their connections and it is generally false! Many VPN services (...)


Croix Rouge

We stand with Ukraine

The Russian government’s attack on Ukraine has put millions of innocent lives in danger. We stand with Ukraine to support their freedom and to defend democracy. If you wish to support Ukraine and its people in their time of need, please consider donating to the Red Cross.


/e/ Foundation
eFoundation is a non-profit organization leading the development of Open Source mobile operating systems that respect users’ data privacy.

Tor Browser
Tor Browser
Tor protects your privacy

NordVPN
Protect all your devices.
2-Year Plan | Discount -72%