Feeds

Fasthosts customer? Change your password now

Police called to major hack

Internet Security Threat Report 2014

Updated Fasthosts, "the UK's number 1 web host", has fired off emergency emails telling customers to change all their passwords after police were called in to investigate a major data breach.

The Gloucester-based firm contacted The Reg this morning with a statement. It said: "As the breach could relate to Fasthosts customer data... Fasthosts has subsequently reviewed and updated its security and worked with external security experts to ensure that all data held by Fasthosts is secure.

"As a precautionary measure, Fasthosts has asked its customers to update their passwords. This includes their control panel, email, FTP, and database passwords, all of which can be changed via the customer control panel. Fasthosts has now implemented customer password encryption to further protect customer data."

We've asked Fasthosts why the passwords were not encrypted in the first place. It said: "Historically, Internet companies have rarely encrypted passwords to aid customer service."

Fasthosts said that the attack affected one server at its headquarters, and added that a system-wide audit had identified and closed the hole where the intruder gained access.

It apologised for any "concern or inconvenience" caused by the intrusion. The statement said: "Fasthosts considers that its practices and procedures are up to date, and represent good practice in continually protecting the security of its customer data, and the company remains fully confident in its ability to do so."

The security flap comes directly after Fasthosts angered its email customers by permanently deleting mail and not immediately telling them. ®

Update

We asked Fasthosts for more detail about the chain of events. It says it can't reveal more details of the timings because of the ongoing police inquiry, but sent us a further statement:

Detection systems revealed that an unauthorized third party gained access to some of our internal systems via network connections. This security breach was only possible because of a security vulnerability which was forced illegally.

As we are currently working with the police and other relevant industry bodies to apprehend the intruder, we regret that we are unable to comment on any details that might prejudice the ongoing investigation.

Fasthosts has been working with the police and other relevant authorities since we became aware of the intrusion.

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
Mighty Blighty broadbanders beg: Let us lay cable in BT's, er, ducts
Complain to Ofcom that telco has 'effective monopoly'
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
Broadband sellers in the UK are UP TO no good, says Which?
Speedy network claims only apply to 10% of customers
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Fujitsu CTO: We'll be 3D-printing tech execs in 15 years
Fleshy techie disses network neutrality, helmet-less motorcyclists
Facebook, working on Facebook at Work, works on Facebook. At Work
You don't want your cat or drunk pics at the office
Soz, web devs: Google snatches its Wallet off the table
Killing off web service in 3 months... but app-happy bonkers are fine
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.