This article is more than 1 year old

Hacker breaks into ThrustVPS, launches phishing attack from firm's own servers

Company confesses to cockup after Reddit thread surfaces

Virtual private server firm ThrustVPS has taken the unusual step of admitting it had suffered a phishing attack.

Rather than taking the time-honoured solution of just pretending nothing had happened and correcting the issue on the sly, the VPS provider sent an email to customers 'fessing up to the attack.

"The phishing attack came from our server," the admin team wrote in an email to customers. "Upon further investigation the attacker had managed to gain access to the whmcs installation and upload his own files, namely a php shell and a mailer script. These have now been removed and the server has been secured.

We are also looking to introduction [sic] extra security to make sure we have no further repeat of issues you have experienced over the weekend.

As a precaution, customers were asked to login and update their passwords. They were reassured that ThrustVPS does not store any credit card information on its systems, so there was no chance of any financial disasters.

"Our apologies for any inconvenience this has caused and please let us know if there is anything we can assist with during this time," the email continued.

The first mention of the problem came on Twitter, before a post was uploaded to Reddit warning of a "honeypot".

On Twitter, one user questioned whether Thrust's customer database had been compromised.

Others had a predictable grumble:

Others, however, praised them:

The firm, which has an outpost in Maidenhead, tweeted yesterday that all was now well within its walls. ®

More about

TIP US OFF

Send us news


Other stories you might like