What Happened When GoTo Had Customer Cloud Backups Stolen, Together With Decryption Key?

On January 25th, 2021, GoTo, a remote access company, disclosed that some of its customer cloud backups were stolen, along with the decryption key. This was due to a third-party cloud storage provider that failed to properly secure customer data. GoTo's announcement stated that they believe customer data was accessed by an unnamed third party. While the customer data was encrypted, the encryption key was also stolen which allowed the third party to decrypt the data. GoTo stated that the customer data included company IP addresses, user names, encrypted passwords, and messages sent to their customers. GoTo urged its customers to take the appropriate security measures to protect their data from potential threats. They recommended all users to change passwords, review activity logs, and be wary of any suspicious activity. At this time, Sophos is unable to determine the extent of the attack or the number of affected users. However, the company recommends monitoring company accounts and reviewing security practices to ensure proper security for all customers. Sophos suggests taking proactive steps to secure customer data, by investing in secure cloud storage, testing backups, and monitoring them regularly. The company also suggests implementing multi-factor authentication on cloud storage and review access logs to identify any suspicious activity. Other measures could include stronger passwords, monitoring third-party systems, and running regular scans of the data stored in the cloud. GoTo is continuing to investigate this incident and working closely with its customers to secure their data against any external threats. This unfortunate event is a warning to all cloud users to ensure their data is securely backed up and closely monitored.

This Cyber News was published on nakedsecurity.sophos.com. Publication date: Thu, 26 Jan 2023 15:58:02 +0000


Cyber News related to What Happened When GoTo Had Customer Cloud Backups Stolen, Together With Decryption Key?

What Happened When GoTo Had Customer Cloud Backups Stolen, Together With Decryption Key? - On January 25th, 2021, GoTo, a remote access company, disclosed that some of its customer cloud backups were stolen, along with the decryption key. This was due to a third-party cloud storage provider that failed to properly secure customer data. ...
1 year ago Nakedsecurity.sophos.com
Multi-Cloud vs. Hybrid Cloud: The Main Difference - The proliferation of cloud technologies is particularly confusing to businesses new to cloud adoption, and they're sometimes baffled by the distinction between multi-cloud and hybrid cloud. Although the public cloud infrastructure and public cloud ...
10 months ago Techtarget.com
What is a Cloud Architect and How Do You Become One? - A cloud architect is an IT professional who is responsible for overseeing a company's cloud computing strategy. This includes cloud adoption plans, cloud application design, and cloud management and monitoring. Cloud architects oversee application ...
8 months ago Techtarget.com
2023 Cloud Security Report - Security concerns remain a critical barrier to cloud adoption, showing little signs of improvement in the perception of cloud security professionals. Cloud adoption is further inhibited by a number of related challenges that prevent the faster and ...
10 months ago Cybersecurity-insiders.com
The 10 Best Cloud Security Certifications for IT Pros in 2024 - Many professionals seeking a career in cloud security turn to certifications to advance their learning and prove.... their knowledge to potential employers. The number of cloud security certifications has increased in recent years making it difficult ...
10 months ago Techtarget.com
Goto Security Breach – Hackers Stole Customers' Backups and Encryption Key - Goto, a cloud-based solution for businesses and home users, recently announced that their systems have been hacked. The company said that hackers were able to gain access to customer backups and encryption keys, resulting in the loss of sensitive ...
1 year ago Bleepingcomputer.com
Cloud Security: Stats and Strategies - An interesting aspect in O'Reilly's latest Cloud Adoption report based on a global survey conducted is that 90% of the responders are using the cloud to support their business. One of the key takeaways from the State of the Cloud report from Flexera ...
9 months ago Feeds.dzone.com
6 Best Cloud Security Companies & Vendors in 2024 - Cloud security companies specialize in protecting cloud-based assets, data, and applications against cyberattacks. To help you choose, we've analyzed a range of cybersecurity companies offering cloud security products and threat protection services. ...
8 months ago Esecurityplanet.com
Top Cloud Security Issues: Threats, Risks, Challenges & Solutions - Cloud security issues refer to the threats, risks, and challenges in the cloud environment. To combat these cloud security issues, develop a robust cloud security strategy that addresses all three to provide comprehensive protection. Cloud security ...
5 months ago Esecurityplanet.com
What Is Cloud Security Management? Types & Strategies - Cloud security management is the process of safeguarding cloud data and operations from attacks and vulnerabilities through a set of cloud strategies, tools, and practices. The cloud security manager and the IT team are generally responsible for ...
5 months ago Esecurityplanet.com
7 Considerations for Multi-Cluster Kubernetes - A hybrid cloud is a cloud computing environment that combines public and private clouds, allowing organizations to utilize the benefits of both. In a hybrid cloud, an organization can store and process critical data and applications in its private ...
9 months ago Feeds.dzone.com
What is cloud load balancing? - Cloud load balancing is the process of distributing workloads across computing resources in a cloud computing environment and carefully balancing the network traffic accessing those resources. Cloud load balancing helps enterprises achieve ...
7 months ago Techtarget.com
CrowdStrike Enhances Cloud Asset Visualization to Accelerate Risk Prioritization - The massive increase in cloud adoption has driven adversaries to focus their efforts on cloud environments - a shift that led to cloud intrusions increasing by 75% in 2023, emphasizing the need for stronger cloud security. As organizations increase ...
5 months ago Crowdstrike.com
What Is Cloud Workload Security? Ultimate Guide - Cloud workload security, or cloud workload protection, refers to the tools and policies used to protect apps, services, and resources that run on cloud infrastructure. Your organization can manage cloud workload security through coordination across ...
4 months ago Esecurityplanet.com
Adobe Real-Time CDP: Personalized Customer Experience - Adobe Experience Cloud Products like Adobe Real-Time CDP are available to assist. A revolutionary solution called Adobe Real-Time Customer Data Platform was created to assist companies in realizing the whole value of their customer data. Adobe ...
10 months ago Hackread.com
Managing the Requirements of a MultiCloud System - The use of digital technology has advanced to include cloud computing in the delivery of services, cost reduction, increased agility, and improved security. The emergence of various cloud solutions has led organizations to move their assets from ...
1 year ago Blog.isc2.org
What is a cloud application? - A cloud application, or cloud app, is a software program where cloud-based and local components work together. Cloud application servers are typically located in a remote data center operated by a third-party cloud services infrastructure provider. ...
7 months ago Techtarget.com
Analyzing the SonicWall Custom Grub LUKS Encryption Modifications - During our initial analysis of a virtual machine image for the application, we discovered a customized LUKS encryption mechanism meant to hinder reverse engineering of the application. We were able to recover the LUKS decryption key by leveraging ...
11 months ago Securityboulevard.com
Comprehensive Cloud Monitoring Platforms: Ensuring - Platforms for comprehensive cloud monitoring come into play in this situation. In this article, we will explore the significance of comprehensive cloud monitoring platforms and delve into some leading solutions available in the market today. ...
11 months ago Feeds.dzone.com
Cloud Security: Ensuring Data Protection in the Cloud - Data Encryption: Protecting sensitive data is a top priority in cloud security. Cloud security is of utmost importance when it comes to protecting and ensuring the confidentiality of data stored and transmitted in the cloud. Data protection in the ...
9 months ago Securityzap.com
7 Keys to an Effective Hybrid Cloud Migration Strategy - Not very long ago, a hybrid cloud migration strategy amounted to a business extending its internal workloads into an environment it doesn't own. A hybrid cloud strategy was relatively simple - a combination of on-site resources and some type of cloud ...
10 months ago Techtarget.com
GOTO Says Hackers Stole Encrypted Backups During November Cyberattack - GOTO Inc. has revealed that an attempted cyberattack on their networks in November 2020 succeeded in stealing encrypted backups of some of its systems. The breach was first detected on November 4th, when GOTO Inc. noticed suspicious activity on their ...
1 year ago Therecord.media
4 types of cloud security tools organizations need in 2024 - By now, organizations know which on-premises security tools they need, but when it comes to securing the cloud, they don't always understand which cloud security tools to implement. While many traditional on-premises tools and controls work in the ...
6 months ago Techtarget.com
3 benefits of going cloud native - Since the start of Microsoft Intune in 2010, we have been working on and iterating toward simplified Windows management, in part by moving infrastructure from on-premises to the cloud. As the capabilities of our customers and Intune grew, a pure ...
11 months ago Microsoft.com
Data security and cost are key cloud adoption challenges for financial industry - 91% of banks and insurance companies have now initiated their cloud journey, a significant increase from 2020, when only 37% of firms had embarked on their cloud transformations, according to Capgemini. This high rate and its corresponding investment ...
10 months ago Helpnetsecurity.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)