Heimdal Security Blog

Looking Back: Reflections on the Cloudstar Ransomware Attack and Its Impact

It has been over a year since the Cloudstar ransomware attack, and Stephen Millstein, the CEO of Certified Title Corporation, still feels “something like PTSD” whenever he recalls what happened.

In the cyber attack on the cloud storage provider, Millstein’s title firm, Certified Title Corporation, founded in 1994, was among hundreds of firms impacted. According to Millstein, they housed the entirety of our business essentially. 

I have compared it to waking up without credit cards, passports, IDs, or cell phones. How do you reestablish yourself when you have nothing to build on?

Source

Millstein and Certified Title Corporation had been with Cloudstar for ten years at the time of the attack. The digital storage provider housed all Certified Title’s data and the company’s subscription to ResWare, its preferred closing software.

According to the American Land Title Association, Cloudstar operated six data centers in the United States at the time of the attack, serving over 42,000 users. As a result, hundreds of title companies and lenders could not conduct transactions or close loans due to the attack.

This attack served as a wake-up call to Milstein and many others in the title industry that even encrypted cloud storage providers were vulnerable.

“We got a phone call Friday morning around 10 telling us they were having a ransomware problem, but they did not offer any real details,” Millstein said. The word ransomware wasn’t familiar to me in the sense that it affected me; I had heard about it on the news, but this was the first time I had ever experienced it. So at first, I didn’t think much of it, thinking things would be fine by Monday.”

Source

Millstein realized his mistake over the weekend. Ultimately, they got their data back from Cloudstar, but it took months.

Let’s dig deeper into how it all started. 

How Did the Cloudstar Ransomware Attack Happen

A cloud hosting service provider based in Jacksonville, Florida, Cloudstar provides a wide range of IT security and consulting services and cloud backup services for businesses. Law firms, title companies, mortgage companies, and healthcare providers are some of the industries in which Cloudstar specializes.

On Friday, July 16, 2021, Cloudstar was the victim of a highly sophisticated ransomware attack

As a result of the nature of this attack, their systems were unavailable at this time, and although they worked around the clock, they did not know when the plans would be restored. However, some support services, Office 365 mail services, and email security services are still available through Cloudstar.

Cloudstar has hired Tetra Defense to assist in its recovery efforts, and law enforcement has been notified. Moreover, all of their customers were informed and committed to helping them through this and working in the industry’s best interest. Negotiations with the threat actor were also ongoing. 

Cloudstar confirmed on July 18, 2021, that the incident was related to a ransomware attack. Cloudstar worked to restore its systems over the following months. However, whether any consumer data was available to the hackers orchestrating the attack remains to be seen.

In a letter to its customers, Cloudstar still needs to explain the impact of the ransomware attack or how it affected their data. 

However, due to the data breach, several Cloudstar customers have written letters explaining how it exposed their sensitive and personal information to unauthorized access.

By infiltrating networks with malware, ransomware criminals destroy companies’ data, crippling them. Only when victims pay up do they receive the decoder key. The costs of such attacks add up. Some experts say hackers collected $412 million in ransom payments last year.

A Comprehensive Look Into What Is Causing Data Breaches 

In most cases, data breaches result from stolen or weak credentials. If malicious criminals have your username and password combination, they can gain access to your network. 

Cybercriminals can use brute force attacks to gain access to email, websites, bank accounts, and other PII or financial data sources because most people reuse passwords.

Once cybercriminals gain access to a computer network, they can access and remove any data stored on the compromised servers. Data breach victims can usually identify which files were accessed in most cases. Still, they may be unable to determine which files the hacker accessed or if any data was removed.

Having your sensitive information compromised in a data breach does not necessarily mean it will be used for criminal purposes. Still, it does put it in the hands of an unauthorized individual. 

As a result, individuals who receive Cloudstar data breach notifications should be vigilant in monitoring for signs of unauthorized activity and take the situation seriously. 

Data breaches cause victims also to suffer emotional distress and credit damage, and they may even end up with a criminal record. Taking immediate action is the best way to prevent the worst consequences of a data breach.

Cloudstar Data Breach: What Are Consumers’ Remedies?

Cloudstar customers assumed that their privacy concerns would be taken seriously when doing business with the company. 

Of course, consumers would think twice before giving a company access to their information if they knew it wouldn’t be secure. 

In light of this, data breaches like this raise questions about the adequacy of a company’s data security measures.

Any organization that accepts and stores consumer data also agrees with a legal obligation to ensure the information remains private when it does so. Consumers can pursue civil data breach claims against organizations that fail to protect their information under US data breach laws.

As a result of the Cloudstar data breach, the investigation is still in its infancy. Currently, no evidence suggests Cloudstar is legally responsible for the breach. However, that could change as more information about the breach and its causes becomes available.

How to Respond When You Receive a Data Breach Notification

You might receive a notification letter about a data breach if your information was compromised in the recent breach. Although this isn’t a time to panic, you should take steps to protect yourself from identity theft and other fraudulent activity. 

Here are some essential steps you can take:

 

 

 

 

Wrap Up

Undoubtedly, this was an incredibly difficult time for Cloudstar but, more importantly, for their customers. 

Given the ongoing nature of the ransomware pandemic and the online disruption it causes, experts predict that ransomware and other types of cybersecurity crimes, both commercial and personal, will continue to rise. Cloudstar, one of the title industry’s primary cloud providers, is still vulnerable following the ransomware attack that disrupted its services.

Neutralize ransomware before it can hit.

Heimdal™ Ransomware Encryption Protection

Specifically engineered to counter the number one security risk to any business – ransomware.
  • Blocks any unauthorized encryption attempts;
  • Detects ransomware regardless of signature;
  • Universal compatibility with any cybersecurity solution;
  • Full audit trail with stunning graphics;
Try it for FREE today 30-day Free Trial. Offer valid only for companies.

How Can Heimdal® Protect You From Ransomware?

Heimdal ® offers Ransomware Encryption Protection as part of its outstanding integrated cybersecurity suite, which is universally compatible with any antivirus solution and 100% signature-free, allowing superior detection and remediation of all types of ransomware.

Furthermore, Heimdal ® Patch & Asset Management, keeps hundreds of thousands of enterprise endpoints secure and up to date. Because of our quick response and implementation times, we keep our data updated at a much higher rate than industry benchmarks, but it still yields fascinating insights.

See for yourself by booking a demo!

If you liked this article, follow us on LinkedInTwitterFacebookYoutube, and Instagram for more cybersecurity news and topics.