Linode Resets Passwords After Credentials Leak

Linode, a major provider of virtual private servers, has been compromised again. In a blog post, they said, “A security investigation into the unauthorized login of three accounts has led us to the discovery of two user credentials on an external machine. This implies user credentials could have been read from our database, either offline or on, at some point. The user table contains usernames, email addresses, securely hashed passwords and encrypted two-factor seeds.” The Linode team said it found evidence of unauthorized access to three customer accounts. They don’t yet know who is behind the attacks.

An employee for PagerDuty said they were compromised through Linode Manager all the way back in July. “In our situation the attacker knew one of our user’s passwords and MFA secret. This allowed them to provide valid authentication credentials for an account in the Linode Manager. It’s worth noting that all of our active user accounts had two-factor authentication enabled. … We also have evidence from access logs provided by Linode that the attackers tried to authenticate as an ex-employee, whose username ONLY existed in the Linode database.”