Supply chain β›“ Supply Chain

NordVPN Finland Datacenter Server Breach

πŸ“… 2018-03-01 🏒 Unnamed Finland datacenter provider (remote management system)
Primary Source β†—

Incident Details

In October 2019, NordVPN disclosed that one of its rented servers at a datacenter in Finland had been accessed without authorization. The actual breach occurred in March 2018 β€” more than 18 months before public disclosure β€” making the timeline and delayed notification a central point of controversy. The attack vector was an insecure remote management account that the datacenter provider had added to the server without NordVPN’s knowledge or consent. Specifically, the unauthorized access was made possible through an undisclosed IPMI (Intelligent Platform Management Interface) account β€” a powerful out-of-band server management interface used by datacenter operators. The datacenter had configured this account without informing NordVPN, and an attacker exploited it to gain access to the single server. The datacenter deleted the undisclosed management account on March 20, 2018, effectively ending the attacker’s access window. NordVPN was not notified about the breach until April 13, 2019, at which point the company immediately shredded the affected server. NordVPN publicly confirmed the incident on October 21, 2019, after learning that information about the breach had begun circulating publicly. What was compromised: The attacker obtained a single expired TLS key associated with the affected server. NordVPN maintained that user activity logs do not exist on its servers (the company operates a strict no-logs policy), meaning the attacker could not have obtained user identities, usernames, passwords, or browsing histories. The expired TLS key would theoretically have allowed a man-in-the-middle attack only against users connected to that specific server at that specific time, though NordVPN emphasized that exploiting even this would have been extremely difficult in practice. NordVPN terminated its contract with the unnamed Finnish datacenter provider and launched a comprehensive audit of its entire server infrastructure across all countries. The company later announced a bug bounty program and plans for an independent security audit as part of its remediation response. This incident is notable as a pure third-party/supply-chain risk case: NordVPN’s own systems were not hacked β€” instead, a vendor had silently introduced an insecure remote access mechanism. The 18-month gap between breach and disclosure also raised significant questions about vendor breach notification obligations, even when the vendor itself only discovered the issue months after the fact.

Technical Details

Initial Attack Vector
Unauthorized access via undisclosed IPMI (Intelligent Platform Management Interface) remote management account installed by datacenter provider without NordVPN's knowledge
Vendor / Product
Unnamed Finland datacenter provider (remote management system)
Supply Chain Attack
βœ… Confirmed third-party / vendor compromise

Timeline

  1. 2018-03-01 Breach occurred
  2. 2019-10-21 Publicly disclosed
  3. 2019-10-21 Customers notified