Security Incident: What We Did to Improve Security of Our Infrastructure
November 25th, 2019
We want to update you on what further steps are being taken to ensure the future security of Hostinger’s clients and services, along with what our teams have learned while revising the security vulnerability issues that caused the incident. This is just the beginning of our security improvement roadmap. Here is what we have done so far:
- We have rewritten a considerable amount of our backend system code and removed a lot of dependencies on external libraries that had the potential to be vulnerable.
- We have assembled a dedicated cybersecurity team. They are constantly monitoring our systems and are performing internal security tests to find any possible loopholes. This has dramatically raised the awareness of our staff to be more vigilant and cautious.
- We are implementing auto-rotatable system passwords (Hashicorp Vault), so any system-critical login credentials are only valid for a period of up to 2-3 days.
- We are rolling out a Two-Factor Authentication feature for our clients over the following two weeks. It will allow our users to set 2FA for their services, so it will be no longer sufficient to use your login credentials only.
- We are moving out any client-sensitive data, such as emails, names, and surnames outside to a separate database, which can only be accessed through a strictly audited channel. Calls to this database will be minimized since 99% of actions on our platform do not require this information and can solely rely on the Client ID of our users.
- We have removed a lot of deprecated code and logic, minimizing many attack vectors.
- As mentioned previously, we have rotated all of the credentials on our systems, decreased access rights for our staff, so any user on the system can only access the necessary amount of resources.
- We are implementing Bastion servers to reduce direct connections to servers and reducing the number of systems that have access to internal systems.
As you can see, some efforts are still ongoing since we are prioritizing sustainable and smooth implementation. We aim to finalize these changes before the start of 2020 while planning other security improvements for the future. We will make sure that all Hostinger clients will be informed on the latest changes on our blog so they can begin using these new features as soon as possible.
Finally, we would like to thank our entire community for the utmost patience, trust, help, and feedback provided during the incident. We would not be where we are now without all of you.
August 25th, 2019
We have reset all Hostinger Client passwords as a precautionary measure following a recent security incident. We are taking this extremely seriously and want to let everyone know what has happened and the immediate steps we have taken to protect our clients’ security.
During this incident, an unauthorized third party gained access to our internal system APIs. One of them had access to hashed passwords and other non-financial data about our customers.
We have restricted the vulnerable system, and such access is no longer available.
We are also in contact with the respective authorities.
What Happened?
On August 23rd, 2019 we received informational alerts that one of our servers had been accessed by an unauthorized third party. This server contained an authorization token, which was used to obtain further access and escalate privileges to our system RESTful API Server*. This API Server* is used to query the details about our clients and their accounts.
*[Latest Edit on 2019-08-25 17:43 UTC]
The API database, which includes our client usernames, emails, hashed passwords, first names, and IP addresses was accessed by an unauthorized third party. The respective database table that holds client data, has information about 14 million Hostinger users.
We Have Reset All Client Passwords as a Precautionary Security Measure
We use a cryptographic hash function to encrypt all our client passwords. It is a one-way mathematical function that converts your password to a seemingly random sequence of characters. However, as per standard and precautionary security practices, we have reset all Hostinger client login passwords. We have sent emails to all Hostinger clients with further information regarding the password reset.
Hostinger Client Financial Data Is Safe
Payments for Hostinger services are made through authorized and certified third-party payment providers. It means that we never store any payment card or other sensitive financial data on our servers and it has not been accessed or compromised.
Hostinger Client Websites and Data Are Not Affected
We completed a thorough internal investigation. Hostinger client accounts and data stored on them (websites, domains, hosted emails, etc.) remained untouched and unaffected.
What Steps We Have Taken So Far
Following the incident, we have identified the origin of the unauthorized access and have taken necessary measures to protect data about our clients. This includes a mandatory password reset for our clients and systems within all of our infrastructure.
Furthermore, we have assembled a team of internal and external forensics experts and data scientists to investigate the origin of the incident and increase the security measures of all Hostinger operations. As required by law, we are already in contact with the authorities.
The investigation is still in its early stages. All updates regarding this security incident will be posted in this blog, on our status page, and sent directly to our clients via email and across other channels.
What Our Clients Can Do to Further Secure Their Accounts
Following the password reset, we urge our clients to choose strong passwords that are not utilized elsewhere. Clients should be cautious of any unsolicited communications that ask for your login details, personal information, or refer you to a website asking for the above information. We also strongly suggest not clicking on the links or downloading attachments from suspicious emails.
We remind our clients not to use the same passwords on multiple service providers across the web and to generate strong unique passwords with password management tools.
If you have further questions regarding the security of your account, you may contact the Hostinger Help Center which is available 24/7.
We will be updating this blogpost regularly with important updates regarding this security incident.
If you have any further questions, please refer to Hostinger Help Center.
For media inquiries, please contact press@hostinger.com.
If you wish to delete your personal data from Hostinger, please contact gdpr@hostinger.com.
Comments
October 04 2019
Thanks very much by you work. I apreciated this.
August 26 2019
Thanks for the excellent effort. I am not sure why other users do not appreciate your promoted action. I do appreciate it though. I hope you can get to the bottom of this. We had experiences like this with other host providers and non have took action like you did. Well done. Keep up the great work.
August 25 2019
Really appreciate the honesty of Hostinger. Changed everything from my side, going to stay with you guys. Best of luck,,,
August 25 2019
good to know that you are hiring data scientists, but not security experts, after someone stole your clients data :)
August 25 2019
Hi, I am using social login - google login, is it possible to switch to login based on email id, i hate google
August 25 2019
Hello, I am afraid I cannot answer this at the moment. However, I would recommend contacting Hostinger Help center - we will do our best to help you on the matter. Thanks!
August 25 2019
Hi, is there a reason for not encrypting userdate (e-mail, address and so on)?
August 25 2019
Hello! Yes, there is. Some of the user data is not encrypted, because it is shown in different places all over your member's area. If encrypted, it would be not possible to decrypt it and show it on your member's area. However, we have assembled a team of internal and external experts to investigate the origin of the incident and increase security measures of all Hostinger operations, so that similar issues would not happen in the future.
August 25 2019
Hi Received your email informing me of the attack, clicked the link (at the top of this page) to login to change my password, and it's come back with "User with this email does not exist". If I then click "Forgot Password?", I get "Client not found" How do I get past this? Thanks
August 25 2019
Hello, that sounds like some kind of edge case. Please refer to Hostinger Help Center and we will take care of the matter. Thank you!
August 25 2019
I received an email asking for a password reset I have to check the email name carefully to make sure it is not fake email
August 25 2019
Hello, the email is not fake. Please follow the instructions in the email. All further updates will be posted in this blogpost. Thanks!
August 25 2019
Does this mean that my name, company name, IP addresses, phone, email, and home address/business address are now out in the public or on some hacker's sale stash?
August 25 2019
Hello, what we know is that our Client database has been accessed, meaning the 3rd party could potentially retrieve such records with the access tokens he held. We have reset all Client passwords as a precautionary security measure, Hostinger Client financial data is safe and Hostinger Client websites and data are not affected. We will keep posting further updates in this blogpost.
August 25 2019
So... when are we getting 2FA on Hostinger?
August 25 2019
Hello and thank you for your comment! We use a cryptographic hash function to encrypt all our Client passwords. At the moment, we have reset all Client passwords as a precautionary security measure. We are planning to provide 2FA in the near future. The safest option is to use Social logins (Google, Facebook or Github). Anyone using Social logins do not need to change or even set their members area password.