|
|
本帖最后由 gg0767 于 2026-1-31 16:44 编辑
最新回复:
We are writing to provide a clear update regarding the incident affecting your service.
A vulnerability in the platform we use (Virtualizor) allowed an attacker to gain access to our LA VPS nodes where your VPS was hosted. As a result, the attacker damaged the disk associated with your VPS, and the data on it is irrecoverable.
We are currently rebuilding the affected nodes and preparing the platform for service re-installation, so that users will be able to reinstall their VPS and deploy their own backups in order to get back online.
Further information on when servers will be ready for re-installation will be communicated to affected users via email.
Actions and precautions taken;
To prevent similar incidents in the future, the following measures are being implemented:
- All affected nodes and hypervisors are undergoing fresh OS installations to remove any backdoors or residual traces.
- Existing firewall policies and IP-level blocking are being revised and deployed.
- All access keys, passwords, and tokens have been fully refreshed.
- A migration away from Virtualizor to a different, in-house platform is being implemented and will begin next month.
Data and security clarification;
- The attacker does not have access to your VPS data.
- No customers' personally identifiable information was compromised.
- No billing or payment information was compromised.
- The incident was isolated to the VPS management platform (Virtualizor) / LA VPS products and did not affect our billing systems, customer databases or other product lines we offer.
We sincerely understand the impact this incident has caused and appreciate your patience while we work to restore service availability.
For transparency and ongoing updates, a detailed incident report and progress updates are available on our status page (https://status.cloudcone.com/), which is our central communication channel for this incident.
To help manage communications and prevent system overload, this ticket has been temporarily locked; all further updates regarding this incident will be shared via the status page and email.
我们特此致函,向您提供关于此次影响您服务的事件的最新进展。
我们使用的平台(Virtualizor)存在漏洞,攻击者利用该漏洞访问了我们位于洛杉矶的 VPS 节点,您的 VPS 就托管在该节点上。攻击者损坏了与您的 VPS 关联的磁盘,导致数据无法恢复。
我们目前正在重建受影响的节点,并准备重新安装服务,以便用户能够重新安装 VPS 并部署自己的备份,从而恢复在线服务。
服务器何时可以重新安装服务,我们将通过电子邮件通知受影响的用户。
已采取的措施和预防措施:
为防止类似事件再次发生,我们正在实施以下措施:
- 所有受影响的节点和虚拟机管理程序均已全新安装操作系统,以清除任何后门或残留痕迹。
- 我们正在修订并部署现有的防火墙策略和 IP 级阻止措施。
- 所有访问密钥、密码和令牌均已完全刷新。
- 我们正在实施从 Virtualizor 平台迁移到另一个内部平台的计划,该计划将于下个月开始。
数据和安全说明:
- 攻击者无法访问您的 VPS 数据。
- 没有客户的个人身份信息泄露。
- 没有账单或支付信息泄露。
- 此次事件仅限于 VPS 管理平台 (Virtualizor) / LA VPS 产品,并未影响我们的计费系统、客户数据库或我们提供的其他产品线。
我们深知此次事件造成的影响,感谢您在我们努力恢复服务期间的耐心等待。
为了确保透明度并持续更新信息,您可以在我们的状态页面 (https://status.cloudcone.com/) 上查看详细的事件报告和进度更新,该页面是我们此次事件的主要沟通渠道。
|
|