
In 2023, CloudNordic, a European cloud hosting provider, suffered a ransomware attack that destroyed customer data and backups simultaneously.
The outcome of the CloudNordic ransomware attack was bad enough for the company’s CEO to go on public radio and say he was “furiously sad” and that there would be no company left after recovery.
SplitSecure protects enterprises from attacks like the one that brought down CloudNordic
So, how did the CloudNordic ransomware attack destroy backups and ultimately shut down a business?
The core reason was that CloudNordic’s attacker was able to access administrative systems that had been granted unilateral authority to modify both live data and recovery data without independent constraint.
There was a single point of failure in CloudNordic’s secret management system.
CloudNordic's post-incident analysis revealed that the root cause of the extensive damage was a failure of separation of duties.
Below, we show you exactly what went wrong during the CloudNordic ransomware attack so you can avoid a similar situation in your organization.
CloudNordic ran an ISO27001-compliant operation, but it still had a core vulnerability. Their administrative systems had unilateral authority over both live data and recovery data. Once an identity was trusted, its authority was unconstrained.
An attacker, therefore, only needed one path to an account with unconstrained authority to execute irreversible actions.
In the table below, we break down the critical points where Cloud Nordic’s security controls failed.
Back in 2014, Code Spaces experienced a similar failure of its authentication systems.
After an attacker gained access to the company's cloud management console, production systems and backups stored in the same account were deleted.
There was no independent recovery path. The company shut down within days.
The root cause was the same as CloudNordic’s in that a single administrative domain controlling both production and recovery. Learn more on our Substack.
The business risks from relying on reactive security controls are enormous, but beyond this high-level lesson, there are three core takeaways for data centre operators or any organization with a low tolerance for operational downtime:
With SplitSecure, the attacker could not have executed the ransomware attack even after compromising internal systems. No single path leads to an account with unconstrained authority.
No single point of failure.
Separation of duties enforced by architecture.
Every request logged automatically.
In 2023, CloudNordic, a European cloud hosting provider, suffered a ransomware attack that encrypted both production systems and backups simultaneously, destroying customer data with no recovery path.
Production workloads and backups were governed by the same administrative domain. When attackers reached the control plane, they could encrypt both simultaneously.
Separation of duties ensures that no single identity can perform actions that could cause catastrophic damage alone. In cloud infrastructure, this means no single account should control both production systems and their backups.
By requiring multi-party approval for high-impact actions and distributing secrets so that no single device holds complete credentials. This is the approach SplitSecure uses.
Reversible risks (like fraudulent bank transactions) can be flagged, paused, or reversed. Irreversible risks (such as wiped device fleets, deleted production clusters, or destroyed cryptographic keys) cannot be undone within business timelines.
See how SplitSecure's distributed secrets architecture prevents single-point-of-failure attacks on your most critical systems.
Our Blog