Modernizing Authentication — What It Takes to Transform Secure Access
From there, company founder Octave Klaba wrote, the hacker was able to access another employee's internal VPN, which they then used to compromise the account of another system administrator who handles the company's back office.
The company says the hacker successfully accessed OVH's Canadian installation server system, along with its European customer database, which includes customers' full names, addresses, phone numbers, fax numbers and salted and hashed passwords.
"No credit card information is stored at OVH," Klaba wrote. "Credit card information was not viewed or copied."https://o1.qnsr.com/log/p.gif?;n=203;c=204634421;s=15939;x=7936;f=201702151714490;u=j;z=TIMESTAMP;a=20304455;e=i
Following the incident, the company says it reset all employee passwords, set up a new VPN with highly restricted access, and added a YubiKey USB security token as a requirement for all critical access.
"Overall, in the coming months the back office will be under PCI-DSS which will allow us to ensure that the incident related to a specific hack on specific individuals will have no impact on our databases," Klava added. "In short, we were not paranoid enough so now we're switching to a higher level of paranoia."