Close Menu
  • Home
  • AI
  • Big Data
  • Cloud Computing
  • iOS Development
  • IoT
  • IT/ Cybersecurity
  • Tech
    • Nanotechnology
    • Green Technology
    • Apple
    • Software Development
    • Software Engineering

Subscribe to Updates

Get the latest technology news from Bigteetechhub about IT, Cybersecurity and Big Data.

    What's Hot

    uikit – Why the title doesn’t follow the navigation inline state in iOS 26

    March 11, 2026

    Thinking Machines Lab inks massive compute deal with Nvidia

    March 10, 2026

    The data behind the win: How Catapult and AWS IoT are transforming pro sports

    March 10, 2026
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram
    Big Tee Tech Hub
    • Home
    • AI
    • Big Data
    • Cloud Computing
    • iOS Development
    • IoT
    • IT/ Cybersecurity
    • Tech
      • Nanotechnology
      • Green Technology
      • Apple
      • Software Development
      • Software Engineering
    Big Tee Tech Hub
    Home»IT/ Cybersecurity»NordVPN denies breach claims, says attackers have “dummy data”
    IT/ Cybersecurity

    NordVPN denies breach claims, says attackers have “dummy data”

    big tee tech hubBy big tee tech hubJanuary 5, 2026003 Mins Read
    Share Facebook Twitter Pinterest Copy Link LinkedIn Tumblr Email Telegram WhatsApp
    Follow Us
    Google News Flipboard
    NordVPN denies breach claims, says attackers have “dummy data”
    Share
    Facebook Twitter LinkedIn Pinterest Email Copy Link


    NordVPN denies breach claims, says attackers have “dummy data”

    NordVPN denied allegations that its internal Salesforce development servers were breached, saying that cybercriminals obtained “dummy data” from a trial account on a third-party automated testing platform.

    The company’s statement comes after a threat actor (using the 1011 handle) claimed on a hacking forum over the weekend that they stole more than 10 databases containing sensitive information like Salesforce API keys and Jira tokens, following a brute-force attack against a NordVPN development server.

    “Today i am leaking +10 DB’s source codes from a nordvpn development server. This information was acquired by bruteforcing a misconfigured server of Nordypn, which has salesforce and jira information stored. Compromissed information: SalesForce api keys, jira tokens and more,” the threat actor said.

    Wiz

    However, as NordVPN revealed today, this is actually test data stolen from a temporary test environment deployed months earlier during trial testing a potential vendor for automated testing.

    The Lithuanian VPN service added that the test environment had no connection with its own infrastructure and that the stolen data doesn’t include sensitive customer or business information.

    NordVPN breach claims
    NordVPN breach claims (BleepingComputer)

    ​”The leaked elements, such as the specific API tables and database schemas can only be artifacts of an isolated third-party test environment, containing only dummy data used for functionality checks. While no data in the dump points to NordVPN, we have contacted the vendor for additional information,” NordVPN explained.

    “Because this was a preliminary test and no contract was ever signed, no real customer data, production source code, or active sensitive credentials were ever uploaded to this environment.

    “We ultimately chose a different vendor and did not proceed with the one we tested. The environment in question was never connected to our production systems.”

    While this was only a false alarm, in 2019, hackers breached the servers of NordVPN and TorGuard, gaining full root access and stealing private keys used to secure their web servers and VPN configurations.

    In response to the 2019 incident, NordVPN introduced a bug bounty program and hired outside cybersecurity experts for a “full-scale” third-party security audit.

    The company also announced plans to switch to dedicated servers that they own exclusively and to upgrade their entire 5,100-server infrastructure to RAM servers.


    Wiz

    As MCP (Model Context Protocol) becomes the standard for connecting LLMs to tools and data, security teams are moving fast to keep these new services safe.

    This free cheat sheet outlines 7 best practices you can start using today.



    Source link

    Attackers Breach claims Data Denies dummy NordVPN
    Follow on Google News Follow on Flipboard
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
    tonirufai
    big tee tech hub
    • Website

    Related Posts

    The data behind the win: How Catapult and AWS IoT are transforming pro sports

    March 10, 2026

    Next Generation, Permanent DNA-Based Data Storage for the AI Age

    March 10, 2026

    How AI Assistants are Moving the Security Goalposts – Krebs on Security

    March 10, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Editors Picks

    uikit – Why the title doesn’t follow the navigation inline state in iOS 26

    March 11, 2026

    Thinking Machines Lab inks massive compute deal with Nvidia

    March 10, 2026

    The data behind the win: How Catapult and AWS IoT are transforming pro sports

    March 10, 2026

    Next Generation, Permanent DNA-Based Data Storage for the AI Age

    March 10, 2026
    About Us
    About Us

    Welcome To big tee tech hub. Big tee tech hub is a Professional seo tools Platform. Here we will provide you only interesting content, which you will like very much. We’re dedicated to providing you the best of seo tools, with a focus on dependability and tools. We’re working to turn our passion for seo tools into a booming online website. We hope you enjoy our seo tools as much as we enjoy offering them to you.

    Don't Miss!

    uikit – Why the title doesn’t follow the navigation inline state in iOS 26

    March 11, 2026

    Thinking Machines Lab inks massive compute deal with Nvidia

    March 10, 2026

    Subscribe to Updates

    Get the latest technology news from Bigteetechhub about IT, Cybersecurity and Big Data.

      • About Us
      • Contact Us
      • Disclaimer
      • Privacy Policy
      • Terms and Conditions
      © 2026 bigteetechhub.All Right Reserved

      Type above and press Enter to search. Press Esc to cancel.