LucidLink incident

LucidLink Service Outage

Major Resolved View vendor source →

LucidLink experienced a major incident on June 17, 2024, lasting —. The incident has been resolved; the full update timeline is below.

Started
Jun 17, 2024, 10:08 AM UTC
Resolved
Apr 29, 2024, 01:00 PM UTC
Duration
Detected by Pingoru
Jun 17, 2024, 10:08 AM UTC

Update timeline

  1. resolved Jun 17, 2024, 10:08 AM UTC

    On April 29, 2024, at 12:55 UTC, LucidLink experienced a malicious attack against our service resulting in an outage that affected all customers. Access was fully restored for everyone on May 1, 2024 at 12:06 UTC. We are extremely sorry for the disruption the outage had on our customers. Due to the severity and sophistication of the attack, law enforcement, legal, and external cyber forensic teams have been engaged, and an investigation is underway. This was not a ransomware attack. LucidLink has no indication that any unauthorized access to personal, corporate, or other data was leaked or otherwise affected. This is attributable to LucidLink’s zero-knowledge encryption model.

  2. postmortem Jun 17, 2024, 10:08 AM UTC

    #### Initial Outage and First Response Around 12:55 UTC on April 29, most of LucidLink metadata servers were suddenly unresponsive. Although these servers are spread across multiple time zones in various continents, they became simultaneously unresponsive, and the cause of the disruption was unknown at that time. When a client is involuntarily disconnected from a metadata server, it attempts to reconnect to it. But first, the client needs to contact the discovery service to determine the IP address of the specific metadata server. However, when these metadata servers went down at once, all of their LucidLink clients contacted the discovery service simultaneously. The discovery service was overloaded by the flood of incoming client requests, causing client connections to fail. This is why we initially suspected a DDoS attack on the discovery service. In fact, the connection requests came from legitimate LucidLink clients, and the underlying reason was that most metadata servers were unresponsive. We found that the disk attached to each of these servers was corrupted. It’s noteworthy that this corruption happened at about the same time across servers in multiple time zones on different continents. When we examined some of the corrupted disks, we found that large portions of the disks had been overwritten with random data. At this point, we formed two workstreams:\(i\) containment and remediation and \(ii\) restoring service to customers. #### Restoring Service to Customers In order to restore the critical metadata service, we had to first replicate its infrastructure. This involved deploying many thousands of new metadata servers with the appropriate build image. Doing so at such a massive scale required a different approach and process. We created the new process and deployed the new infrastructure by approximately April 30, 2024, 18:00 UTC. The next step of the recovery process was to initialize each of the newly deployed metadata servers to the last known current state for each filespace. As part of our routine disaster recovery operations, we create backup copies of every metadata server on a rolling six-hour schedule. Recovering metadata servers from backups is another standard process that is performed periodically, but as a result of the attack, we were required to build a new recovery process that could handle the scale in an urgent timeframe. This new process was created and tested, then deployed on a smaller scale for verification. After successfully deploying 10% of the metadata servers, the process was ready to be done at scale for the remaining thousands of metadata servers. In order to expedite recovery for remaining customers, we dramatically scaled up the build infrastructure to increase the speed of deployments. The final phase of recovering the remaining filespace metadata servers from backup was initiated at 19:30 UTC on April 30, 2024, and by 02:55 UTC on May 1, 2024 the automated process was finished. At this point, we had restored access for about 98% of our customers. Due to several factors, recovering the remaining filespaces required manual intervention. A dedicated team was deployed to address each one. By May 1, 2024, 12:06 UTC all filespace metadata servers were back online and all customers had access to their filespaces. #### Containment and Remediation As part of LucidLink’s cyber security incident response process, our teams took a systematic approach to troubleshooting and triage, and we were able to identify, contain and remediate the source of the disruption successfully. Although under full investigation by third-party forensic experts, we believe the root cause of the event to be malicious exploitation of an internal server with access to the production environment. This server was utilized to gain elevated privilege and to execute a script that corrupted the disk attached to each metadata server. LucidLink promptly began its containment process by initially blocking all internet-facing traffic, restricting infrastructure access only to essential personnel, and running extensive vulnerability tests and malware scanning. The LucidLink response team quarantined all servers with elevated privileges to access the production environment and continued with extensive analysis of network, systems, EDR, VPN, access, and application logs. After credential rotations, replacing all API tokens, SSH key pairs, and local account passwords, LucidLink engaged law enforcement, as well as third party specialists for assistance. Through this process, LucidLink updated its network topology and implemented additional access restrictions to further protect its server infrastructure. #### Summary In summary, the incident resulted in the temporary loss of metadata for most filespaces until our team recovered the metadata from backup systems. File data, stored separately in object storage, remained intact, but LucidLink clients could not access that data because they needed the metadata to determine which objects to read. LucidLink has re-enabled that access. #### Incident Timeline ##### Apr 29, 2024 * **12:55 UTC** Approximately 5,000 filespaces became unresponsive. * **13:05 UTC** The support team received the first ticket regarding the incident. * **17:00 UTC** We notified customers that many filespaces were unresponsive. * **17:16 UTC** We discovered that some metadata servers had corrupted disks. ##### Apr 30, 2024 * **13:13 UTC** We developed a program to automatically recover metadata servers from backups. * **15:00 UTC** We scaled the discovery service horizontally to run on multiple instances in order to accommodate the surge in traffic. * **18:00 UTC** We completed the provisioning of new metadata servers. * **19:30 UTC** The first affected filespace was restored. ##### May 1, 2024 * **00:10 UTC** We started the automated restoration of filespaces. * **02:55 UTC** The automated process restored 98% of affected filespaces. * **10:00 UTC** We started manual restoration of the remaining 2% of affected filespaces. * **12:06 UTC** All affected filespaces were back online. ## Additional Prevention and Next Steps We take the availability of our services extremely seriously. As a result of this outage, we are continuing our efforts and have ongoing measures to fortify our services further against future such attacks: * **Continued work with law enforcement:** we have notified the Federal Bureau of Investigation’s Internet Crime Complaint Center and are seeking their assistance. * **Continued work with third party forensic specialists:** upon service restoration, we have continued with a detailed examination and testing on the network, endpoints, and systems to both \(i\) help with root cause investigation and \(ii\) provide additional threat hunting capabilities to help validate the continued integrity of our environment. We are confident this course of action will further enhance our already robust existing controls. * **Additional security measures:** like any Saas platform in a constantly evolving universe of third-party threats and malicious attacks, there are always opportunities for security improvements in our product and environment. These efforts involve not only the deployment of even more robust credential management but also additional access controls and more comprehensive vulnerability scanning. * **Strengthen our security infrastructure:** \(i\) dedicate additional engineering resources on security-related projects; and \(ii\) scale our current organization and capabilities by implementing a security operations center for enhanced threat monitoring. ## Conclusion While we are proud that our zero-knowledge encryption model performed as intended and we have no indication that our customer data was compromised as a result of the temporary outage, the entire company has learned and grown from this experience. As a company made of both enterprise storage technologists and former content creators, our superpower has always been understanding the workflows and experiences of content creators. Due to this, we deeply felt the pain of our customers’ downtime, anxiety, and frustration. We remain: * Committed to ensuring that the security for our infrastructure remains appropriate and limiting the potential that another outage like this is experienced again. * Devoted to our customers and continuing with your trust in the system that has been a part of your everyday workflows. * Intent on providing ongoing and transparent communication regarding relevant findings and outage resolution. * Dedicated to supporting the talented creatives that have been in our DNA since the beginning.