Threat Actor Play Deemed Responsible
Early speculation was the incident resulted from the ProxyNotShell exploit. But in an incident update the San Antonio, Texas-based Rackspace said that a forensic analysis determined that the threat actor, known as Play, used a previously unknown security exploit to gain initial access to the Rackspace Hosted Exchange email environment.At the time, Rackspace said the event “may result in a loss of revenue for the Hosted Exchange business, which generates approximately $30 million of annual revenue.” The hack came at a difficult time for the company, which has posted a string of quarterly losses and seen its stock price drop by 80% in the past year. While Microsoft had disclosed the exploit and patched it in November 2022, it did not include notes for being part of a Remote Code Execution chain that was exploitable, Rackspace said.“We have been diligent about this forensic investigation and prioritizing accuracy and precision in everything we say and do, because our credibility is important to us at Rackspace,” the company said.
“We have already communicated our findings to these customers proactively, and importantly, according to CrowdStrike, there is no evidence that the threat actor actually viewed, obtained, misused or disseminated any of the 27 Hosted Exchange customers’ emails or data in the PSTs in any way,” said Rackspace.
What's Next for Rackspace?
The company’s hosted Exchange service will not be rebuilt as a service offering. Prior to the incident, Rackspace planned to migrate the Hosted Exchange email environment to Microsoft 365 because it has a better pricing model, the public cloud provider said.Rackspace explained that its forensic analysis marks the final update to its status page:“Our customer support teams will continue to work directly with customers to make their data available for download and remain on standby for any additional customer questions."