{
	"id": "9da77444-bf17-4110-8ddf-a50048ca592a",
	"created_at": "2026-04-06T02:11:06.965873Z",
	"updated_at": "2026-04-10T03:21:44.184415Z",
	"deleted_at": null,
	"sha1_hash": "873eefb031fb655faa84d085457acc7ec2060e88",
	"title": "Hacker Puts Hosting Service Code Spaces Out of Business",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 33625,
	"plain_text": "Hacker Puts Hosting Service Code Spaces Out of Business\r\nBy Michael Mimoso\r\nPublished: 2014-06-18 · Archived: 2026-04-06 01:59:38 UTC\r\nCloud-based code-hosting service Code Spaces announced today it was going out of business after a hacker\r\ndeleted most of its machines, customer data and backups.\r\nCode Spaces, a code-hosting and software collaboration platform, has been put out of business by an attacker who\r\ndeleted the company’s data and backups.\r\nOfficials wrote a lengthy explanation and apology on the company’s website, promising to spend its current\r\nresources helping customers recover whatever data may be left.\r\n“Code Spaces will not be able to operate beyond this point, the cost of resolving this issue to date and the\r\nexpected cost of refunding customers who have been left without the service they paid for will put Code Spaces in\r\nan irreversible position both financially and in terms of ongoing credibility,” read the note. “As such at this point\r\nin time we have no alternative but to cease trading and concentrate on supporting our affected customers in\r\nexporting any remaining data they have left with us.”\r\nThe beginning of the end was a DDoS attack initiated yesterday that was accompanied by an intrusion into Code\r\nSpaces’ Amazon EC2 control panel. Extortion demands were left for Code Spaces officials, along with a Hotmail\r\naddress they were supposed to use to contact the attackers.\r\n“Upon realization that somebody had access to our control panel, we started to investigate how access had been\r\ngained and what access that person had to the data in our systems,” Code Spaces said. “It became clear that so far\r\nno machine access had been achieved due to the intruder not having our private keys.”\r\nCode Spaces said it changed its EC2 passwords, but quickly discovered the attacker had created backup logins,\r\nand once recovery attempts were noticed, the attacker began deleting artifacts from the panel.\r\n“We finally managed to get our panel access back, but not before he had removed all EBS snapshots, S3 buckets,\r\nall AMI’s, some EBS instances and several machine instances,” Code Spaces said. “In summary, most of our data,\r\nbackups, machine configurations and offsite backups were either partially or completely deleted.”\r\n“In summary, most of our data, backups, machine configurations and offsite backups were either partially or\r\ncompletely deleted.”\r\nAmazon Web Services customers are responsible for credential management. Amazon, however, has built-in\r\nsupport for two-factor authentication that can be used with AWS accounts and accounts managed by the AWS\r\nIdentity and Access Management tool. AWS IAM enables control over user access, including individual\r\ncredentials, role separation and least privilege.\r\nhttps://threatpost.com/hacker-puts-hosting-service-code-spaces-out-of-business/106761/\r\nPage 1 of 2\n\nWithin 12 hours, Code Spaces went from a viable business to devastation. The company reported that all of its svn\r\nrepositories—backups and snapshots—were deleted. All EBS volumes containing database files were also deleted.\r\nA few old svn nodes and one git node were left untouched, the company said.\r\nA cache of Code Spaces services includes promises of full redundancy and that code is duplicated and distributed\r\namong data centers on three continents.\r\n“Backing up data is one thing, but it is meaningless without a recovery plan, not only that a recovery plan – and\r\none that is well-practiced and proven to work time and time again,” Code Spaces said. “Code Spaces has a full\r\nrecovery plan that has been proven to work and is, in fact, practiced.”\r\nSource: https://threatpost.com/hacker-puts-hosting-service-code-spaces-out-of-business/106761/\r\nhttps://threatpost.com/hacker-puts-hosting-service-code-spaces-out-of-business/106761/\r\nPage 2 of 2",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"MITRE"
	],
	"references": [
		"https://threatpost.com/hacker-puts-hosting-service-code-spaces-out-of-business/106761/"
	],
	"report_names": [
		"106761"
	],
	"threat_actors": [],
	"ts_created_at": 1775441466,
	"ts_updated_at": 1775791304,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/873eefb031fb655faa84d085457acc7ec2060e88.pdf",
		"text": "https://archive.orkl.eu/873eefb031fb655faa84d085457acc7ec2060e88.txt",
		"img": "https://archive.orkl.eu/873eefb031fb655faa84d085457acc7ec2060e88.jpg"
	}
}