Warning: databreach recycled server(s) from @VPSSLIM - Page 2
New on LowEndTalk? Please Register and read our Community Rules.

All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.

Warning: databreach recycled server(s) from @VPSSLIM

2»

Comments

  • @reimuoao said:
    Whether it's a company-issued laptop or a bare metal server, my immediate priority is to configure the system with LUKS full-disk encryption. I do this to prevent what happened to OP.

    Very true.

    Another case for why FDE matters even if it may seem pointless at first. The provider is usually expected to wipe the drives after the service is cancelled, but there is no way of verifying they were erased properly. Here, it could be a mistake but if the OP did not report it, who knows what could happen with the data of previous customers...
    It would not be possible if the disk was encrypted from the start, since no sensitive plaintext data would be present on it.

    The other scenario I also thought about recently is that newer NVMe drives go to read-only mode if drive detects unrecoverable failure. In some cases that could mean the data is actually not erasable since the drive blocks any write attempts.

  • emghemgh Member, Megathread Squad

    @oloke said:

    Very true.

    Another case for why FDE matters even if it may seem pointless at first. The provider is usually expected to wipe the drives after the service is cancelled, but there is no way of verifying they were erased properly. Here, it could be a mistake but if the OP did not report it, who knows what could happen with the data of previous customers...
    It would not be possible if the disk was encrypted from the start, since no sensitive plaintext data would be present on it.

    The other scenario I also thought about recently is that newer NVMe drives go to read-only mode if drive detects unrecoverable failure. In some cases that could mean the data is actually not erasable since the drive blocks any write attempts.

    I mean yeah, but if you just use providers you trust this isn’t an actual issue.

    For example, I highly doubt OVH or even some smaller providers like @tentor would miss stuff like this.

  • @itsTomHarper said:
    Looks like the previous customer didn't care about their data security. Usually before I cancel a server I reboot to rescue mode and shred all the drives with multiple passes to ensure all my sensitive data is gone, be it a VM or a dedi.

    Good advice. But what if the server goes down as result of hardwarefailure? Then you have no chance shredding your data and wiping disks is left to the mercy of the provider.
    I highly assume previous customer bought server from provider, server broke, customer got other server or refund, old server fixed by provider, disks in the same state before breakdown and sold to new customer, following the salesthread from provider and the problems buyers ran into.

  • @reimuoao said:
    Whether it's a company-issued laptop or a bare metal server, my immediate priority is to configure the system with LUKS full-disk encryption. I do this to prevent what happened to OP.

    That's the best approach. Admittedly I am lazy about this, so I skip this part most of the time, depending on the provider. For example I trust Hetzner to properly clean up the drives both physical and logical.

    Thanked by 1oloke
  • AdvinAdvin Member, Host Rep

    @vitobotta said:

    That's the best approach. Admittedly I am lazy about this, so I skip this part most of the time, depending on the provider. For example I trust Hetzner to properly clean up the drives both physical and logical.

    For what it's worth, Hetzner gave me a KVM to a completely random server that wasn't mine one time.

  • @Advin said:

    For what it's worth, Hetzner gave me a KVM to a completely random server that wasn't mine one time.

    I don't understand, can you elaborate?

  • MikeAMikeA Member, Patron Provider

    @Advin said:

    For what it's worth, Hetzner gave me a KVM to a completely random server that wasn't mine one time.

    More than just Hetzner...

    Thanked by 1oloke
  • AdvinAdvin Member, Host Rep
    edited November 22

    @vitobotta said:

    I don't understand, can you elaborate?

    I requested a KVM for my dedicated server at Hetzner.

    Instead of getting a KVM that was attached to my server, I received a KVM that was attached to some random server that was running Windows. I did not have any servers running Windows.

    I brought it to their attention and they corrected it.

    If I was malicious, I could have mounted an ISO, booted it to rescue, and retrieved the data through the KVM. However, I am not malicious. Full disk encryption would stop this.

    Thanked by 2oloke borkedascii
  • @Advin said:

    I requested a KVM for my dedicated server at Hetzner.

    Instead of getting a KVM that was attached to my server, I received a KVM that was attached to some random server that was running Windows. I did not have any servers running Windows.

    I brought it to their attention and they corrected it.

    If I was malicious, I could have mounted an ISO, booted it to rescue, and retrieved the data through the KVM. However, I am not malicious. Full disk encryption would stop this.

    Ouch, I see. How long ago was that out of curiosity? I guess I need to be less lazy from now on....

  • AdvinAdvin Member, Host Rep

    @vitobotta said:

    Ouch, I see. How long ago was that out of curiosity? I guess I need to be less lazy from now on....

    July 2023. It was a while ago, but just be aware that these types of things can happen at any provider. People can and will make mistakes, especially with manual processes like mounting KVMs.

    If you are hosting anything sensitive at all, you should do FDE.

  • @Advin said:

    July 2023. It was a while ago, but just be aware that these types of things can happen at any provider. People can and will make mistakes, especially with manual processes like mounting KVMs.

    If you are hosting anything sensitive at all, you should do FDE.

    I do it on the most important ones, for example the server I use for Nextcloud, Immich and Gitea, since all my documents, photos and source code are stored there. But for example I forgot to do it with the mail server.... so I need to fix that especially after reading this.

  • yoursunnyyoursunny Member, IPv6 Advocate

    @davide said:
    Tangentially related, I've found lots of sex videos in used phones, laptops bought on ebay ;)

    Buy our camera.
    Juicy stuff may be inside.

    https://www.ebay.com/itm/226931340841

  • SaragoldfarbSaragoldfarb Member, Megathread Squad

    Not surprised at all.

  • JohnFilch123JohnFilch123 Member
    edited November 22

    It does matter, yes but if you have a VPS with constant reboots...this might be a headache since you will have to regularly unlock it, otherwise it will not boot.

    Thanked by 1oloke
  • @emgh said:

    I mean yeah, but if you just use providers you trust this isn’t an actual issue.

    For example, I highly doubt OVH or even some smaller providers like @tentor would miss stuff like this.

    You both right!

    Thanked by 1emgh
  • ZyraZyra Member
    edited November 22

    @yoursunny said: Buy our camera.

    glws

  • jndjnd Member

    I always reinstall first so I don't know if I ever got server with some existing data on it. But way too often there are reverse IP records still attached which should be also deleted.

    Thanked by 1yoursunny
  • mandalamandala Member, Megathread Squad
    edited 1:48AM

    @JohnFilch123 said:

    It does matter, yes but if you have a VPS with constant reboots...this might be a headache since you will have to regularly unlock it, otherwise it will not boot.

    The other day I had this question and thought of a remote server that sends unlock key to encrypted clients. Apparently this kind of key management is key escrow, but there's one better called network-bound disk encryption.

  • edited 2:51AM

    @PinHead said:
    August 6 I ordered a dedi from this thread https://lowendtalk.com/discussion/208212/estonia-the-netherlands-1gbps-unmetered-10gbps-dedicated-server-deals-instant-setup/p1
    Took a while to get it running, but that's for another review.
    But: server went down on october 12th. Motherboard/ ram issues.
    After a downtime of almost 1.5 month(!!!) last thursday they managed to provide a replacementserver with username and password.
    Tried to login, password/username didn't work. Via rescuemode I managed to get my sshkeys on the dedi, rebooted and logged in.
    But guess what? Data from a previous customer was on it. Authorized_keys, logfiles, history, users home directories, settings, all was there including some juicy stuff from history command.

    The 'last' command gives entries from august 8.

    Check for example the dates from Nginx (which I didn't install, but Nginx still was running from previous customer) logfiles dating back to Aug 9, while HostSlim provided me the server 3 days ago.

    It's hilarious what some people out there do and especially not do. I literally used a provider a couple of months ago that exposed their own backups of internal VMs to customer VMs with the same VMID. Happened to 3 VMs of mine from them.

  • JasonMJasonM Member

    sad you didn't find the stored porn. Had this server from the Charityhost you could have enjoyed some private time. wink wink. ;)

    Thanked by 1DeadlyChemist
  • @vitobotta said:
    Utterly ridiculous but not entirely surprising considering LET prices. I always wipe out everything when I let go of a server just in case.

    the problem is not the let prices, the problem is VPSSLIM!

  • @Advin said:

    July 2023. It was a while ago, but just be aware that these types of things can happen at any provider. People can and will make mistakes, especially with manual processes like mounting KVMs.

    If you are hosting anything sensitive at all, you should do FDE.

    can happen, maybe. but at vpsslim, bullshit is the core business.

  • gbzret4dgbzret4d Member

    @davide said:
    Tangentially related, I've found lots of sex videos in used phones, laptops bought on ebay ;)

    Share it as a proof

  • rustelekomrustelekom Member, Patron Provider

    This is, of course, unacceptable. But sometimes automated procedures may not work properly, so I guess the provider needs to check what happened in this particular case. Usually, not only is the format required, but also wiping at least 10% of the disk space.

  • the double taxation issue with vpsslim remained unresolved for over a year, even though the topic was brought up repeatedly. it simply does not appear to be a reputable provider, but rather a fly-by-night operation.

  • defaultdefault Veteran

    This provider is not recommended! Backup data fast!

    Black Friday is less than a week away - this is a perfect opportunity to find another provider.

    Thanked by 1hyperblast
  • xvpsxvps Member
    edited 2:21PM

    Legal documents: HostSlim B.V. (NL)
    Contact page: HostSlim OÜ (EE)
    Source:
    https://www.hostslim.eu/documents/termsofservice.pdf
    https://www.hostslim.eu/about

    Taxable turnover: 10,921 EUR (over 5–6 months), yet they claim to have 20,000 customers on their website. :#

    🚩🚩🚩

    The legal person HostSlim OÜ (17023991) has not submitted tax declarations as at 23.11.2025.

    source: https://ariregister.rik.ee/eng/company/17023991/HostSlim-OÜ?search_id=af5580d&pos=1

    It’s starting to smell like a deadpool.

    Thanked by 1hyperblast
  • VPSSLIMVPSSLIM Patron Provider, Veteran
    edited 3:34PM

    @PinHead said:
    August 6 I ordered a dedi from this thread https://lowendtalk.com/discussion/208212/estonia-the-netherlands-1gbps-unmetered-10gbps-dedicated-server-deals-instant-setup/p1
    Took a while to get it running, but that's for another review.
    But: server went down on october 12th. Motherboard/ ram issues.
    After a downtime of almost 1.5 month(!!!) last thursday they managed to provide a replacementserver with username and password.
    Tried to login, password/username didn't work. Via rescuemode I managed to get my sshkeys on the dedi, rebooted and logged in.
    But guess what? Data from a previous customer was on it. Authorized_keys, logfiles, history, users home directories, settings, all was there including some juicy stuff from history command.

    The 'last' command gives entries from august 8.

    Check for example the dates from Nginx (which I didn't install, but Nginx still was running from previous customer) logfiles dating back to Aug 9, while HostSlim provided me the server 3 days ago.

    -rw-r----- 1 www-data adm  6322 Nov 22 16:32 access.log
    > -rw-r----- 1 www-data adm 99895 Nov 20 11:07 access.log.1
    > -rw-r----- 1 www-data adm 14803 Nov 11 23:59 access.log.10.gz
    > -rw-r----- 1 www-data adm 13973 Nov 10 23:59 access.log.11.gz
    > -rw-r----- 1 www-data adm 17299 Nov  9 23:59 access.log.12.gz
    > -rw-r----- 1 www-data adm 14869 Nov  8 23:59 access.log.13.gz
    > -rw-r----- 1 www-data adm 17293 Nov  7 23:59 access.log.14.gz
    > -rw-r----- 1 www-data adm 13969 Nov 19 23:59 access.log.2.gz
    > -rw-r----- 1 www-data adm 16028 Nov 18 23:59 access.log.3.gz
    > -rw-r----- 1 www-data adm 19981 Nov 17 23:59 access.log.4.gz
    > -rw-r----- 1 www-data adm 12363 Nov 16 23:59 access.log.5.gz
    > -rw-r----- 1 www-data adm 13933 Nov 15 23:59 access.log.6.gz
    > -rw-r----- 1 www-data adm 14959 Nov 14 23:59 access.log.7.gz
    > -rw-r----- 1 www-data adm 14495 Nov 13 23:59 access.log.8.gz
    > -rw-r----- 1 www-data adm 17869 Nov 12 23:59 access.log.9.gz
    > -rw-r----- 1 www-data adm     0 Oct 19 00:00 error.log
    > -rw-r----- 1 www-data adm   204 Oct 18 22:52 error.log.1
    > -rw-r----- 1 www-data adm  2020 Oct 10 21:01 error.log.2.gz
    > -rw-r----- 1 www-data adm   236 Oct  2 06:56 error.log.3.gz
    > -rw-r----- 1 www-data adm 25055 Sep 30 18:09 error.log.4.gz
    > -rw-r----- 1 www-data adm   172 Sep 20 19:52 error.log.5.gz
    > -rw-r----- 1 www-data adm    96 Aug 27 06:26 error.log.6.gz
    > -rw-r----- 1 www-data adm   172 Aug 21 10:01 error.log.7.gz
    > -rw-r----- 1 www-data adm    93 Aug  9 00:33 error.log.8.gz
    > 

    Authorized_keys from previous customer, hostnames anonymized

    ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIB9Yq64RJaqmYvgrJgfQF+oNNvPGr7XtE5a2olo1SV+c root@xxxxxxxxxx
    > ssh-rsa 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 root@xxxxxxxxxx
    > ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIE7U1PwzED4c+VNCN5ki/5OZFZt8D6Kz7hE6qnysvnpX root@xxxxxxxxxx
    > ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIB4umrpIkM82TIsta6DvYQitWYz1BtwglyGvz29ZXGJ8 root@xxxxxxxxxx

    So it looks like Hostslim @VPSSLIM doesn't care about customers data and server(s) which are recycled carry the data from previous customers, which is a huge security/ privacy issue.
    Be aware if you're hosting stuff with Hostslim @VPSSLIM

    BTW, server is from the 193.3.189.xxx iprange, Estonia location.

    If the previous user is active on LET and reading this, I'll erase the disk asap.

    We would like to clarify a few important points regarding this situation. First of all, we would have greatly appreciated it if you had contacted us immediately after noticing something was wrong. You did not open a ticket at any point about this issue, nor did you reply to our last ticket where we provided explanations and requested feedback. If you had reached out, we would have resolved this for you right away.

    After conducting an internal investigation, we found that the older Supermicro motherboard used in this server had an incorrect BIOS configuration. Prior to handing this hardware to the previous user, the BIOS was configured correctly. That previous customer did not renew their service and left invoices unpaid, which caused the server to enter our termination cycle. During that cycle, the server should automatically wipe all disks.

    To double-check, we tested this process in our environment on another server with the exact same setup, and the disk wipe worked as intended. We then corrected the BIOS configuration on your server, ran a wipe again, and it completed successfully. Your system now has a clean, fresh installation since yesterday.

    We have also carried out a thorough investigation across all other systems and can confirm that no other servers are affected by this issue.

    We are very sorry this situation gave a very bad impression and I want to make clear this is an isolated incident and something we can learn from.

    Additionally, it’s important to mention that you purchased a very low-cost deal (128GB RAM with an E5 CPU for €24 per month). Despite that, we went the extra mile and provided you with an additional free month due to earlier issues with your other server. This is precisely why we would have appreciated if you had reached out to us first through a support ticket instead of making this public post without giving us the opportunity to assist you.

Sign In or Register to comment.