ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    Backup File Server to DAS

    Scheduled Pinned Locked Moved IT Discussion
    dasstoragebackupfile server
    497 Posts 13 Posters 373.6k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • J
      Jason Banned @IT-ADMIN
      last edited by

      @IT-ADMIN said:

      at least in our case, may other companies have data that can be sold maybe ?

      Well, yeah. Many companies get hourly attempted attacks just for such a thing.

      1 Reply Last reply Reply Quote 0
      • DustinB3403D
        DustinB3403 @Jason
        last edited by

        @Jason said:

        @IT-ADMIN said:

        because even the ransom will not benefit form the data itself, his concern is wining money

        Not necessarily true.

        Jason the ransom demand maker generally isn't trying to sell trade secrets, they might get lucky and encrypt someone with this kind of information.

        But they aren't copying the data. They're simply encrypting it locally, and passing the decryption key to their server(s).

        So it is true... the ransomers' are not profiting from the data, only from the ransom.

        J scottalanmillerS 2 Replies Last reply Reply Quote 0
        • J
          Jason Banned @DustinB3403
          last edited by Jason

          @DustinB3403 said:

          Jason the ransom demand maker generally isn't trying to sell trade secrets, they might get lucky and encrypt someone with this kind of information.

          But they aren't copying the data. They're simply encrypting it locally, and passing the decryption key to their server(s).

          So it is true... the ransomers' are not profiting from the data, only from the ransom.

          That's not true in every case.. some have been found to upload the data.

          1 Reply Last reply Reply Quote 0
          • DustinB3403D
            DustinB3403
            last edited by

            I've yet to see a Cryptoware variant that exports data off of a victims system.

            Please name 1.

            This malware needs to act quickly. It doesn't have time to dick around and upload potentially TB or more of data to encrypt it.

            Just stop trolling, because you clearly are.

            J scottalanmillerS 2 Replies Last reply Reply Quote -1
            • scottalanmillerS
              scottalanmiller @IT-ADMIN
              last edited by

              @IT-ADMIN said:

              @Jason said:

              @IT-ADMIN said:

              because even the ransom will not benefit form the data itself, his concern is wining money

              Not necessarily true.

              at least in our case, may other companies have data that can be sold maybe ?

              No financial data? Nothing private that the company would not want divulged? No customer data?

              1 Reply Last reply Reply Quote 1
              • IT-ADMINI
                IT-ADMIN
                last edited by

                OK, can a restore point decrypte the ransomed data ??

                scottalanmillerS 1 Reply Last reply Reply Quote 0
                • scottalanmillerS
                  scottalanmiller @DustinB3403
                  last edited by

                  @DustinB3403 said:

                  @Jason said:

                  @IT-ADMIN said:

                  because even the ransom will not benefit form the data itself, his concern is wining money

                  Not necessarily true.

                  Jason the ransom demand maker generally isn't trying to sell trade secrets, they might get lucky and encrypt someone with this kind of information.

                  But they aren't copying the data. They're simply encrypting it locally, and passing the decryption key to their server(s).

                  So it is true... the ransomers' are not profiting from the data, only from the ransom.

                  That is generally true but not universally.

                  1 Reply Last reply Reply Quote 0
                  • J
                    Jason Banned @DustinB3403
                    last edited by

                    @DustinB3403 said:

                    I've yet to see a Cryptoware variant that exports data off of a victims system.

                    Please name 1.

                    This malware needs to act quickly. It doesn't have time to dick around and upload potentially TB or more of data to encrypt it.

                    Just stop trolling, because you clearly are.

                    Yes, I'm trolling when we have a IT forenstics team that looks into our attempted attacks. We know what goes on with these, we've looked into it heavily.

                    1 Reply Last reply Reply Quote 0
                    • scottalanmillerS
                      scottalanmiller @IT-ADMIN
                      last edited by

                      @IT-ADMIN said:

                      OK, can a restore point decrypte the ransomed data ??

                      Not decrypt! Nothing can decrypt except the key that you get when you pay the ransom.

                      If you roll back to BEFORE the data was encrypted AND the restore point itself was not encrypted then you are okay.

                      IT-ADMINI 1 Reply Last reply Reply Quote 0
                      • scottalanmillerS
                        scottalanmiller @DustinB3403
                        last edited by

                        @DustinB3403 said:

                        This malware needs to act quickly. It doesn't have time to dick around and upload potentially TB or more of data to encrypt it.

                        Thats not true. It needs to encrypt quickly. Once encrypted it has free time to upload all that it can.

                        1 Reply Last reply Reply Quote 0
                        • IT-ADMINI
                          IT-ADMIN @scottalanmiller
                          last edited by

                          @scottalanmiller said:

                          @IT-ADMIN said:

                          OK, can a restore point decrypte the ransomed data ??

                          Not decrypt! Nothing can decrypt except the key that you get when you pay the ransom.

                          If you roll back to BEFORE the data was encrypted AND the restore point itself was not encrypted then you are okay.

                          for this reason it is very recommended to store your system images in another physical storage not on the same machine

                          J scottalanmillerS 2 Replies Last reply Reply Quote 0
                          • J
                            Jason Banned @IT-ADMIN
                            last edited by Jason

                            @IT-ADMIN said:

                            @scottalanmiller said:

                            @IT-ADMIN said:

                            OK, can a restore point decrypte the ransomed data ??

                            Not decrypt! Nothing can decrypt except the key that you get when you pay the ransom.

                            If you roll back to BEFORE the data was encrypted AND the restore point itself was not encrypted then you are okay.

                            for this reason it is very recommended to store your system images in another physical storage not on the same machine

                            Not just that but preferably with a system that can lock it as read-only once it's backed up. Which is great for audits as well.

                            scottalanmillerS 1 Reply Last reply Reply Quote 0
                            • scottalanmillerS
                              scottalanmiller @IT-ADMIN
                              last edited by

                              @IT-ADMIN said:

                              @scottalanmiller said:

                              @IT-ADMIN said:

                              OK, can a restore point decrypte the ransomed data ??

                              Not decrypt! Nothing can decrypt except the key that you get when you pay the ransom.

                              If you roll back to BEFORE the data was encrypted AND the restore point itself was not encrypted then you are okay.

                              for this reason it is very recommended to store your system images in another physical storage not on the same machine

                              Correct, but it would need to be one that is decoupled, which is very difficult to do.

                              1 Reply Last reply Reply Quote 0
                              • scottalanmillerS
                                scottalanmiller @Jason
                                last edited by

                                @Jason said:

                                @IT-ADMIN said:

                                @scottalanmiller said:

                                @IT-ADMIN said:

                                OK, can a restore point decrypte the ransomed data ??

                                Not decrypt! Nothing can decrypt except the key that you get when you pay the ransom.

                                If you roll back to BEFORE the data was encrypted AND the restore point itself was not encrypted then you are okay.

                                for this reason it is very recommended to store your system images in another physical storage not on the same machine

                                Not just that but preferably with a system that can lock it as read-only once it's backed up. Which is great for audits as well.

                                Decoupled or locked, as Jason points out. It needs to be read only or it will get ransomed too.

                                1 Reply Last reply Reply Quote 0
                                • IT-ADMINI
                                  IT-ADMIN
                                  last edited by

                                  i guess setting up an account on the backup destination so that veeam authenticate against will make the backup decoupled

                                  scottalanmillerS 1 Reply Last reply Reply Quote 0
                                  • scottalanmillerS
                                    scottalanmiller @IT-ADMIN
                                    last edited by

                                    @IT-ADMIN said:

                                    i guess setting up an account on the backup destination so that veeam authenticate against will make the backup decoupled

                                    No, if ANYTHING running on your server can talk to the storage, it is not decoupled. That is tightly coupled. Things like Unitrends appliances stand BETWEEN your systems and the backup storage. That's lightly decoupled. Tapes are fully decoupled.

                                    1 Reply Last reply Reply Quote 0
                                    • StrongBadS
                                      StrongBad
                                      last edited by

                                      I have heard that a lot of the ransoms are on the low side. Under $1000. Which is a lot of money, but not crippling. Generally a no brainer to a business.

                                      1 Reply Last reply Reply Quote 0
                                      • J
                                        Jason Banned
                                        last edited by

                                        Many look into Dell Appassure for backups. I don't think you pay for windows though so not sure you would for this.

                                        scottalanmillerS 1 Reply Last reply Reply Quote 0
                                        • scottalanmillerS
                                          scottalanmiller @Jason
                                          last edited by

                                          @Jason said:

                                          Many look into Dell Appassure for backups. I don't think you pay for windows though so not sure you would for this.

                                          That's going to be an issue. Everything that does decoupled backups is going to be non-free or require virtualization at least.

                                          DashrenderD 1 Reply Last reply Reply Quote 0
                                          • DashrenderD
                                            Dashrender @scottalanmiller
                                            last edited by

                                            @scottalanmiller said:

                                            @Jason said:

                                            Many look into Dell Appassure for backups. I don't think you pay for windows though so not sure you would for this.

                                            That's going to be an issue. Everything that does decoupled backups is going to be non-free or require virtualization at least.

                                            What about Veeam End Point Protection?

                                            coliverC scottalanmillerS 2 Replies Last reply Reply Quote 0
                                            • 1
                                            • 2
                                            • 18
                                            • 19
                                            • 20
                                            • 21
                                            • 22
                                            • 23
                                            • 24
                                            • 25
                                            • 20 / 25
                                            • First post
                                              Last post