PCs Backup software that can isolate backup destination to protect from Ransomware virus.
-
@scottalanmiller said in PCs Backup software that can isolate backup destination to protect from Ransomware virus.:
@crustachio said in PCs Backup software that can isolate backup destination to protect from Ransomware virus.:
@scottalanmiller If CryptoLocker exists that can manipulate the binaries of backup software, we're all !@&ed
I'm going out on a @Dashrender limb here (He knows what I mean) but I think we have to assume that this is either here, or right around the corner as a risk vector.
OK, I'll grant that. So what's your recommendation? You said earlier to put backup software on a machine in front of the NAS. Now what?
/devilsadvocate
-
@Dashrender said in PCs Backup software that can isolate backup destination to protect from Ransomware virus.:
@scottalanmiller said in PCs Backup software that can isolate backup destination to protect from Ransomware virus.:
@crustachio said in PCs Backup software that can isolate backup destination to protect from Ransomware virus.:
@scottalanmiller If CryptoLocker exists that can manipulate the binaries of backup software, we're all !@&ed
I'm going out on a @Dashrender limb here (He knows what I mean) but I think we have to assume that this is either here, or right around the corner as a risk vector.
LOL - for a min there I thought I missed a post you put up.
Yeah, the ability to break into the app and pull out those credentials will be a thing. Just like how virus can disable antivirus software.
LOL, yeah, I realized that I must be "projecting potential attack vectors rather than established ones".
-
You run a Veeam server. It connects to the computer in question, pulls the data off, and sends it to the NAS. Only the Veeam server has creds to talk to the NAS. As long as the Veeam server isn't infected, the NAS is safe.
The Veeam server should have really good creds, be behind a firewall that prevents all communication except that that is absolutely required.
-
@crustachio said in PCs Backup software that can isolate backup destination to protect from Ransomware virus.:
@scottalanmiller said in PCs Backup software that can isolate backup destination to protect from Ransomware virus.:
@crustachio said in PCs Backup software that can isolate backup destination to protect from Ransomware virus.:
@scottalanmiller If CryptoLocker exists that can manipulate the binaries of backup software, we're all !@&ed
I'm going out on a @Dashrender limb here (He knows what I mean) but I think we have to assume that this is either here, or right around the corner as a risk vector.
OK, I'll grant that. So what's your recommendation? You said earlier to put backup software on a machine in front of the NAS. Now what?
/devilsadvocate
It's an air gap, not quite as good as tape (physical air gap) but it is good.
PC -> Backup Machine -> Storage
The PC, no matter how compromised, has no permissions to the backup machine, the backup machine uses an agent or a pull method to get the data. Only the backup machine has access to the backup storage. The PC and the backup machine (server) share no credentials. So a compromise of the PC has no means of spreading to the Backup Machine.
This is different than a binary on the PC which must contain the push credentials for the backup storage and, if compromised, takes the storage with it.
-
Oh right right. Derp. I was assuming we were talking about getting a hack on the backup host, but right, if it's on a user PC or whatever then yes, that gap is valuable.
-
@scottalanmiller but this is not something that I will waste my time on. it is not any different than only buying hardware for now instead of for 5 years from now.
Yes this is an eventual attack vector, but it is not anything now.
-
@JaredBusch said in PCs Backup software that can isolate backup destination to protect from Ransomware virus.:
@scottalanmiller but this is not something that I will waste my time on. it is not any different than only buying hardware for now instead of for 5 years from now.
Yes this is an eventual attack vector, but it is not anything now.
I guess that I am only surprised that it is not a common vector already. But that's what I meant by the @Dashrender comment, he did the same thing to me last week and I said the same thing as you. I just realized that I was doing it here as well.
It's good to know that it could happen, good to know that no one is doing it yet and move on. So Veeam EP does not have any current attack vector like this? That's good to know, it's so obvious that I just assumed that it was being done regularly.
-
@scottalanmiller I imagine the hacker world operates like anything else: Don't work any harder than you have to. It appears the well of ransomware victimes is still deep and easily accessible, so why spend time actively exploiting what is, by comparison to the whole spectrum of ransomware victims, a niche case?
If and when the gravy train slows down for ransomware perpetrators, I imagine they'll get more vicious.
-
It's not a common infection vector today, and we have to ask ourselves why it's not.
Consider the following:
- how many machines are running local backup process that is really divorced from the logged on credentials?
- how many are running backups of local machines in the first place?
I don't backup any local machine in my office. All files are saved to a network location, that location is then backed up through an air gapped backup solution as mentioned by Scott.
Even if I was using a local client on the server to do backups, it's significantly more secure because the end user's infected machine shouldn't have an credentials that allow execution on the server.
-
@crustachio said in PCs Backup software that can isolate backup destination to protect from Ransomware virus.:
@scottalanmiller I imagine the hacker world operates like anything else: Don't work any harder than you have to. It appears the well of ransomware victimes is still deep and easily accessible, so why spend time actively exploiting what is, by comparison to the whole spectrum of ransomware victims, a niche case?
If and when the gravy train slows down for ransomware perpetrators, I imagine they'll get more vicious.
The evolution of cryptoware has been sky high. I don't suspect it will take that long before this avenue is attempted to be exploited.
-
@Dashrender said in PCs Backup software that can isolate backup destination to protect from Ransomware virus.:
@crustachio said in PCs Backup software that can isolate backup destination to protect from Ransomware virus.:
@scottalanmiller I imagine the hacker world operates like anything else: Don't work any harder than you have to. It appears the well of ransomware victimes is still deep and easily accessible, so why spend time actively exploiting what is, by comparison to the whole spectrum of ransomware victims, a niche case?
If and when the gravy train slows down for ransomware perpetrators, I imagine they'll get more vicious.
The evolution of cryptoware has been sky high. I don't suspect it will take that long before this avenue is attempted to be exploited.
It's gotta be coming soon.
-
@scottalanmiller said in PCs Backup software that can isolate backup destination to protect from Ransomware virus.:
@Dashrender said in PCs Backup software that can isolate backup destination to protect from Ransomware virus.:
@crustachio said in PCs Backup software that can isolate backup destination to protect from Ransomware virus.:
@scottalanmiller I imagine the hacker world operates like anything else: Don't work any harder than you have to. It appears the well of ransomware victimes is still deep and easily accessible, so why spend time actively exploiting what is, by comparison to the whole spectrum of ransomware victims, a niche case?
If and when the gravy train slows down for ransomware perpetrators, I imagine they'll get more vicious.
The evolution of cryptoware has been sky high. I don't suspect it will take that long before this avenue is attempted to be exploited.
It's gotta be coming soon.
I don't see this anything the same as buying hardware for 5 years down the line. The evolution of these crypto systems is nearly off the charts. If we are talking about it now, chances are the crypto writers thought of it months ago and area already working on it.
Moving to a gapped system for backup is really the wisest move. Sure it can have some costs - Veeam requires a Windows machine to run from (question - if you have SA or VDI for a Windows desktop license, would that be considered by those here as acceptable to run instead of Windows Server?)
If Veeam run on Linux it would be a much less costly solution - i.e. no Windows tax just to run it.
-
@scottalanmiller said in PCs Backup software that can isolate backup destination to protect from Ransomware virus.:
StorageCraft, Veeam, Unitrends, Datto... lots of options.
I see, most of them you mentioned seems to be for enterprise (we are smb), virtual (we have physical machines only), backup appliance included (which could be expensive than NAS) ?
-
@scottalanmiller said in PCs Backup software that can isolate backup destination to protect from Ransomware virus.:
@openit said in PCs Backup software that can isolate backup destination to protect from Ransomware virus.:
The backup destination will be NAS box and we got around 100 PCs.
You must have a backup server in place between the PCs and the NAS in order to have any protection against ransomware, otherwise the ransomware can attack the NAS directly using the same permissions as the backup mechanism on the PCs.
I have really no idea about backup server (as I been in smb). I was just thinking of central management (which is a piece of software to monitor and manage centrally), I am not sure if that's the same.
Is that appliances (local/on-premises) coming with backup plans like Unitrends etc is called Backup Server ?
Thanks
-
@openit said in PCs Backup software that can isolate backup destination to protect from Ransomware virus.:
@scottalanmiller said in PCs Backup software that can isolate backup destination to protect from Ransomware virus.:
StorageCraft, Veeam, Unitrends, Datto... lots of options.
I see, most of them you mentioned seems to be for enterprise (we are smb), virtual (we have physical machines only), backup appliance included (which could be expensive than NAS) ?
Unitrends, Datto and StorageCraft all focus on the SMB. All of those also focus on physical (agent.) Datto is the only one that is just an appliance. Veeam might focus on the enterprise but has free options for PCs.
I don't think that you looked into them very much None of them are virtual only, not a single one.
-
For desktop backups, you should look at AetherStore as well. Probably cheaper than a NAS, and better protection.
-
@scottalanmiller said in PCs Backup software that can isolate backup destination to protect from Ransomware virus.:
For desktop backups, you should look at AetherStore as well. Probably cheaper than a NAS, and better protection.
That new pricing come out yet?
-
@BRRABill said in PCs Backup software that can isolate backup destination to protect from Ransomware virus.:
@scottalanmiller said in PCs Backup software that can isolate backup destination to protect from Ransomware virus.:
For desktop backups, you should look at AetherStore as well. Probably cheaper than a NAS, and better protection.
That new pricing come out yet?
Not officially, but it's available I think @shannon can fill you in privately if you want to get up and running.
-
@crustachio said in PCs Backup software that can isolate backup destination to protect from Ransomware virus.:
@scottalanmiller said in PCs Backup software that can isolate backup destination to protect from Ransomware virus.:
@openit said in PCs Backup software that can isolate backup destination to protect from Ransomware virus.:
The backup destination will be NAS box and we got around 100 PCs.
You must have a backup server in place between the PCs and the NAS in order to have any protection against ransomware, otherwise the ransomware can attack the NAS directly using the same permissions as the backup mechanism on the PCs.
NAS snapshots could mitigate this risk. Just like Exablox advertises Continuous Data Protection (CDP) as a remedy to ransomware - you can go back to any snapshot in 10 second intervals out until your retention policy limit (file level or share level).
Even basic QNAP and Synology boxes offer scheduled snapshots. Not necessarily a replacement for an intermediate backup server, just an option to consider.
I know about this option on QNAP, but unfortunately we need to have another NAS box to configure it (the snapshot cannot be set to in that NAS itself or any External HDD). Not sure about other brands.
So double cost in this case.
-
@JaredBusch said in PCs Backup software that can isolate backup destination to protect from Ransomware virus.:
@scottalanmiller said in PCs Backup software that can isolate backup destination to protect from Ransomware virus.:
@crustachio said in PCs Backup software that can isolate backup destination to protect from Ransomware virus.:
Also, to the OP's question... isn't any backup software capabl;e
@openit said in PCs Backup software that can isolate backup destination to protect from Ransomware virus.:
- Software that can isolate backup destination to protect from ransom-ware so that PC got infected will not effect backup target.
Isn't any backup software capable of this? As long as your backup storage target has unique permissions that can't be mapped, browsed or written by any domain users, the software you choose is irrelevant.
How does software do that when it is running on the compromised machine?
Using veeam endpoint, I specify creds in the application. It does not connect to the nas with user creds.
Would be great if Veeam can help, but there is no central management with it, so difficult to manage around 100 pcs.