- My Forums
- Tiger Rant
- LSU Recruiting
- SEC Rant
- Saints Talk
- Pelicans Talk
- More Sports Board
- Coaching Changes
- Fantasy Sports
- Golf Board
- Soccer Board
- O-T Lounge
- Tech Board
- Home/Garden Board
- Outdoor Board
- Health/Fitness Board
- Movie/TV Board
- Book Board
- Music Board
- Political Talk
- Money Talk
- Fark Board
- Gaming Board
- Travel Board
- Food/Drink Board
- Ticket Exchange
- TD Help Board
Customize My Forums- View All Forums
- Show Left Links
- Topic Sort Options
- Trending Topics
- Recent Topics
- Active Topics
Started By
Message
re: How to Protect against Ransomware?
Posted on 6/21/15 at 2:21 pm to austintigerdad
Posted on 6/21/15 at 2:21 pm to austintigerdad
quote:
ETA: Not sure if this is a troll, or just ignorant
Considering information security is how I put food on the table, I can assure you it is not the later. You don't need to waste your time explaining to me how malicious email is a legitimate attack vector.
There is no such thing as "ransomware resistant backups". Make frequent full backups on portable media and disconnect it when not in use. That's your best bet, promise
Posted on 6/21/15 at 5:45 pm to gmrkr5
quote:
You have no clue what your talking about.
What exactly did he post that's incorrect?
While it's not an everyday occurrence, malware does sometimes show up on legitimate websites via ad poisoning.
Keeping a strong backup plan is extremely important as a defense against these types of threats.
quote:
There is no such thing as "ransomware resistant backups". Make frequent full backups on portable media and disconnect it when not in use. That's your best bet, promise
A disconnected backup is a "ransomware resistant backup." Just because he doesn't know how to word his question doesn't mean he's an idiot. He has perfectly legitimate questions and he's asking for help, no reason for you to be an a-hole about it.
This post was edited on 6/21/15 at 5:47 pm
Posted on 6/22/15 at 6:55 am to Jim Rockford
quote:
Wrong.
Lulz..Did you go all weekend thinking you had something on the tech board...
A minimum of two of us in this thread, get paid to do security for multi-national corporations
Posted on 6/22/15 at 9:13 am to GrammarKnotsi
OK, so it looks like the consensus answer is:
1. Subscribe to a Cloud based, automated backup service that keeps past versions of changed files, and / or
2. Buy a few removable storage devices (like external drives or large USB flash drives), rotate the media and make manual backups on a regular basis, and then disconnect the media until the next backup.
1. Subscribe to a Cloud based, automated backup service that keeps past versions of changed files, and / or
2. Buy a few removable storage devices (like external drives or large USB flash drives), rotate the media and make manual backups on a regular basis, and then disconnect the media until the next backup.
Posted on 6/22/15 at 9:24 am to austintigerdad
quote:
Subscribe to a Cloud based, automated backup service that keeps past versions of changed files, and / or
The only issue I see with this, and possibly any solution at all, is once you have an intrusion like this, if you don't notice it, you could back it up and ruin everything you thought you had....
I've always been against running a restore to previous point for this reason...
Posted on 6/22/15 at 9:48 am to GrammarKnotsi
quote:
...automated backup service that keeps past versions of changed files
quote:
The only issue I see with this, and possibly any solution at all, is once you have an intrusion like this, if you don't notice it, you could back it up and ruin everything you thought you had....
I just did a test recovery of a few 18 month old versions of files from our SOS Online Backup subscription.
This service keeps a surprisingly long archive of changed files. Therefore I suspect that it offers decent protection.
Posted on 6/22/15 at 9:52 am to austintigerdad
quote:
This service keeps a surprisingly long archive of changed files.
One uploaded ransomware file, could encrypt your entire backup...
Posted on 6/22/15 at 10:02 am to austintigerdad
The built-in Windows backup utility formats an external drive so that it does not automatically mount and map a drive letter to it. It also does a system image backup with incrementals. I've used it countless times to restore a system that's had all it's file encrypted.
Posted on 6/22/15 at 10:12 am to austintigerdad
quote:
2. Buy a few removable storage devices (like external drives or large USB flash drives), rotate the media and make manual backups on a regular basis, and then disconnect the media until the next backup.
I've been doing this for years, with one set of hard drives kept off site. As I have quite a lot of unchanging data, I also periodically compare file contents when I rotate the sets and have a hash database to determine the good file should there ever be a discrepancy. The drives are only ever powered on for backup purposes.
Thinking about ransomware, the bright red LEDs on my USB3 dual dock would alert me to unexpected activity, but the full file comparisons take many hours, which would give malware an opportunity. Back when I was using TrueCrypt, I could have mounted the drives as readonly, but I don't know offhand if that's possible with BitLocker, or Windows in general for that matter. I guess I could use Sysinternals Process Monitor and filter on writes to the backup drives, but offhand I have no idea if they're able to block that sort of monitoring.
Posted on 6/22/15 at 10:21 am to GrammarKnotsi
quote:
One uploaded ransomware file, could encrypt your entire backup...
The SOS online backup service doesn't provide API access to files in the archive.
Therefore I believe that once a clean file is archived, it's unlikely to be damaged by ransomware unless the SOS server itself gets infected.
Posted on 6/22/15 at 10:39 am to GrammarKnotsi
quote:I'm not sure I follow you here. Isn't it typical for online backup services that keep versioned copies to store them read-only? Otherwise, what is the point of keeping versions if the files can be changed?
One uploaded ransomware file, could encrypt your entire backup...
Posted on 6/22/15 at 10:42 am to Rhio
quote:
I hope that no one in this topic was stupid enough to seriously pay someone to get their files back.
Well when you're about to loose a high end client who you have been working with for a year designing their house due to a ransomeware attack, I would try and pay $1,000 in hopes you get a couple files back including the one you are about to make 20K on but lost.
We had this happen to us when an intern took it upon himself to hook up and old computer that still had a map to our server. He said he watched a couple deer hunting videos then the screen went red and a timer popped up. By the time he told me, a day later, it was to late. It had attached itself thru out our servers and nearly wiped out everything.
frick this ransomewere!!!
Popular
Back to top

0










