Started By
Message

re: How to Protect against Ransomware?

Posted on 6/21/15 at 2:21 pm to
Posted by gmrkr5
NC
Member since Jul 2009
15101 posts
Posted on 6/21/15 at 2:21 pm to
quote:


ETA: Not sure if this is a troll, or just ignorant


Considering information security is how I put food on the table, I can assure you it is not the later. You don't need to waste your time explaining to me how malicious email is a legitimate attack vector.

There is no such thing as "ransomware resistant backups". Make frequent full backups on portable media and disconnect it when not in use. That's your best bet, promise
Posted by efrad
Member since Nov 2007
18702 posts
Posted on 6/21/15 at 5:45 pm to
quote:

You have no clue what your talking about.



What exactly did he post that's incorrect?

While it's not an everyday occurrence, malware does sometimes show up on legitimate websites via ad poisoning.

Keeping a strong backup plan is extremely important as a defense against these types of threats.

quote:

There is no such thing as "ransomware resistant backups". Make frequent full backups on portable media and disconnect it when not in use. That's your best bet, promise



A disconnected backup is a "ransomware resistant backup." Just because he doesn't know how to word his question doesn't mean he's an idiot. He has perfectly legitimate questions and he's asking for help, no reason for you to be an a-hole about it.
This post was edited on 6/21/15 at 5:47 pm
Posted by GrammarKnotsi
Member since Feb 2013
10078 posts
Posted on 6/22/15 at 6:55 am to
quote:

Wrong.



Lulz..Did you go all weekend thinking you had something on the tech board...

A minimum of two of us in this thread, get paid to do security for multi-national corporations
Posted by austintigerdad
Llano County, TX
Member since Nov 2010
1884 posts
Posted on 6/22/15 at 9:13 am to
OK, so it looks like the consensus answer is:

1. Subscribe to a Cloud based, automated backup service that keeps past versions of changed files, and / or

2. Buy a few removable storage devices (like external drives or large USB flash drives), rotate the media and make manual backups on a regular basis, and then disconnect the media until the next backup.

Posted by GrammarKnotsi
Member since Feb 2013
10078 posts
Posted on 6/22/15 at 9:24 am to
quote:

Subscribe to a Cloud based, automated backup service that keeps past versions of changed files, and / or


The only issue I see with this, and possibly any solution at all, is once you have an intrusion like this, if you don't notice it, you could back it up and ruin everything you thought you had....

I've always been against running a restore to previous point for this reason...
Posted by austintigerdad
Llano County, TX
Member since Nov 2010
1884 posts
Posted on 6/22/15 at 9:48 am to
quote:

...automated backup service that keeps past versions of changed files
quote:

The only issue I see with this, and possibly any solution at all, is once you have an intrusion like this, if you don't notice it, you could back it up and ruin everything you thought you had....

I just did a test recovery of a few 18 month old versions of files from our SOS Online Backup subscription.

This service keeps a surprisingly long archive of changed files. Therefore I suspect that it offers decent protection.
Posted by GrammarKnotsi
Member since Feb 2013
10078 posts
Posted on 6/22/15 at 9:52 am to
quote:

This service keeps a surprisingly long archive of changed files.


One uploaded ransomware file, could encrypt your entire backup...

Posted by Casty McBoozer
your mom's fat arse
Member since Sep 2005
35497 posts
Posted on 6/22/15 at 10:02 am to
The built-in Windows backup utility formats an external drive so that it does not automatically mount and map a drive letter to it. It also does a system image backup with incrementals. I've used it countless times to restore a system that's had all it's file encrypted.
Posted by Spock's Eyebrow
Member since May 2012
12300 posts
Posted on 6/22/15 at 10:12 am to
quote:

2. Buy a few removable storage devices (like external drives or large USB flash drives), rotate the media and make manual backups on a regular basis, and then disconnect the media until the next backup.


I've been doing this for years, with one set of hard drives kept off site. As I have quite a lot of unchanging data, I also periodically compare file contents when I rotate the sets and have a hash database to determine the good file should there ever be a discrepancy. The drives are only ever powered on for backup purposes.

Thinking about ransomware, the bright red LEDs on my USB3 dual dock would alert me to unexpected activity, but the full file comparisons take many hours, which would give malware an opportunity. Back when I was using TrueCrypt, I could have mounted the drives as readonly, but I don't know offhand if that's possible with BitLocker, or Windows in general for that matter. I guess I could use Sysinternals Process Monitor and filter on writes to the backup drives, but offhand I have no idea if they're able to block that sort of monitoring.
Posted by austintigerdad
Llano County, TX
Member since Nov 2010
1884 posts
Posted on 6/22/15 at 10:21 am to
quote:

One uploaded ransomware file, could encrypt your entire backup...

The SOS online backup service doesn't provide API access to files in the archive.

Therefore I believe that once a clean file is archived, it's unlikely to be damaged by ransomware unless the SOS server itself gets infected.

Posted by Korkstand
Member since Nov 2003
29049 posts
Posted on 6/22/15 at 10:39 am to
quote:

One uploaded ransomware file, could encrypt your entire backup...
I'm not sure I follow you here. Isn't it typical for online backup services that keep versioned copies to store them read-only? Otherwise, what is the point of keeping versions if the files can be changed?
Posted by 4WHLN
Drinking at the Cottage Inn
Member since Mar 2013
7629 posts
Posted on 6/22/15 at 10:42 am to
quote:

I hope that no one in this topic was stupid enough to seriously pay someone to get their files back.


Well when you're about to loose a high end client who you have been working with for a year designing their house due to a ransomeware attack, I would try and pay $1,000 in hopes you get a couple files back including the one you are about to make 20K on but lost.
We had this happen to us when an intern took it upon himself to hook up and old computer that still had a map to our server. He said he watched a couple deer hunting videos then the screen went red and a timer popped up. By the time he told me, a day later, it was to late. It had attached itself thru out our servers and nearly wiped out everything.


frick this ransomewere!!!
first pageprev pagePage 2 of 2Next pagelast page
refresh

Back to top
logoFollow TigerDroppings for LSU Football News
Follow us on X, Facebook and Instagram to get the latest updates on LSU Football and Recruiting.

FacebookXInstagram