Started By
Message

re: We were hacked today - Ransomware

Posted on 11/20/18 at 9:18 am to
Posted by tigerpawl
Can't get there from here.
Member since Dec 2003
22290 posts
Posted on 11/20/18 at 9:18 am to
quote:

which luckily about a year ago we spent a small fortune on our backup solution.
$49 for a backup app; $149 8TB External Hard Drive. Peace of Mind: $$Priceless.
Posted by Trauma14
Member since Aug 2010
5810 posts
Posted on 11/20/18 at 9:19 am to
$7k upfront cost + $600/mo for 12 months = $14,200

VS.

$11k ransom

Hmmm?
Posted by RebelWithACause
Jackson
Member since Nov 2010
1269 posts
Posted on 11/20/18 at 9:25 am to
quote:

Your IT company should be fired immediately for not using bitlocker and app locker. They are free MS apps and easy to manage


BitLocker isn't going to help prevent this. Haven't used App Locker not sure about that one.
Posted by jmarto1
Houma, LA/ Las Vegas, NV
Member since Mar 2008
33934 posts
Posted on 11/20/18 at 9:28 am to
I'd go nuts if I was held ransom like that. We have a contracted company and I back up certain folders every night. Thankfully I have only needed it for dumbass employees
Posted by jcole4lsu
The Kwisatz Haderach
Member since Nov 2007
30922 posts
Posted on 11/20/18 at 9:50 am to
quote:

$49 for a backup app; $149 8TB External Hard Drive. Peace of Mind: $$Priceless.

Unless you are unplugging that USB external device after the backup, you haven't protected a fricking thing. These ransomware attacks gain elevated privilege and encrypt EVERYTHING it has write access to.

There is a whole lot of ignorance going on in this thread.
Posted by Tigeralum2008
Yankees Fan
Member since Apr 2012
17134 posts
Posted on 11/20/18 at 10:18 am to
quote:

I'm not familiar with AppLocker, but Bitlocker is only going to protect drives that are locked (at rest), though the whole Secure Boot apparatus protects against root kits and tampering with boot files. BitLocker's not going to help if someone downloads a program that proceeds to do its own encryption of their Bitlocker-encrypted files on an unlocked volume.


Agreed. I mentioned Bitlocker in my post because it goes along with Applocker in my basic security setup for all client devices. It's the initial 1-2 punch for us

Applocker essentially prevents non-admin users from running any .exe files unless that file is on a whitelist.
This post was edited on 11/20/18 at 10:31 am
Posted by WikiTiger
Member since Sep 2007
41055 posts
Posted on 11/20/18 at 10:18 am to
nm
This post was edited on 5/21/20 at 2:29 pm
Posted by philabuck
NE Ohio
Member since Sep 2008
10379 posts
Posted on 11/20/18 at 10:22 am to
If people are dragging and dropping their files onto a USB device, sure. Would be fine if the backup is encrypted.

About ten years ago we moved to centralized storage for all domain PCs. Makes backups much easier to maintain since nothing is stored on the client.
Posted by Tigeralum2008
Yankees Fan
Member since Apr 2012
17134 posts
Posted on 11/20/18 at 10:30 am to
quote:

What is going to happen to that employee? If they aren't fired then you are doing your company a great disservice. One of the biggest issues I have seen in IT is that negligent users rarely suffer any consequences, and without consequences then this stuff will continue to happen.


We hold regular trainings and incentivize our users to report phishing attempts. I make sure to have IT security briefly mentioned in nearly every staff meeting. Real world examples often have the desired effect of bringing ITSEC to the front of their minds

Posted by Spock's Eyebrow
Member since May 2012
12300 posts
Posted on 11/20/18 at 10:31 am to
quote:

If people are dragging and dropping their files onto a USB device, sure. Would be fine if the backup is encrypted


If you can write to a drive, it’s at risk. I’m not sure people are understanding that encryption doesn’t mitigate this.
Posted by Weekend Warrior79
Member since Aug 2014
16370 posts
Posted on 11/20/18 at 10:57 am to
I know you were joking, but there are no guarantees that they will give you back everything once they have the $11k, and no guarantees that they won't target you again.
Posted by StraightCashHomey21
Aberdeen,NC
Member since Jul 2009
125410 posts
Posted on 11/20/18 at 12:58 pm to
quote:

$7k upfront cost + $600/mo for 12 months = $14,200 VS. $11k ransom Hmmm?


I'm sure what the hackers had access too was worth more than 11k as well the lost productivity with the network down.
Posted by gmrkr5
NC
Member since Jul 2009
14891 posts
Posted on 11/20/18 at 2:29 pm to
quote:

There is a whole lot of ignorance going on in this thread.
Posted by Bard
Definitely NOT an admin
Member since Oct 2008
51586 posts
Posted on 11/20/18 at 3:47 pm to
quote:

For home, I use Macrium Reflect. All my PCs get backed up to a NAS.


+1

I haven't used their pay version but the freebie does exactly what I need in making a quick clone of my hard drive.

It also has a scheduling feature that will automatically clear out old images after a specified amount of time.
Posted by CHiPs25
ATL
Member since Apr 2014
2897 posts
Posted on 11/20/18 at 7:47 pm to
quote:

Like you, we did not back up individual machines, which sucked when we had to bring everything back up, but we learned from our mistakes and now backup everything.


We will be doing something on the individual machines moving forward. We had to reset 8 machines today and lost some pretty important data that will be hard to recreate.

quote:

I even backup files from our CNC machine that I'll likely never need again, but you never know.


Our CNC files are stored on our domain server. There is nothing locally backed up so our DATTO box automatically backs the domain up every 15 min.

Posted by diat150
Louisiana
Member since Jun 2005
43537 posts
Posted on 11/20/18 at 9:46 pm to
quote:

know you were joking, but there are no guarantees that they will give you back everything once they have the $11k, and no guarantees that they won't target you again.




No guarantees but if they.dont give it back then as they do this more and more it turns into a situation where nobody will pay them.
Posted by Tiger Vision
Mandeville
Member since Jan 2005
3705 posts
Posted on 11/20/18 at 11:12 pm to
You need a spam/email filter that scans messages, attachments and sandboxes embedded urls. Also run non-persistent VDI for dumbass employees desktops. Use Microsoft known folders/One drive to store their personal data in the cloud. Run VM's for all your servers and snapshot the VM's and replicate your storage off-site. Since all of the desktops and servers are virtual in this scenario run an av/Anti-Malware tool at the hypervisor/host layer.
Posted by bigblake
Member since Jun 2011
2502 posts
Posted on 11/21/18 at 7:48 am to
(no message)
This post was edited on 3/7/19 at 2:03 pm
Posted by diat150
Louisiana
Member since Jun 2005
43537 posts
Posted on 11/21/18 at 11:43 am to
what is everyones thoughts on cloudberry as a backup solution and protection against ransomware?
Posted by td1
Baton Rouge
Member since Oct 2015
2835 posts
Posted on 11/21/18 at 12:24 pm to
1. Next Gen Firewall with Services (Malware, ATP, Virus, Web Filter etc.) We like Barracuda.
2. Spam Filter with comparable services. We like Barracuda
2. Backup solution with 30 min backups of files, and good dedup. We like Rapid Recovery.
3. Client and Server AV with email/internet protection. We like AVG (Avast now).
4. Segregation of server duties between several machines. ie. separate AD server, file server, etc.
5. File server shares segregated by groups and write permissions only as needed.
6. Image for desktops.
7. Proper security on AD accounts.
8. User training.
9. Locking down desktops to only allow users to have enough access to do their job.
10. Keep everything patched.

We got hit one time years ago. Damage was restricted to the users profile (redirected folders on the file server) and that departments file share. Infected machine was reimaged, the users profile was restored on the server, and the departments file share was restored on the server. Total downtime 45 min total for the user, about 20 for that department as a whole.
first pageprev pagePage 2 of 3Next pagelast page

Back to top
logoFollow TigerDroppings for LSU Football News
Follow us on Twitter, Facebook and Instagram to get the latest updates on LSU Football and Recruiting.

FacebookTwitterInstagram