Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
3 Keys to Reducing the Threat of Ransomware
Newest First  |  Oldest First  |  Threaded View
REISEN1955
REISEN1955,
User Rank: Ninja
2/6/2019 | 9:40:27 AM
Re: RECOVER PLAN? HAHA
Update - in most data center environments, a "simple" backup and restore plan cannot exist.  The process of making it as simple as practicable is important and TESTING is most important.  My former manager at Aon was part of a test with Girl Scouts of America (of all things) at the IBM STERLING FOREST NY location.  9 hours to rebuild the infrastructure through backup restoration and ALL documented.  Now that was fine, but at the end IBM also wanted their servers restored, so that took more time.  Second, CATALOG backups for each day are necessary with offsite storage too.  Give me three tier backup storage and that is  a good plan.  I survived ransomware for my FAR smaller accounts because I had good plans in place.
Joe Stanganelli
Joe Stanganelli,
User Rank: Ninja
10/29/2018 | 9:20:34 PM
User training
To speak more to the point of user training... It's not enough to have the training; it also has to be effective.

The best solutions often tend to be rooted in training users/employees in good cyber hygiene for their personal lives and demonstrating how it's personally beneficial to them -- and then it's just that much more natural and that much easier to get them to extend that into their at-work lives.
Joe Stanganelli
Joe Stanganelli,
User Rank: Ninja
10/29/2018 | 9:18:42 PM
Re: RECOVER PLAN? HAHA
@REISEN: Of course, it's not enough to just have a backup anymore. We've even seen scenarios where entities paid the ransom even though backups existed because the ransom was less than the cost of restoring from backups.
Dr.T
Dr.T,
User Rank: Ninja
10/29/2018 | 8:08:20 PM
Backups
Backups are generally not the solution for ransomware unless a good strategy is followed and old data is not overwritten. For example, moving into a table and not using that tape for a while is important.
Dr.T
Dr.T,
User Rank: Ninja
10/29/2018 | 8:04:48 PM
Re: RECOVER PLAN? HAHA
“ONE SIMPLE BACKUP SOLUTION would have solved that, right?” I hear you, backup does not mean anything unless we can restore it.
Dr.T
Dr.T,
User Rank: Ninja
10/29/2018 | 8:03:19 PM
Re: RECOVER PLAN? HAHA
“IT cannot do everything when disaser strikes and a constantly updated PLAN for rebuild, for backups, ” Unless they use proper tools to do these in an efficient ways. There are tools available for us to fail over DR site without so much effort.
Dr.T
Dr.T,
User Rank: Ninja
10/29/2018 | 8:01:42 PM
Re: RECOVER PLAN? HAHA
“Most firms THINK they have one - those guys in IT will know how to rebuild 37 servers and 402 workstations without a plan or documentation, right? ” I hear you, there has to be somebody who can understand security implications.
Dr.T
Dr.T,
User Rank: Ninja
10/29/2018 | 8:00:21 PM
Good options
All good options. They are not for only ransomware but for overall security of the business.
REISEN1955
REISEN1955,
User Rank: Ninja
10/29/2018 | 1:09:13 PM
Re: RECOVER PLAN? HAHA
And I hate posting here - the response type is soooooooooooooooooooooo tiny. LOL
REISEN1955
REISEN1955,
User Rank: Ninja
10/26/2018 | 3:28:55 PM
RECOVER PLAN? HAHA
Most firms THINK they have one - those guys in IT will know how to rebuild 37 servers and 402 workstations without a plan or documentation, right?  That is what they get paid for, right?   Only they undersand it so we can let them do their thing when disaster strikes. HAHA big JOKE.  Nope, IT cannot do everything when disaser strikes and a constantly updated PLAN for rebuild, for backups, for restoration of damn near anything and everything HAS to exist.  Often they do NOT and rebuild EVERYTHING is a poor joke.  A waste of time and effort.  Atlanta lost EVERY SINGLE POLICE DASHCAM VIDEO.   Throwing hundreds of cases off the books in court.  ONE SIMPLE BACKUP SOLUTION would have solved that, right?    BUT FIRMS don't think they need one because only those guys in IT would understand it and, again, they can restore everything without a plan at 2:30 am.  (I had plans when I was consulting, tested because at 2:30 am I AM NOT THINKING STRAIGHT.  WHO IS?)

 

Stupidity rules.   Ignorance rules.  Blindness rules. 


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The 10 Most Impactful Types of Vulnerabilities for Enterprises Today
Managing system vulnerabilities is one of the old est - and most frustrating - security challenges that enterprise defenders face. Every software application and hardware device ships with intrinsic flaws - flaws that, if critical enough, attackers can exploit from anywhere in the world. It's crucial that defenders take stock of what areas of the tech stack have the most emerging, and critical, vulnerabilities they must manage. It's not just zero day vulnerabilities. Consider that CISA's Known Exploited Vulnerabilities (KEV) catalog lists vulnerabilitlies in widely used applications that are "actively exploited," and most of them are flaws that were discovered several years ago and have been fixed. There are also emerging vulnerabilities in 5G networks, cloud infrastructure, Edge applications, and firmwares to consider.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2023-1142
PUBLISHED: 2023-03-27
In Delta Electronics InfraSuite Device Master versions prior to 1.0.5, an attacker could use URL decoding to retrieve system files, credentials, and bypass authentication resulting in privilege escalation.
CVE-2023-1143
PUBLISHED: 2023-03-27
In Delta Electronics InfraSuite Device Master versions prior to 1.0.5, an attacker could use Lua scripts, which could allow an attacker to remotely execute arbitrary code.
CVE-2023-1144
PUBLISHED: 2023-03-27
Delta Electronics InfraSuite Device Master versions prior to 1.0.5 contains an improper access control vulnerability in which an attacker can use the Device-Gateway service and bypass authorization, which could result in privilege escalation.
CVE-2023-1145
PUBLISHED: 2023-03-27
Delta Electronics InfraSuite Device Master versions prior to 1.0.5 are affected by a deserialization vulnerability targeting the Device-DataCollect service, which could allow deserialization of requests prior to authentication, resulting in remote code execution.
CVE-2023-1655
PUBLISHED: 2023-03-27
Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.4.0.