Hacker Newsnew | past | comments | ask | show | jobs | submitlogin
Ask HN: Ransomware preparedness how difficult is it?
3 points by ThinkBeat on Sept 5, 2021 | hide | past | favorite | 2 comments
Right off my knowledge of current enterprise sysadmin stuff it quite out of date. Looking forward to learning :)

What is RW? -- My understanding it is a form of malware that encrypts your data and the only way to unlock it is to pay a ransom.

The newer version attempts to extracts sensitive files prior to encryption, so there will be a double threat.

Not only is your data encrypted and unavailable, it is also in the hands of nefarious criminals who could publish the files or do something else evil with the files.

Mitigation --

I dont know much about the extraction of files, I will leave that alone.

Firewalls, endpoint protection, active analysis of data streams for unusual activities. I presume this is done and done correctly.

Would backup save you? ..

I am not sure of current practice, so this may be too old.

A company should have a solid, maintained, well funded and staffed backup strategy that is tested often to ensure it works.

Then they have a backup system of the backup system off site entirely locked down.

All files on fileservers are backup incrementally every 10 mins (or whatever) as a continuous cycle.

Fileservers databases, mailservers, another data silos are backup up in the same way.

No end users PCs and extremely few in total have any access to the backup system.

All PCs, servers, etc run premade images (is Ghost still a thing?).

When shit hits the fan --- a) Destroy all data from the past 30 mins / 1 hour, restore.

b) Destroy all data from the past 30 mins / 1 hour. Reformat all computers, via standard images, restore backup.

c) Destroy all data from the past 30 mins / 1 hour. Keep a set of pristine unused brand new computers in easy to reach storage. Format using images, restore data from before the files got encrypted,

Unplug and junk existing PCs.

-

It seems to me that if a company has a well working backup strategy and executions then downtime for a ransomware attack can be timeboxed. If it needs done faster, then invest more into the system to make it happen.

Maybe the reserve computers are already imaged as needed, and those images are updated at the same time as the production PCs (end user for instance).

Perhaps there are many datastores these days that are hard to backup?

If that is the case, it might be a good reason not to use them?

I am sure I am missing a lot and I look forward to learning more

If the company has a solid, maintained, backup of files and data they can shut everything down, reformat the computers and servers, restore



Thanks, I'm interested in this too.

I have seen talk about the issue of your restore image containing unpatched (or even zero day) vulnerabilities. So you need to worry about your restored systems quickly becoming compromised again.

Also that your backups should be pulled to an independent backup system instead of pushed so the compromised machine can't potentially ruin your backups. (Then you would need to wait longer for your off site backup to restore your backup.)

If you can't audit that it was simply a successful phishing attempt and you just need to revoke keys and passwords. I suppose a super expensive solution would be to use multiple operating systems and software platforms so you have a chance to get yourself back up and running on a different environment with different vulnerabilities that aren't being presently being attacked?

I'm excited to hear from someone who sounds like a professional.

I suppose this is really a more general question of how do I prevent remote code execution? Traffic analysis probably has to be done on an independent gateway? I assume that's hard in a large network vs botnet... Block Tor ips from any ports except your application/web ports? Because I'd like to support the good guys on Tor...


Thank you for responding.

Yes, the "front line" barriers of firewalls and traffic analysis and a lot of things I surely do not know much about. I have experience with that but more than a decade ago.

My question was more directed towards after the breach.

How do you recover.

You made an excellent point that restoring from an image that contains the samle vulnerabilities that allowed the attack in the first place is not a great idea.

I guess the first step is triage to figure how it got in and what it was. Then needed updates can be applied to the images prior to roll out.

It think all companies now need to presume they will be victims of ransomware at some point.

As I heard someone say at DefCon, there are those who have been hacked and know, there are those who have been hacked and dont know and there are the people who will be hacked in the future.

It will happen. (a pessimistic but I think realistic view)

After I wrote the post, I thought about a place I was working maybe 25 years ago. Iffy on the years. This was a law enforcement at the federal level. They had a WORM robot. It would continuously (or some such) store incoming data / created data to a disc (sort of like a cd/dvd but a lot more storage per disc. Given that you could write once, there was no way (or none I heard of) to corrupt data. It would of course also write post ransomware encrypted data, but the originals would be safe.

It could also fetch discs a from its library automatically to restore data at a specified time in the past.

I am thinking that such a system would not be able to keep up with the volume of data today.

Streamer tapes are still around and have decent storage capacity at the high end. Back in the day, the drill was to back up to tape, and then rotate the tapes. 5 tapes.

you could just get new tapes and have a good system. They also have robots that do that. Or at least used to have.

The good old days :)

I am hoping to learn from guys a lot smarter than me, who have experience.




Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: