VITecNet@programming.dev to Technology@lemmy.worldEnglish · 1 year agoRansomware attackers are increasingly targeting backups — so make sure yours are protectedwww.techradar.comexternal-linkmessage-square22fedilinkarrow-up1190arrow-down17
arrow-up1183arrow-down1external-linkRansomware attackers are increasingly targeting backups — so make sure yours are protectedwww.techradar.comVITecNet@programming.dev to Technology@lemmy.worldEnglish · 1 year agomessage-square22fedilink
minus-squarepotatopotatolinkfedilinkEnglisharrow-up9arrow-down1·1 year agoWhat methods are they using to locate the backups?
minus-squarepotatopotatolinkfedilinkEnglisharrow-up1·1 year agoI mean, usually you don’t keep them on prem on the same machine. I’m curious if there are any tricky ways to find and destroy backups on other services/servers and how they’re pivoting into those other systems quickly enough to destroy them
minus-squareOrbituary@lemmy.worldlinkfedilinkEnglisharrow-up2arrow-down9·1 year agoNaming convention. Internal DNS. If you’re asking this, you are woefully unprepared. If you’re unprepared, you need someone to help.
What methods are they using to locate the backups?
find -name "*backup*"
I mean, usually you don’t keep them on prem on the same machine. I’m curious if there are any tricky ways to find and destroy backups on other services/servers and how they’re pivoting into those other systems quickly enough to destroy them
Naming convention. Internal DNS. If you’re asking this, you are woefully unprepared. If you’re unprepared, you need someone to help.