• Nightwatch Admin@feddit.nl
    link
    fedilink
    English
    arrow-up
    29
    ·
    1 year ago

    Nice, another bunch of assholes out of business. Just one question: why the fk did they not have backups? They weren’t just wee little hateful bastards but stoopid on top too?

    • Unforeseen@lemmy.world
      link
      fedilink
      English
      arrow-up
      16
      ·
      1 year ago

      As someone who deals with this sort of thing, for ransomware and other destructive intrusions, the first thing they go for is the backups themselves.

      Companies that have an second backup copy that is seperate somehow so non-lateral movement isn’t possible are the ones that survive this level of breach.

      • 50gp@kbin.social
        link
        fedilink
        arrow-up
        4
        ·
        1 year ago

        well they dealt in malware, perhaps they wanted the evidence to be easy to delete in case law enforcement decided to visit

      • Nightwatch Admin@feddit.nl
        link
        fedilink
        English
        arrow-up
        1
        ·
        1 year ago

        I go for stupid &cheap, most people think backups is when onedrive and Microsoft reinforces that insane idea with popups).

      • 1984@lemmy.today
        link
        fedilink
        English
        arrow-up
        2
        arrow-down
        1
        ·
        edit-2
        1 year ago

        Often the server needs access to make backups, so when you get in and get root, you also have access to delete the backups.

        It’s hard to protect against stuff like that if the hacker becomes root.

        • evatronic@lemm.ee
          link
          fedilink
          English
          arrow-up
          4
          ·
          1 year ago

          Part of a good backup solution involves ensuring that it’s literally impossible for the “root” / “administrator” whatever user on the production system to delete the backups. For instance, were this AWS, it would be done by creating a separate AWS account and use IAM roles to provide access to a S3 bucket with the “DeleteObject” permission explicitly denied. Perhaps, even deny everything except something like PutObject, and ensure the target S3 bucket is versioned, so even overwriting the contents with garbage is recovered by restoring a previous version.

          But most businesses don’t think like that.

          • 1984@lemmy.today
            link
            fedilink
            English
            arrow-up
            1
            arrow-down
            1
            ·
            1 year ago

            Yup. I work as a devops guy with aws and that’s what I do. But I’ve seen a lot of enterprises having no clue about these things.