this post was submitted on 05 Aug 2023
364 points (98.4% liked)

Technology

58011 readers
4380 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
 
you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 41 points 1 year ago* (last edited 1 year ago) (3 children)

As someone who deals with this sort of thing, for ransomware and other destructive intrusions, the first thing they go for is the backups themselves.

Companies that have an second backup copy that is seperate somehow so non-lateral movement isn't possible are the ones that survive this level of breach.

Or they could just be stupid (cheap) and didn't have any lol

[–] [email protected] 13 points 1 year ago (1 children)

well they dealt in malware, perhaps they wanted the evidence to be easy to delete in case law enforcement decided to visit

[–] [email protected] 5 points 1 year ago

oh_shit_burn_it_all.sh

[–] [email protected] 4 points 1 year ago* (last edited 1 year ago) (1 children)

Often the server needs access to make backups, so when you get in and get root, you sometimes also have access to delete the backups.

It depends on how it's set up. If the server pushes the backups somewhere else and has write access, then the hacker can delete them. But if another account logs in to the server and makes a backup and downloads it, it's impossible for the hacker to access the backup.

Depends on if you planned for the scenario or not.

[–] [email protected] 8 points 1 year ago (1 children)

Part of a good backup solution involves ensuring that it's literally impossible for the "root" / "administrator" whatever user on the production system to delete the backups. For instance, were this AWS, it would be done by creating a separate AWS account and use IAM roles to provide access to a S3 bucket with the "DeleteObject" permission explicitly denied. Perhaps, even deny everything except something like PutObject, and ensure the target S3 bucket is versioned, so even overwriting the contents with garbage is recovered by restoring a previous version.

But most businesses don't think like that.

[–] [email protected] 3 points 1 year ago

Yup. I work as a devops guy with aws and that's what I do. But I've seen a lot of enterprises having no clue about these things.

[–] [email protected] 3 points 1 year ago

I go for stupid &cheap, most people think backups is when onedrive and Microsoft reinforces that insane idea with popups).