VITecNet@programming.dev to Technology@lemmy.worldEnglish · 8 months agoRansomware attackers are increasingly targeting backups — so make sure yours are protectedwww.techradar.comexternal-linkmessage-square23fedilinkarrow-up1181arrow-down16
arrow-up1175arrow-down1external-linkRansomware attackers are increasingly targeting backups — so make sure yours are protectedwww.techradar.comVITecNet@programming.dev to Technology@lemmy.worldEnglish · 8 months agomessage-square23fedilink
minus-squarepotatopotato@sh.itjust.workslinkfedilinkEnglisharrow-up8arrow-down1·8 months agoWhat methods are they using to locate the backups?
minus-squarepotatopotato@sh.itjust.workslinkfedilinkEnglisharrow-up1·8 months agoI mean, usually you don’t keep them on prem on the same machine. I’m curious if there are any tricky ways to find and destroy backups on other services/servers and how they’re pivoting into those other systems quickly enough to destroy them
minus-squareOrbituary@lemmy.worldlinkfedilinkEnglisharrow-up3arrow-down8·8 months agoNaming convention. Internal DNS. If you’re asking this, you are woefully unprepared. If you’re unprepared, you need someone to help.
What methods are they using to locate the backups?
find -name "*backup*"
I mean, usually you don’t keep them on prem on the same machine. I’m curious if there are any tricky ways to find and destroy backups on other services/servers and how they’re pivoting into those other systems quickly enough to destroy them
Naming convention. Internal DNS. If you’re asking this, you are woefully unprepared. If you’re unprepared, you need someone to help.