ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    "You don't just restore a server"

    IT Discussion
    8
    14
    1.7k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • bbigfordB
      bbigford
      last edited by

      Client gets infected with cryptoware, a surprising conversation went as follows:

      Person: "Please tell me $client has healthy backups."

      Me: "Yep. I receive health reports every day and mitigate issues as soon as I receive faults."

      Person: "Well they just got hit with cryptoware."

      Me: "Yikes. Time to break out the backups."

      Person: "Are you joking? You don't just immediately think to restore a server."

      Me: "Well that's why we have backups, and it's the only way to sanitize the server... What do you recommend?"

      Person: "Isolate the server and go through the logs. Clean it up, don't restore it."

      Me: "That doesn't make any sense... Clean WHAT up? The files are all encrypted."

      Person: "Have you even looked for a decryptor?"

      Me: "No... that wastes more time than just restoring for around the next hour."

      Person: "Seriously, do not restore servers as a go-to. That's just lazy."

      I'm lost here... I don't think I missed something. You get hit, you restore. Server crashes, you restore. That's why we have backups...

      DustinB3403D 1 Reply Last reply Reply Quote 6
      • coliverC
        coliver
        last edited by

        Is person the boss? Or a coworker?

        bbigfordB 1 Reply Last reply Reply Quote 0
        • bbigfordB
          bbigford @coliver
          last edited by

          @coliver said in "You don't just restore a server":

          Is person the boss? Or a coworker?

          Without airing dirty laundry... I'll just say they are in a technical, non-managerial role.

          coliverC GreyG ObsolesceO scottalanmillerS 4 Replies Last reply Reply Quote 0
          • coliverC
            coliver @bbigford
            last edited by

            @BBigford said in "You don't just restore a server":

            @coliver said in "You don't just restore a server":

            Is person the boss? Or a coworker?

            Without airing dirty laundry... I'll just say they are in a technical, non-managerial role.

            Then I would explain that restoring from backup is the least costly and most effective means of ensuring that the server is clean when you are done. Sanitizing and decryption leave you with a dirty server that you can't trust.

            There is a significant difference between being secure and being lazy.

            1 Reply Last reply Reply Quote 4
            • GreyG
              Grey @bbigford
              last edited by

              @BBigford said in "You don't just restore a server":

              @coliver said in "You don't just restore a server":

              Is person the boss? Or a coworker?

              Without airing dirty laundry... I'll just say they are in a technical, non-managerial role.

              https://media.licdn.com/mpr/mpr/shrinknp_200_200/p/7/005/06e/190/10c6129.jpg

              coliverC 1 Reply Last reply Reply Quote 1
              • coliverC
                coliver @Grey
                last edited by

                @Grey said in "You don't just restore a server":

                @BBigford said in "You don't just restore a server":

                @coliver said in "You don't just restore a server":

                Is person the boss? Or a coworker?

                Without airing dirty laundry... I'll just say they are in a technical, non-managerial role.

                https://media.licdn.com/mpr/mpr/shrinknp_200_200/p/7/005/06e/190/10c6129.jpg

                Oh god not the son of Dracula.

                1 Reply Last reply Reply Quote 1
                • DustinB3403D
                  DustinB3403 @bbigford
                  last edited by

                  @BBigford said in "You don't just restore a server":

                  You get hit, you restore. Server crashes, you restore. That's why we have backups...

                  More importantly waiting to restore can actually cause harm. Whoever is wanting to dig thru the server for logs and clean it up must be paid for overtime.

                  scottalanmillerS 1 Reply Last reply Reply Quote 3
                  • ObsolesceO
                    Obsolesce @bbigford
                    last edited by

                    @BBigford said in "You don't just restore a server":

                    @coliver said in "You don't just restore a server":

                    Is person the boss? Or a coworker?

                    Without airing dirty laundry... I'll just say they are in a technical, non-managerial role.

                    Maybe he washes off and reuses his toilet paper too?

                    1 Reply Last reply Reply Quote 5
                    • dbeatoD
                      dbeato
                      last edited by

                      Backups are the only reliable option to do this, if you have snapshots it is even better. You can backup all the bad (encrypted) files and then worry about what Ransomware infection is. Usually I do gather though all the information necessary related to the attack before restoring or wiping 🙂

                      ObsolesceO 1 Reply Last reply Reply Quote 1
                      • ObsolesceO
                        Obsolesce @dbeato
                        last edited by

                        @dbeato said in "You don't just restore a server":

                        Backups are the only reliable option to do this, if you have snapshots it is even better. You can backup all the bad (encrypted) files and then worry about what Ransomware infection is. Usually I do gather though all the information necessary related to the attack before restoring or wiping 🙂

                        Yes, the cause of infection is important. What if the infector is a client or admin PC somewhere in the company... you restore the server, and it just gets encrypted again. The source must be found first. Then bare-metal backup the infected server (to look at later)... and restore it from a clean backup.

                        1 Reply Last reply Reply Quote 2
                        • Mike DavisM
                          Mike Davis
                          last edited by

                          I would poke around it long enough to figure out if the server had been logged in to, or if a user's computer encrypted all the files. You don't want it coming right back. Like others said, figure out how it got infected and then restore back before the infection.

                          scottalanmillerS 1 Reply Last reply Reply Quote 2
                          • scottalanmillerS
                            scottalanmiller @bbigford
                            last edited by

                            @BBigford said in "You don't just restore a server":

                            @coliver said in "You don't just restore a server":

                            Is person the boss? Or a coworker?

                            Without airing dirty laundry... I'll just say they are in a technical, non-managerial role.

                            And will stay that way. I would guess.

                            1 Reply Last reply Reply Quote 0
                            • scottalanmillerS
                              scottalanmiller @DustinB3403
                              last edited by

                              @DustinB3403 said in "You don't just restore a server":

                              @BBigford said in "You don't just restore a server":

                              You get hit, you restore. Server crashes, you restore. That's why we have backups...

                              More importantly waiting to restore can actually cause harm. Whoever is wanting to dig thru the server for logs and clean it up must be paid for overtime.

                              Right. Actively creating risk and downtown so that they can "play tech" as if they were at Best Buy.

                              1 Reply Last reply Reply Quote 3
                              • scottalanmillerS
                                scottalanmiller @Mike Davis
                                last edited by

                                @Mike-Davis said in "You don't just restore a server":

                                I would poke around it long enough to figure out if the server had been logged in to, or if a user's computer encrypted all the files. You don't want it coming right back. Like others said, figure out how it got infected and then restore back before the infection.

                                If you want to do that, in 95% of cases, take a fresh backup, isolate it and do that offline in a forensics lab after you deal with getting production back. Just leaving it alive could result in more data leaving the environment.

                                1 Reply Last reply Reply Quote 3
                                • 1 / 1
                                • First post
                                  Last post