[Info-vax] OpenVMS x64 Atom project
Simon Clubley
clubley at remove_me.eisner.decus.org-Earth.UFP
Thu Jun 3 13:31:38 EDT 2021
On 2021-06-03, Stephen Hoffman <seaohveh at hoffmanlabs.invalid> wrote:
> On 2021-06-03 04:09:27 +0000, Dave Froble said:
>
>> I must observe that at this time, ransomware is a rather good friend to
>> VMS. Caviets are IT people would need to be aware of VMS, and, it may
>> someday be a target. But not today.
>
> I've been involved in two cases of ransoming on OpenVMS. I expect there
> have been others too, handled quietly. Been involved in OpenVMS
> security breaches, too. Fun times. Not.
>
Thank you for posting this Stephen.
So David, do you still think that VMS doesn't have a problem in this
area ?
VMS doesn't even have the application isolation and security containment
features that are present as standard in some other operating systems
such as Linux.
> If you're not taking steps to secure your apps and source code and
> data?WORM tapes, and/or off-site, and/or whatever?it's time to start
> taking a very serious look around your data centers.
>
Stopping the use of unencrypted communication protocols on your internal
networks would be a good idea as well.
> That some of these breaches involved the attackers investigating the
> computer and network environment for weeks or months?before the data
> encryption started?should scare all of us.
>
Unfortunately, that doesn't really surprise me given what is considered
to be normal these days when someone is going after a specific target or
a specific set of targets.
Simon.
--
Simon Clubley, clubley at remove_me.eisner.decus.org-Earth.UFP
Walking destinations on a map are further away than they appear.
More information about the Info-vax
mailing list