[Info-vax] OpenVMS x64 Atom project
Dave Froble
davef at tsoft-inc.com
Thu Jun 3 14:08:00 EDT 2021
On 6/3/2021 1:31 PM, Simon Clubley wrote:
> On 2021-06-03, Stephen Hoffman <seaohveh at hoffmanlabs.invalid> wrote:
>> On 2021-06-03 04:09:27 +0000, Dave Froble said:
>>
>>> I must observe that at this time, ransomware is a rather good friend to
>>> VMS. Caviets are IT people would need to be aware of VMS, and, it may
>>> someday be a target. But not today.
>>
>> I've been involved in two cases of ransoming on OpenVMS. I expect there
>> have been others too, handled quietly. Been involved in OpenVMS
>> security breaches, too. Fun times. Not.
>>
>
> Thank you for posting this Stephen.
>
> So David, do you still think that VMS doesn't have a problem in this
> area ?
I wasn't aware of that, no, but I did read "handled quietly".
"Handled quietly" really doesn't help with the problem. Saving face is
another of those things that just makes problems worse. One might
wonder why there wasn't hollering and screaming for generators when the
Japanese Nuclear station needed them, didn't get them, and things rolled
downhill. Can't convince me that there were no generators in the whole
country, or outside the country, that could not be airlifted in to help
in time.
Regardless, I'm guessing most of the software used in ransomware targets
other than VMS. Would you agree?
> VMS doesn't even have the application isolation and security containment
> features that are present as standard in some other operating systems
> such as Linux.
And that has helped prevent the attacks that have taken place?
>> If you're not taking steps to secure your apps and source code and
>> data?WORM tapes, and/or off-site, and/or whatever?it's time to start
>> taking a very serious look around your data centers.
Agree 110% ...
> Stopping the use of unencrypted communication protocols on your internal
> networks would be a good idea as well.
What? Encrypted data cannot be hashed up to make it unusable?
>> That some of these breaches involved the attackers investigating the
>> computer and network environment for weeks or months?before the data
>> encryption started?should scare all of us.
I'm scared ...
> Unfortunately, that doesn't really surprise me given what is considered
> to be normal these days when someone is going after a specific target or
> a specific set of targets.
Humans are easily fooled. They always believe it will happen to "the
other guy", and just won't make the effort to be safe. I found that out
long ago.
Remember, it took humans to develop the "game" of "russian roulette".
Doesn't that explain much?
--
David Froble Tel: 724-529-0450
Dave Froble Enterprises, Inc. E-Mail: davef at tsoft-inc.com
DFE Ultralights, Inc.
170 Grimplin Road
Vanderbilt, PA 15486
More information about the Info-vax
mailing list