[Info-vax] OpenVMS x64 Atom project

Stephen Hoffman seaohveh at hoffmanlabs.invalid
Sat Jun 5 13:10:48 EDT 2021


On 2021-06-05 09:21:30 +0000, Marc Van Dyck said:

> Stephen Hoffman presented the following explanation :
>> 
>> One of the ransom cases I've cleaned up after some years ago had the 
>> perpetrator silently corrupt multiple backups over time, deeper than 
>> the organization's backup rotation schedule. The perpetrator then 
>> ransomed the only remaining good copy of the organization's databases. 
>> In recent ransom attacks on other platforms, the attackers have been 
>> active in the target organization's networks for weeks and months, too.
>> 
> I suppose that people in this organization never tried restores ? Doing 
> regular restores to ensure the integrity of your backups is one of the 
> major recommendations, isn't it ?

How many folks here full-path test their restores at all?  [hint: less 
than all.]

Then how many of that group test those restores more often than their 
backup rotation depth?

Then how many of that smaller group verify the database structures?

Then how many of that yet smaller group verify the contents of the 
database or the configuration files or other changes against production?

[Compared with some other platforms, OpenVMS is... bad... at 
re-installing without requiring manual effort, too. See previous 
newsgroup discussions of (the lack of) provisioning, and of migrating 
to PCSI kits for ~everything local, among other messes.  How many here 
install your whole environment repeatedly, and from a kit? Automated 
app deployments, with automated app migrations? But I digress.]

Would I have done the backups differently than the sequence they'd been 
using, given the software and hardware constraints? Probably not. Which 
yes, means I would have gotten caught out, too.

Even if keeping deeper backups, is restoring that old data from prior 
to a longer-duration corruption even going to be appropriate and 
useful? For many of the apps I've worked with, it'll be a disaster. 
Ordering and fulfillment data gets stale fast, for instance.

Flip this around all and ask yourself—knowing what each of you knows 
about your own backup or failover implementations—how would you 
deliberately corrupt your own backups and your own production data 
preservation strategies such that even performing the data recovery 
would be more expensive than paying off the ransom, then start looking 
at what to do to detect or to avoid that. What can be done deliberately 
to cause problems, too. Not what happens when a tape library becomes 
unreadable or unavailable, or a backup server drops offline with the 
primary, or whatever is appropriate for your particular data 
preservation implementation. And related to this, at what can be done 
to detect intruders within your network earlier. Then see if you can 
fit these changes into what for many is an ever-shrinking budget, just 
for added entertainment.



-- 
Pure Personal Opinion | HoffmanLabs LLC 




More information about the Info-vax mailing list