[Info-vax] OpenVMS x64 Atom project

Dave Froble davef at tsoft-inc.com
Sun Jun 6 22:33:22 EDT 2021


On 6/6/2021 9:15 PM, John E. Malmberg wrote:
> On 6/4/2021 1:41 PM, Simon Clubley wrote:
>> On 2021-06-04, Arne Vajhøj <arne at vajhoej.dk> wrote:
>>
>> An additional twist on ransomware these days is to copy some sensitive
>> data before encrypting it and then threaten to release the sensitive
>> data if you do not pay the ransom.
>>
>> That way, you may still have to pay even if you can recover your
>> systems from backups.
>
> Paying such blackmail is useless.
>
> You have to assume that even if you do pay, your stolen data is going to
> also be sold to someone that you do not want to see it.
>
> I saw a report that one insurance company is no longer covering business
> losses due to ransomware.
>
> Regards,
> -John

True fault lies with the first entity that paid any ransom.  Without 
that the bad guys would not realize what a gold mine they had.

Trusting thieves is the height of folly ...

Ok, a VMS question.

What, other than getting to run a program, could be done by the bad guys 
on a VMS system?  I confess, I have not studied the issue at all.

If the bad guys need to get access and run a program, would defenses 
that check for valid programs running be successful?

So, yeah, if I can get access and run a process on VMS, much can be 
done.  And possible defenses could be set up.  But if there are other 
possibilities, one would need to know about them before considering 
defenses.

-- 
David Froble                       Tel: 724-529-0450
Dave Froble Enterprises, Inc.      E-Mail: davef at tsoft-inc.com
DFE Ultralights, Inc.
170 Grimplin Road
Vanderbilt, PA  15486



More information about the Info-vax mailing list