[Info-vax] OpenVMS x64 Atom project
Dave Froble
davef at tsoft-inc.com
Sun Jun 6 22:33:22 EDT 2021
On 6/6/2021 9:15 PM, John E. Malmberg wrote:
> On 6/4/2021 1:41 PM, Simon Clubley wrote:
>> On 2021-06-04, Arne Vajhøj <arne at vajhoej.dk> wrote:
>>
>> An additional twist on ransomware these days is to copy some sensitive
>> data before encrypting it and then threaten to release the sensitive
>> data if you do not pay the ransom.
>>
>> That way, you may still have to pay even if you can recover your
>> systems from backups.
>
> Paying such blackmail is useless.
>
> You have to assume that even if you do pay, your stolen data is going to
> also be sold to someone that you do not want to see it.
>
> I saw a report that one insurance company is no longer covering business
> losses due to ransomware.
>
> Regards,
> -John
True fault lies with the first entity that paid any ransom. Without
that the bad guys would not realize what a gold mine they had.
Trusting thieves is the height of folly ...
Ok, a VMS question.
What, other than getting to run a program, could be done by the bad guys
on a VMS system? I confess, I have not studied the issue at all.
If the bad guys need to get access and run a program, would defenses
that check for valid programs running be successful?
So, yeah, if I can get access and run a process on VMS, much can be
done. And possible defenses could be set up. But if there are other
possibilities, one would need to know about them before considering
defenses.
--
David Froble Tel: 724-529-0450
Dave Froble Enterprises, Inc. E-Mail: davef at tsoft-inc.com
DFE Ultralights, Inc.
170 Grimplin Road
Vanderbilt, PA 15486
More information about the Info-vax
mailing list