Soldato
Surely nobody will be able to get hold of any money from this as the bitcoin accounts will be watched like hawks from governemt agency?
In terms of personal data security, would something like a Western Digital MyCloud be sufficiently detached to avoid encryption by ransomware as either a primary or backup storage location?
Manual backups whilst obviously more easily detached are more prone to 'forgot' and 'didn't have time this week' issues.
Though these all seem to be time based sleeping viruses so would auto backups likely just infect themselves anyway?
Surely nobody will be able to get hold of any money from this as the bitcoin accounts will be watched like hawks from governemt agency?
So just had a rather candid chat with a friend across the pond (at a rather large multinational). They got hit via one of their remote sites, they are still trying to work out the attack vector. Now I've known this guy for quite some time and technically he is on the ball. They have multiple Layer 7 firewalls, email filtering via Mimecast, Cylance on the infrastructure, AppLocker, relevant GPO's, etc. He suspects it came from somebody internal as opposed from the outside. It hit fully patched Windows 2016 & 10 boxes.
Unfortunately IT security is evolving so quick it's difficult to try and keep up
We are running Mimecast and Cylance along with McAfee so that's slightly concerning!So just had a rather candid chat with a friend across the pond (at a rather large multinational). They got hit via one of their remote sites, they are still trying to work out the attack vector. Now I've known this guy for quite some time and technically he is on the ball. They have multiple Layer 7 firewalls, email filtering via Mimecast, Cylance on the infrastructure, AppLocker, relevant GPO's, etc. He suspects it came from somebody internal as opposed from the outside. It hit fully patched Windows 2016 & 10 boxes.
Unfortunately IT security is evolving so quick it's difficult to try and keep up
Definitely comes across as such doesn't it.Nice work Putin.
Explosive?Orange soon to be purple?
Problem is the reality for many organisations is more complex - and going by Windows update history there is a higher chance of a patch breaking things than for most companies being infected by malware :s
Chernobyl is now affected.
We support 1000+ servers in 15 domains with 100+ apps only patchs I have seen cause issues over 10 yeas were caused directly and knowingly by Ms I can assume just for a laugh..
1) repeatedly getting ie to refuse low encryption and superseding that patch 10x why does ie not just tell you it does not like the cert? Ms just get ie to show a generic Web site not found error
2) windows update using 100% cpu time for ever
I'm so glad that we're all mac-based