Posts: 6,791
Threads: 1,808
Joined: May 2025
Reputation:
0
One of my sites has been taken down by ransomware. Just like Frank Sinatra Jr.
The hackers want $6000 to restore it. They will unencrypt all files.
I have an office insurance policy ... would this in any way be covered under our equipment insurance?
Posts: 48,066
Threads: 9,823
Joined: Dec 2021
Reputation:
0
Why not restore from backup?
Posts: 24,633
Threads: 1,093
Joined: May 2025
space-time wrote:
Why not restore from backup?
A local school discovered that hard way that if the backup drive is connected in any way to the affected server, it gets encrypted too. Apparently that
can include cloud based backups (little fuzzy on which ones, etc).
They had to restore their Student Information System database from a backup two months old... They lost a LOT of student data.
Posts: 6,791
Threads: 1,808
Joined: May 2025
Reputation:
0
Yeah they got the local back up too. Bastids.
I made an removed a back up from last Sept and put it away but a lot of water under the bridge since then.
Posts: 4,019
Threads: 29
Joined: Feb 2024
Reputation:
0
My worry about paying the money is that they are just ripping you off and won't decrypt the files. So are you taking a loss on the equipment, or hoping insurance pays the ransom?
Posts: 1,317
Threads: 155
Joined: May 2025
Paul F wrote:
A local school discovered that hard way that if the backup drive is connected in any way to the affected server, it gets encrypted too.
Are schools a regular target? I have not heard many school examples...
Posts: 27,160
Threads: 2,805
Joined: May 2025
Plus as long as they do fulfill the promise, they are more likely to get people to comply. If they just start ripping people off, no one will pay.
Posts: 24,633
Threads: 1,093
Joined: May 2025
numbered wrote:
[quote=Paul F]
A local school discovered that hard way that if the backup drive is connected in any way to the affected server, it gets encrypted too.
Are schools a regular target? I have not heard many school examples...
Any server with open ports and an accessible IP address that is sloppily protected can be a target.
My impression from the other schools tech was this was something of a "target of opportunity". In this case, some security features were turned "off" by a tech from the SIS vendor who was troubleshooting, and they were not turned back "on" by the local tech by mistake..... a few weeks went by, and one morning there's this message on the screen.