Rocksolid Light

Welcome to novaBBS (click a section below)

mail  files  register  newsreader  groups  login

Message-ID:  

Pascal is not a high-level language. -- Steven Feiner


aus+uk / uk.comp.homebuilt / Re: Ransomware

SubjectAuthor
* RansomwareGB
+- Re: RansomwareJaimie Vandenbergh
`* Re: RansomwareJohnny B Good
 `* Re: RansomwarePhilip Herlihy
  +* Re: RansomwareJaimie Vandenbergh
  |`* Re: RansomwarePhilip Herlihy
  | `* Re: RansomwareJaimie Vandenbergh
  |  +* Re: RansomwareVir Campestris
  |  |`- Re: RansomwarePhilip Herlihy
  |  `* Re: RansomwarePhilip Herlihy
  |   +- Re: RansomwareJaimie Vandenbergh
  |   `- Re: RansomwarePhilip Herlihy
  `* Re: RansomwareJohnny B Good
   `* Re: RansomwareGB
    `* Re: RansomwareGB
     `* Re: RansomwareJohnny B Good
      `* Re: RansomwareJaimie Vandenbergh
       `* Re: RansomwareJohnny B Good
        `* Re: RansomwareRJH
         `- Re: RansomwareJohnny B Good

1
Ransomware

<s7bg1k$9t3$1@dont-email.me>

  copy mid

https://www.novabbs.com/aus+uk/article-flat.php?id=886&group=uk.comp.homebuilt#886

  copy link   Newsgroups: uk.comp.homebuilt
Path: i2pn2.org!i2pn.org!eternal-september.org!reader02.eternal-september.org!.POSTED!not-for-mail
From: NOTsome...@microsoft.com (GB)
Newsgroups: uk.comp.homebuilt
Subject: Ransomware
Date: Mon, 10 May 2021 15:30:13 +0100
Organization: A noiseless patient Spider
Lines: 7
Message-ID: <s7bg1k$9t3$1@dont-email.me>
Mime-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Mon, 10 May 2021 14:30:12 -0000 (UTC)
Injection-Info: reader02.eternal-september.org; posting-host="866d8fa4c357c2f22924c8e1f3b0af2c";
logging-data="10147"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18IQI17oJmwQPGeyTy1LL7X"
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:78.0) Gecko/20100101
Thunderbird/78.10.1
Cancel-Lock: sha1:QKKesQW0vORjKRPA6YC3VKIJTMk=
Content-Language: en-GB
X-Mozilla-News-Host: snews://news.zen.co.uk:563
 by: GB - Mon, 10 May 2021 14:30 UTC

Just thinking about ransomware, would a NAS or Linux system used for
backup be more resilient against ransomware? I assume most ransomware
runs on PCs, but if the PC can write to the NAS, presumably it can
overwrite the files on it with an encrypted version?

Re: Ransomware

<ift04rFt1olU1@mid.individual.net>

  copy mid

https://www.novabbs.com/aus+uk/article-flat.php?id=887&group=uk.comp.homebuilt#887

  copy link   Newsgroups: uk.comp.homebuilt
Path: i2pn2.org!i2pn.org!usenet.goja.nl.eu.org!3.eu.feeder.erje.net!feeder.erje.net!fu-berlin.de!uni-berlin.de!individual.net!not-for-mail
From: jai...@usually.sessile.org (Jaimie Vandenbergh)
Newsgroups: uk.comp.homebuilt
Subject: Re: Ransomware
Date: 10 May 2021 15:00:43 GMT
Lines: 23
Message-ID: <ift04rFt1olU1@mid.individual.net>
References: <s7bg1k$9t3$1@dont-email.me>
Mime-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=fixed
Content-Transfer-Encoding: 8bit
X-Trace: individual.net fSuYRm5RXF4Z7Bt22nE65Q5rPM1Vmp2j+YqCTU09zGD6Eb8tFw
Cancel-Lock: sha1:ZWAjFT8pI5JotGvZUkLXPX55FoE=
User-Agent: Usenapp/1.07.2/l for MacOS - Full License
 by: Jaimie Vandenbergh - Mon, 10 May 2021 15:00 UTC

On 10 May 2021 at 15:30:13 BST, "GB" <NOTsomeone@microsoft.com> wrote:

> Just thinking about ransomware, would a NAS or Linux system used for
> backup be more resilient against ransomware? I assume most ransomware
> runs on PCs, but if the PC can write to the NAS, presumably it can
> overwrite the files on it with an encrypted version?

Yes, it would be able to overwrite it. You'd want to either keep it
offline, which is obviously rarely useful, or use a NAS which does
snapshots of its data so you can revert to a previous set of files.

Mine does snapshots, it's a homebuild running the free TrueNAS operating
system. If something does go through and encrypts it, the warning I'll
get is an email saying "90% of your volume is full" because encrypting
the lot will definitely hit that barrier as new versions are written but
the old ones in the snapshots are also kept :)

Cheers - Jaimie
--
"The dumbest people I know are those who know it all."
-- Malcolm Forbes

Re: Ransomware

<YYbmI.600187$qNp.118463@fx39.ams4>

  copy mid

https://www.novabbs.com/aus+uk/article-flat.php?id=888&group=uk.comp.homebuilt#888

  copy link   Newsgroups: uk.comp.homebuilt
Path: i2pn2.org!i2pn.org!paganini.bofh.team!news.dns-netz.com!news.freedyn.net!newsfeed.xs4all.nl!newsfeed8.news.xs4all.nl!news-out.netnews.com!news.alt.net!fdc3.netnews.com!peer04.ams1!peer.ams1.xlned.com!news.xlned.com!peer01.ams4!peer.am4.highwinds-media.com!news.highwinds-media.com!fx39.ams4.POSTED!not-for-mail
From: johnny-b...@invalid.ntlworld.com (Johnny B Good)
Subject: Re: Ransomware
Newsgroups: uk.comp.homebuilt
References: <s7bg1k$9t3$1@dont-email.me>
User-Agent: Pan/0.139 (Sexual Chocolate; GIT bf56508
git://git.gnome.org/pan2)
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Lines: 18
Message-ID: <YYbmI.600187$qNp.118463@fx39.ams4>
X-Complaints-To: http://netreport.virginmedia.com
NNTP-Posting-Date: Mon, 10 May 2021 15:05:28 UTC
Organization: virginmedia.com
Date: Mon, 10 May 2021 15:05:28 GMT
X-Received-Bytes: 1448
 by: Johnny B Good - Mon, 10 May 2021 15:05 UTC

On Mon, 10 May 2021 15:30:13 +0100, GB wrote:

> Just thinking about ransomware, would a NAS or Linux system used for
> backup be more resilient against ransomware? I assume most ransomware
> runs on PCs, but if the PC can write to the NAS, presumably it can
> overwrite the files on it with an encrypted version?

If the NAS disk volumes are mapped to drive letters on the victim PC,
that's true enough otherwise they should be safe if you only access them
via a less 'convenient' mechanism (UNC paths? - I'm a little hazy on the
details here).

You can do a DDG search for more info on the current state of the risks
involved - it's been several years since I last read anything about this
topic.

--
Johnny B Good

Re: Ransomware

<MPG.3b04636b728e687d989934@news.eternal-september.org>

  copy mid

https://www.novabbs.com/aus+uk/article-flat.php?id=889&group=uk.comp.homebuilt#889

  copy link   Newsgroups: uk.comp.homebuilt
Path: i2pn2.org!i2pn.org!eternal-september.org!reader02.eternal-september.org!.POSTED!not-for-mail
From: thiswill...@you.com (Philip Herlihy)
Newsgroups: uk.comp.homebuilt
Subject: Re: Ransomware
Date: Tue, 11 May 2021 10:49:00 +0100
Organization: A noiseless patient Spider
Lines: 26
Message-ID: <MPG.3b04636b728e687d989934@news.eternal-september.org>
References: <s7bg1k$9t3$1@dont-email.me> <YYbmI.600187$qNp.118463@fx39.ams4>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Injection-Info: reader02.eternal-september.org; posting-host="905a5b7f15eb12ad83d76afdc70de98c";
logging-data="857"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1/v93PNzzUkxObFNLAyTQVmuefHGWjxajk="
User-Agent: MicroPlanet-Gravity/3.0.10 (GRC)
Cancel-Lock: sha1:wPlyVs4xAhecSysuB4q/6DbNVTM=
 by: Philip Herlihy - Tue, 11 May 2021 09:49 UTC

In article <YYbmI.600187$qNp.118463@fx39.ams4>, johnny-b-
good@invalid.ntlworld.com says...
>
> On Mon, 10 May 2021 15:30:13 +0100, GB wrote:
>
> > Just thinking about ransomware, would a NAS or Linux system used for
> > backup be more resilient against ransomware? I assume most ransomware
> > runs on PCs, but if the PC can write to the NAS, presumably it can
> > overwrite the files on it with an encrypted version?
>
> If the NAS disk volumes are mapped to drive letters on the victim PC,
> that's true enough otherwise they should be safe if you only access them
> via a less 'convenient' mechanism (UNC paths? - I'm a little hazy on the
> details here).
>
> You can do a DDG search for more info on the current state of the risks
> involved - it's been several years since I last read anything about this
> topic.

I read a credible recent report saying malware was out there that could
identify unmapped partitions containing data, map a drive letter to them, and
encrypt them. So in-machine backup data I'd hidden this way, um, isn't.

--

Phil, London

Re: Ransomware

<ifvja5Fdvh8U1@mid.individual.net>

  copy mid

https://www.novabbs.com/aus+uk/article-flat.php?id=894&group=uk.comp.homebuilt#894

  copy link   Newsgroups: uk.comp.homebuilt
Path: i2pn2.org!i2pn.org!weretis.net!feeder8.news.weretis.net!3.eu.feeder.erje.net!feeder.erje.net!news-2.dfn.de!news.dfn.de!fu-berlin.de!uni-berlin.de!individual.net!not-for-mail
From: jai...@usually.sessile.org (Jaimie Vandenbergh)
Newsgroups: uk.comp.homebuilt
Subject: Re: Ransomware
Date: 11 May 2021 14:40:05 GMT
Lines: 38
Message-ID: <ifvja5Fdvh8U1@mid.individual.net>
References: <s7bg1k$9t3$1@dont-email.me> <YYbmI.600187$qNp.118463@fx39.ams4> <MPG.3b04636b728e687d989934@news.eternal-september.org>
Mime-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=fixed
Content-Transfer-Encoding: 8bit
X-Trace: individual.net s5n5zrKbQ6UNQrTaPA7xCwzOLhFXDzAH5gojlAyAgC4fN1VvjU
Cancel-Lock: sha1:1xsm78ie622LBUnJ5xE4zgedor4=
User-Agent: Usenapp/1.07.2/l for MacOS - Full License
 by: Jaimie Vandenbergh - Tue, 11 May 2021 14:40 UTC

On 11 May 2021 at 10:49:00 BST, "Philip Herlihy"
<thiswillbounceback@you.com> wrote:

> In article <YYbmI.600187$qNp.118463@fx39.ams4>, johnny-b-
> good@invalid.ntlworld.com says...
>>
>> On Mon, 10 May 2021 15:30:13 +0100, GB wrote:
>>
>> > Just thinking about ransomware, would a NAS or Linux system used for
>> > backup be more resilient against ransomware? I assume most ransomware
>> > runs on PCs, but if the PC can write to the NAS, presumably it can
>> > overwrite the files on it with an encrypted version?
>>
>> If the NAS disk volumes are mapped to drive letters on the victim PC,
>> that's true enough otherwise they should be safe if you only access them
>> via a less 'convenient' mechanism (UNC paths? - I'm a little hazy on the
>> details here).
>>
>> You can do a DDG search for more info on the current state of the risks
>> involved - it's been several years since I last read anything about this
>> topic.
>
> I read a credible recent report saying malware was out there that could
> identify unmapped partitions containing data, map a drive letter to them, and
> encrypt them. So in-machine backup data I'd hidden this way, um, isn't.

If they're shares that are advertised on the network, with no security
or you've saved the user/pass into your own account, yep.

Cheers - Jaimie
--
"But people have always eaten people!
What else is there to eat?
If the Juju had meant us not to eat people
He wouldn't have made us of meat!"
-- Flanders & Swann

Re: Ransomware

<MPG.3b04ac7b69a9fb33989935@news.eternal-september.org>

  copy mid

https://www.novabbs.com/aus+uk/article-flat.php?id=895&group=uk.comp.homebuilt#895

  copy link   Newsgroups: uk.comp.homebuilt
Path: i2pn2.org!i2pn.org!eternal-september.org!reader02.eternal-september.org!.POSTED!not-for-mail
From: thiswill...@you.com (Philip Herlihy)
Newsgroups: uk.comp.homebuilt
Subject: Re: Ransomware
Date: Tue, 11 May 2021 16:00:44 +0100
Organization: A noiseless patient Spider
Lines: 44
Message-ID: <MPG.3b04ac7b69a9fb33989935@news.eternal-september.org>
References: <s7bg1k$9t3$1@dont-email.me> <YYbmI.600187$qNp.118463@fx39.ams4> <MPG.3b04636b728e687d989934@news.eternal-september.org> <ifvja5Fdvh8U1@mid.individual.net>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Injection-Info: reader02.eternal-september.org; posting-host="905a5b7f15eb12ad83d76afdc70de98c";
logging-data="31064"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1/NfGH31VJmsTtSZTgcXURz4I8dQn5kDwk="
User-Agent: MicroPlanet-Gravity/3.0.10 (GRC)
Cancel-Lock: sha1:1QxWIbamhncgv368BByHiwflMbc=
 by: Philip Herlihy - Tue, 11 May 2021 15:00 UTC

In article <ifvja5Fdvh8U1@mid.individual.net>, jaimie@usually.sessile.org
says...
>
> On 11 May 2021 at 10:49:00 BST, "Philip Herlihy"
> <thiswillbounceback@you.com> wrote:
>
> > In article <YYbmI.600187$qNp.118463@fx39.ams4>, johnny-b-
> > good@invalid.ntlworld.com says...
> >>
> >> On Mon, 10 May 2021 15:30:13 +0100, GB wrote:
> >>
> >> > Just thinking about ransomware, would a NAS or Linux system used for
> >> > backup be more resilient against ransomware? I assume most ransomware
> >> > runs on PCs, but if the PC can write to the NAS, presumably it can
> >> > overwrite the files on it with an encrypted version?
> >>
> >> If the NAS disk volumes are mapped to drive letters on the victim PC,
> >> that's true enough otherwise they should be safe if you only access them
> >> via a less 'convenient' mechanism (UNC paths? - I'm a little hazy on the
> >> details here).
> >>
> >> You can do a DDG search for more info on the current state of the risks
> >> involved - it's been several years since I last read anything about this
> >> topic.
> >
> > I read a credible recent report saying malware was out there that could
> > identify unmapped partitions containing data, map a drive letter to them, and
> > encrypt them. So in-machine backup data I'd hidden this way, um, isn't.
>
> If they're shares that are advertised on the network, with no security
> or you've saved the user/pass into your own account, yep.
>
> Cheers - Jaimie

No, I thought I'd been smarter than that. I copied several months' worth of
backups onto a dedicated partition,which I then "hid" using "Diskpart Remove
letter=X". But apparently malware has been spotted which can find such
partitions, access them, and encrypt them.

We're doomed, I tell ye...

--

Phil, London

Re: Ransomware

<ifvlq4Fef69U1@mid.individual.net>

  copy mid

https://www.novabbs.com/aus+uk/article-flat.php?id=896&group=uk.comp.homebuilt#896

  copy link   Newsgroups: uk.comp.homebuilt
Path: i2pn2.org!i2pn.org!weretis.net!feeder8.news.weretis.net!news.szaf.org!fu-berlin.de!uni-berlin.de!individual.net!not-for-mail
From: jai...@usually.sessile.org (Jaimie Vandenbergh)
Newsgroups: uk.comp.homebuilt
Subject: Re: Ransomware
Date: 11 May 2021 15:22:44 GMT
Lines: 56
Message-ID: <ifvlq4Fef69U1@mid.individual.net>
References: <s7bg1k$9t3$1@dont-email.me> <YYbmI.600187$qNp.118463@fx39.ams4> <MPG.3b04636b728e687d989934@news.eternal-september.org> <ifvja5Fdvh8U1@mid.individual.net> <MPG.3b04ac7b69a9fb33989935@news.eternal-september.org>
Mime-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=fixed
Content-Transfer-Encoding: 8bit
X-Trace: individual.net OgxSPcKHBRvHOPVZb9jCRAnnrrkDtzbABRcq51bFlEKSeE2v9Z
Cancel-Lock: sha1:ydFrsXJS3zHPoI+EdUe5Bi/0A5Y=
User-Agent: Usenapp/1.07.2/l for MacOS - Full License
 by: Jaimie Vandenbergh - Tue, 11 May 2021 15:22 UTC

On 11 May 2021 at 16:00:44 BST, "Philip Herlihy"
<thiswillbounceback@you.com> wrote:

> In article <ifvja5Fdvh8U1@mid.individual.net>, jaimie@usually.sessile.org
> says...
>>
>> On 11 May 2021 at 10:49:00 BST, "Philip Herlihy"
>> <thiswillbounceback@you.com> wrote:
>>
>> > In article <YYbmI.600187$qNp.118463@fx39.ams4>, johnny-b-
>> > good@invalid.ntlworld.com says...
>> >>
>> >> On Mon, 10 May 2021 15:30:13 +0100, GB wrote:
>> >>
>> >> > Just thinking about ransomware, would a NAS or Linux system used for
>> >> > backup be more resilient against ransomware? I assume most ransomware
>> >> > runs on PCs, but if the PC can write to the NAS, presumably it can
>> >> > overwrite the files on it with an encrypted version?
>> >>
>> >> If the NAS disk volumes are mapped to drive letters on the victim PC,
>> >> that's true enough otherwise they should be safe if you only access them
>> >> via a less 'convenient' mechanism (UNC paths? - I'm a little hazy on the
>> >> details here).
>> >>
>> >> You can do a DDG search for more info on the current state of the risks
>> >> involved - it's been several years since I last read anything about this
>> >> topic.
>> >
>> > I read a credible recent report saying malware was out there that could
>> > identify unmapped partitions containing data, map a drive letter to them, and
>> > encrypt them. So in-machine backup data I'd hidden this way, um, isn't.
>>
>> If they're shares that are advertised on the network, with no security
>> or you've saved the user/pass into your own account, yep.
>>
>> Cheers - Jaimie
>
> No, I thought I'd been smarter than that. I copied several months' worth of
> backups onto a dedicated partition,which I then "hid" using "Diskpart Remove
> letter=X". But apparently malware has been spotted which can find such
> partitions, access them, and encrypt them.
>
> We're doomed, I tell ye...

Might work if you twiddle the bits of the partition ID so it doesn't
match a FAT/NTFS variant I suppose. But if you're going to the effort of
an occasional offline backup, put it on a USB HDD and keep it in a
different building.

Cheers - Jaimie
--
"The only way to comprehend what mathematicians mean
by infinity is to contemplate the extent of human stupidity."
-- Voltaire

Re: Ransomware

<QJxmI.160813$RTM1.51074@fx09.ams4>

  copy mid

https://www.novabbs.com/aus+uk/article-flat.php?id=897&group=uk.comp.homebuilt#897

  copy link   Newsgroups: uk.comp.homebuilt
Path: i2pn2.org!i2pn.org!paganini.bofh.team!news.dns-netz.com!news.freedyn.net!newsfeed.xs4all.nl!newsfeed7.news.xs4all.nl!news-out.netnews.com!news.alt.net!fdc2.netnews.com!peer04.ams1!peer.ams1.xlned.com!news.xlned.com!peer01.ams4!peer.am4.highwinds-media.com!news.highwinds-media.com!fx09.ams4.POSTED!not-for-mail
From: johnny-b...@invalid.ntlworld.com (Johnny B Good)
Subject: Re: Ransomware
Newsgroups: uk.comp.homebuilt
References: <s7bg1k$9t3$1@dont-email.me>
<YYbmI.600187$qNp.118463@fx39.ams4>
<MPG.3b04636b728e687d989934@news.eternal-september.org>
User-Agent: Pan/0.139 (Sexual Chocolate; GIT bf56508
git://git.gnome.org/pan2)
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Lines: 58
Message-ID: <QJxmI.160813$RTM1.51074@fx09.ams4>
X-Complaints-To: http://netreport.virginmedia.com
NNTP-Posting-Date: Tue, 11 May 2021 15:51:12 UTC
Organization: virginmedia.com
Date: Tue, 11 May 2021 15:51:12 GMT
X-Received-Bytes: 3494
 by: Johnny B Good - Tue, 11 May 2021 15:51 UTC

On Tue, 11 May 2021 10:49:00 +0100, Philip Herlihy wrote:

> In article <YYbmI.600187$qNp.118463@fx39.ams4>, johnny-b-
> good@invalid.ntlworld.com says...
>>
>> On Mon, 10 May 2021 15:30:13 +0100, GB wrote:
>>
>> > Just thinking about ransomware, would a NAS or Linux system used for
>> > backup be more resilient against ransomware? I assume most ransomware
>> > runs on PCs, but if the PC can write to the NAS, presumably it can
>> > overwrite the files on it with an encrypted version?
>>
>> If the NAS disk volumes are mapped to drive letters on the victim PC,
>> that's true enough otherwise they should be safe if you only access
>> them via a less 'convenient' mechanism (UNC paths? - I'm a little hazy
>> on the details here).
>>
>> You can do a DDG search for more info on the current state of the
>> risks
>> involved - it's been several years since I last read anything about
>> this topic.
>
> I read a credible recent report saying malware was out there that could
> identify unmapped partitions containing data, map a drive letter to
> them, and encrypt them. So in-machine backup data I'd hidden this way,
> um, isn't.

Thanks for providing that observation. I rather thought the 'black hats'
would have evolved their 'ransomware' beyond their initial reliance on NAS
drive volumes needing to be mapped to local drive letters by now.

I switched to Linux about six years ago when a MoBo/CPU upgrade left me
without win2k driver support, forcing me to finally make good on my
promise to ditch Microsoft's proprietary windows OS offerings (win2k
being the last of their best OSes of all time) in favour of a *nix based
one.

I'd stuck with win2k because I'd recognised that horror show known as
winXP, as being the thin end of a wedge of exploitation which has
continued to expand through Vista, shrink slightly with win7, then expand
grossly with win8, ultimately reaching a plateau with that obscenity
known as windows 10.

Linux/BSD has its own shortcomings but at least they're not due to
exploitation of their user base. Unfortunately, in their efforts to
'popularise' the various distros, the later, more 'polished' versions are
making Linux an ever less unattractive target to malware exploitation as
its user base grows.

However, I don't believe the level of take up has reached the stage
whereby the ROI into *nix targeted malware is sufficient to distract the
black hats away from the low hanging fruit that is MS windows. Hopefully,
I'll be dead before any need to bog the PC down with antivirus/antimalware
software of rather questionable value arrives. ;)

--
Johnny B Good

Re: Ransomware

<s7ec3m$2t3$1@dont-email.me>

  copy mid

https://www.novabbs.com/aus+uk/article-flat.php?id=898&group=uk.comp.homebuilt#898

  copy link   Newsgroups: uk.comp.homebuilt
Path: i2pn2.org!i2pn.org!eternal-september.org!reader02.eternal-september.org!.POSTED!not-for-mail
From: NOTsome...@microsoft.com (GB)
Newsgroups: uk.comp.homebuilt
Subject: Re: Ransomware
Date: Tue, 11 May 2021 17:41:27 +0100
Organization: A noiseless patient Spider
Lines: 8
Message-ID: <s7ec3m$2t3$1@dont-email.me>
References: <s7bg1k$9t3$1@dont-email.me> <YYbmI.600187$qNp.118463@fx39.ams4>
<MPG.3b04636b728e687d989934@news.eternal-september.org>
<QJxmI.160813$RTM1.51074@fx09.ams4>
Mime-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Tue, 11 May 2021 16:41:26 -0000 (UTC)
Injection-Info: reader02.eternal-september.org; posting-host="816e30ee31a7b60710cc14bfca693332";
logging-data="2979"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19X/TidJ+RP5lvzYPi3bSG1"
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:78.0) Gecko/20100101
Thunderbird/78.10.1
Cancel-Lock: sha1:ODCoi9F6wDvIaXl3K2xPON6m+vE=
In-Reply-To: <QJxmI.160813$RTM1.51074@fx09.ams4>
Content-Language: en-GB
 by: GB - Tue, 11 May 2021 16:41 UTC

On 11/05/2021 16:51, Johnny B Good wrote:

> However, I don't believe the level of take up has reached the stage
> whereby the ROI into *nix targeted malware is sufficient...

A brief Google suggests that you are wildly optimistic, I'm afraid.

Re: Ransomware

<s7ed7t$l15$2@dont-email.me>

  copy mid

https://www.novabbs.com/aus+uk/article-flat.php?id=899&group=uk.comp.homebuilt#899

  copy link   Newsgroups: uk.comp.homebuilt
Path: i2pn2.org!i2pn.org!eternal-september.org!reader02.eternal-september.org!.POSTED!not-for-mail
From: NOTsome...@microsoft.com (GB)
Newsgroups: uk.comp.homebuilt
Subject: Re: Ransomware
Date: Tue, 11 May 2021 18:00:46 +0100
Organization: A noiseless patient Spider
Lines: 12
Message-ID: <s7ed7t$l15$2@dont-email.me>
References: <s7bg1k$9t3$1@dont-email.me> <YYbmI.600187$qNp.118463@fx39.ams4>
<MPG.3b04636b728e687d989934@news.eternal-september.org>
<QJxmI.160813$RTM1.51074@fx09.ams4> <s7ec3m$2t3$1@dont-email.me>
Mime-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Date: Tue, 11 May 2021 17:00:45 -0000 (UTC)
Injection-Info: reader02.eternal-september.org; posting-host="816e30ee31a7b60710cc14bfca693332";
logging-data="21541"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19cSGCXoN8vWNxn/BqjuHFl"
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:78.0) Gecko/20100101
Thunderbird/78.10.1
Cancel-Lock: sha1:D4IfwzwmuqsZLGXyMGex78z9xQ8=
In-Reply-To: <s7ec3m$2t3$1@dont-email.me>
Content-Language: en-GB
 by: GB - Tue, 11 May 2021 17:00 UTC

On 11/05/2021 17:41, GB wrote:
> On 11/05/2021 16:51, Johnny B Good wrote:
>
>>   However, I don't believe the level of take up has reached the stage
>> whereby the ROI into *nix targeted malware is sufficient...
>
> A brief Google suggests that you are wildly optimistic, I'm afraid.
>
>

https://www.forbes.com/sites/daveywinder/2020/11/08/new-ransomware-threat-jumps-from-windows-to-linux-what-you-need-to-know/?sh=528f569b3265

Re: Ransomware

<s7ep42$pul$3@dont-email.me>

  copy mid

https://www.novabbs.com/aus+uk/article-flat.php?id=900&group=uk.comp.homebuilt#900

  copy link   Newsgroups: uk.comp.homebuilt
Path: i2pn2.org!i2pn.org!eternal-september.org!reader02.eternal-september.org!.POSTED!not-for-mail
From: vir.camp...@invalid.invalid (Vir Campestris)
Newsgroups: uk.comp.homebuilt
Subject: Re: Ransomware
Date: Tue, 11 May 2021 21:23:30 +0100
Organization: A noiseless patient Spider
Lines: 11
Message-ID: <s7ep42$pul$3@dont-email.me>
References: <s7bg1k$9t3$1@dont-email.me> <YYbmI.600187$qNp.118463@fx39.ams4>
<MPG.3b04636b728e687d989934@news.eternal-september.org>
<ifvja5Fdvh8U1@mid.individual.net>
<MPG.3b04ac7b69a9fb33989935@news.eternal-september.org>
<ifvlq4Fef69U1@mid.individual.net>
Mime-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Tue, 11 May 2021 20:23:30 -0000 (UTC)
Injection-Info: reader02.eternal-september.org; posting-host="908f10aef6f86619ce7382cce8db5dd2";
logging-data="26581"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19fK5q65Y165TAH8oqbwgi4IE0P1kybs7w="
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101
Thunderbird/78.8.1
Cancel-Lock: sha1:dpykyQj0u6B7n5xVCr4KWj2zBC8=
In-Reply-To: <ifvlq4Fef69U1@mid.individual.net>
Content-Language: en-GB
 by: Vir Campestris - Tue, 11 May 2021 20:23 UTC

On 11/05/2021 16:22, Jaimie Vandenbergh wrote:
> But if you're going to the effort of
> an occasional offline backup, put it on a USB HDD and keep it in a
> different building.

....which helps protect you from fire, which is probably a much greater
risk to those of us who know something about computers.

Andy
--
FTAOD "us" is probably all the denizens of this group.

Re: Ransomware

<spCmI.161386$RTM1.73508@fx09.ams4>

  copy mid

https://www.novabbs.com/aus+uk/article-flat.php?id=902&group=uk.comp.homebuilt#902

  copy link   Newsgroups: uk.comp.homebuilt
Path: i2pn2.org!i2pn.org!news.uzoreto.com!newsfeed.xs4all.nl!newsfeed9.news.xs4all.nl!fdcspool5.netnews.com!news-out.netnews.com!news.alt.net!fdc3.netnews.com!peer03.ams1!peer.ams1.xlned.com!news.xlned.com!peer03.ams4!peer.am4.highwinds-media.com!news.highwinds-media.com!fx09.ams4.POSTED!not-for-mail
From: johnny-b...@invalid.ntlworld.com (Johnny B Good)
Subject: Re: Ransomware
Newsgroups: uk.comp.homebuilt
References: <s7bg1k$9t3$1@dont-email.me>
<YYbmI.600187$qNp.118463@fx39.ams4>
<MPG.3b04636b728e687d989934@news.eternal-september.org>
<QJxmI.160813$RTM1.51074@fx09.ams4> <s7ec3m$2t3$1@dont-email.me>
<s7ed7t$l15$2@dont-email.me>
User-Agent: Pan/0.139 (Sexual Chocolate; GIT bf56508
git://git.gnome.org/pan2)
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Lines: 35
Message-ID: <spCmI.161386$RTM1.73508@fx09.ams4>
X-Complaints-To: http://netreport.virginmedia.com
NNTP-Posting-Date: Tue, 11 May 2021 21:10:48 UTC
Organization: virginmedia.com
Date: Tue, 11 May 2021 21:10:48 GMT
X-Received-Bytes: 2231
 by: Johnny B Good - Tue, 11 May 2021 21:10 UTC

On Tue, 11 May 2021 18:00:46 +0100, GB wrote:

> On 11/05/2021 17:41, GB wrote:
>> On 11/05/2021 16:51, Johnny B Good wrote:
>>
>>>   However, I don't believe the level of take up has reached the stage
>>> whereby the ROI into *nix targeted malware is sufficient...
>>
>> A brief Google suggests that you are wildly optimistic, I'm afraid.
>>
>>
>>
> https://www.forbes.com/sites/daveywinder/2020/11/08/new-ransomware-
threat-jumps-from-windows-to-linux-what-you-need-to-know/?sh=528f569b3265

Thanks for that 'heads up'... I think. :(

That, along with a few other articles I looked at, paints a rather bleak
picture for everyone. It looks Like I should take a closer look at
FreeBSD's latest desktop offerings.

It may not be any more secure but I aught to finally see full Gbe speeds
between my desktop and the "FreeNAS" box using the SMB protocol (unlike
Linux's 67% at best so far to date). Linux in my 10+ years experience,
whether as a server or a client, has always fallen woefully short of
performance in this regard.

I've been meaning to see if a BSD based desktop can match its server
speed performance ever since Linux Mint 17 demonstrated the same woeful
performance all of its predecessors had done when I first installed it
some 6 years ago.

--
Johnny B Good

Re: Ransomware

<MPG.3b0513f95be4b695989936@news.eternal-september.org>

  copy mid

https://www.novabbs.com/aus+uk/article-flat.php?id=903&group=uk.comp.homebuilt#903

  copy link   Newsgroups: uk.comp.homebuilt
Path: i2pn2.org!i2pn.org!eternal-september.org!reader02.eternal-september.org!.POSTED!not-for-mail
From: thiswill...@you.com (Philip Herlihy)
Newsgroups: uk.comp.homebuilt
Subject: Re: Ransomware
Date: Tue, 11 May 2021 23:22:18 +0100
Organization: A noiseless patient Spider
Lines: 23
Message-ID: <MPG.3b0513f95be4b695989936@news.eternal-september.org>
References: <s7bg1k$9t3$1@dont-email.me> <YYbmI.600187$qNp.118463@fx39.ams4> <MPG.3b04636b728e687d989934@news.eternal-september.org> <ifvja5Fdvh8U1@mid.individual.net> <MPG.3b04ac7b69a9fb33989935@news.eternal-september.org> <ifvlq4Fef69U1@mid.individual.net> <s7ep42$pul$3@dont-email.me>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Injection-Info: reader02.eternal-september.org; posting-host="13238e594fb05c640bda4ef564aeb03a";
logging-data="29977"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1/g47oyyXp+kbejSDGXlT7Fhex5uDsqu6g="
User-Agent: MicroPlanet-Gravity/3.0.10 (GRC)
Cancel-Lock: sha1:JXsNTKxowNyQbM6pecjyg2xyADM=
 by: Philip Herlihy - Tue, 11 May 2021 22:22 UTC

In article <s7ep42$pul$3@dont-email.me>, vir.campestris@invalid.invalid says...
>
> On 11/05/2021 16:22, Jaimie Vandenbergh wrote:
> > But if you're going to the effort of
> > an occasional offline backup, put it on a USB HDD and keep it in a
> > different building.
>
> ...which helps protect you from fire, which is probably a much greater
> risk to those of us who know something about computers.
>
> Andy

Ah - it only takes a moment's inattention. My (only) recent blooper was when I
was trying out different mobile providers, and I'd registered for service
status updates from EE after signing up for BT Mobile (MVNO over EE). I
received a text message which if I'd looked at it carefully enough should have
raised an eyebrow, but it just felt like it was poorly worded. I clicked the
link... So far all that's happened is that the bi-monthly spam texts have now
become daily. I was lucky.

--

Phil, London

Re: Ransomware

<ig0ivmFju2lU1@mid.individual.net>

  copy mid

https://www.novabbs.com/aus+uk/article-flat.php?id=904&group=uk.comp.homebuilt#904

  copy link   Newsgroups: uk.comp.homebuilt
Path: i2pn2.org!i2pn.org!weretis.net!feeder6.news.weretis.net!4.us.feeder.erje.net!3.eu.feeder.erje.net!feeder.erje.net!news-2.dfn.de!news.dfn.de!fu-berlin.de!uni-berlin.de!individual.net!not-for-mail
From: jai...@usually.sessile.org (Jaimie Vandenbergh)
Newsgroups: uk.comp.homebuilt
Subject: Re: Ransomware
Date: 11 May 2021 23:40:38 GMT
Lines: 25
Message-ID: <ig0ivmFju2lU1@mid.individual.net>
References: <s7bg1k$9t3$1@dont-email.me> <s7ec3m$2t3$1@dont-email.me> <s7ed7t$l15$2@dont-email.me> <spCmI.161386$RTM1.73508@fx09.ams4>
Mime-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=fixed
Content-Transfer-Encoding: 8bit
X-Trace: individual.net no4E+v3A1he9aLcRDCFXhgZh08Flw4P/SP9kYK4rrhlaw2vZTe
Cancel-Lock: sha1:zMyVlATOAYYxupRRSgCdzSgj9zc=
User-Agent: Usenapp/1.07.2/l for MacOS - Full License
 by: Jaimie Vandenbergh - Tue, 11 May 2021 23:40 UTC

On 11 May 2021 at 22:10:48 BST, "Johnny B Good"
<johnny-b-good@invalid.ntlworld.com> wrote:

> It may not be any more secure but I aught to finally see full Gbe speeds
> between my desktop and the "FreeNAS" box using the SMB protocol (unlike
> Linux's 67% at best so far to date). Linux in my 10+ years experience,
> whether as a server or a client, has always fallen woefully short of
> performance in this regard.

If it helps, I've had over 900megabytes/sec over 10gigE from my FreeBSD
based NAS to my Mac.

Takes nine hard drives to get that sort of speed though. TrueNAS is the
bistro on the NAS.

Cheers - Jaimie
--
You can't get a leopard to change his spots. In fact, you
can't /really/ get a leopard to appreciate the notion that
it has spots. You can explain it carefully to the leopard,
but it will just sit there looking at you, knowing that
you are made of meat.
After a while it will perhaps kill you. -- Geoffrey Pullum

Re: Ransomware

<_vImI.462413$hcZe.26309@fx46.ams4>

  copy mid

https://www.novabbs.com/aus+uk/article-flat.php?id=905&group=uk.comp.homebuilt#905

  copy link   Newsgroups: uk.comp.homebuilt
Path: i2pn2.org!i2pn.org!weretis.net!feeder8.news.weretis.net!fdcspool6.netnews.com!news-out.netnews.com!news.alt.net!fdc3.netnews.com!peer03.ams1!peer.ams1.xlned.com!news.xlned.com!peer01.ams4!peer.am4.highwinds-media.com!news.highwinds-media.com!fx46.ams4.POSTED!not-for-mail
From: johnny-b...@invalid.ntlworld.com (Johnny B Good)
Subject: Re: Ransomware
Newsgroups: uk.comp.homebuilt
References: <s7bg1k$9t3$1@dont-email.me> <s7ec3m$2t3$1@dont-email.me>
<s7ed7t$l15$2@dont-email.me> <spCmI.161386$RTM1.73508@fx09.ams4>
<ig0ivmFju2lU1@mid.individual.net>
User-Agent: Pan/0.139 (Sexual Chocolate; GIT bf56508
git://git.gnome.org/pan2)
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Lines: 88
Message-ID: <_vImI.462413$hcZe.26309@fx46.ams4>
X-Complaints-To: http://netreport.virginmedia.com
NNTP-Posting-Date: Wed, 12 May 2021 04:07:22 UTC
Organization: virginmedia.com
Date: Wed, 12 May 2021 04:07:22 GMT
X-Received-Bytes: 5472
 by: Johnny B Good - Wed, 12 May 2021 04:07 UTC

On Tue, 11 May 2021 23:40:38 +0000, Jaimie Vandenbergh wrote:

> On 11 May 2021 at 22:10:48 BST, "Johnny B Good"
> <johnny-b-good@invalid.ntlworld.com> wrote:
>
>> It may not be any more secure but I aught to finally see full Gbe
>> speeds
>> between my desktop and the "FreeNAS" box using the SMB protocol (unlike
>> Linux's 67% at best so far to date). Linux in my 10+ years experience,
>> whether as a server or a client, has always fallen woefully short of
>> performance in this regard.
>
> If it helps, I've had over 900megabytes/sec over 10gigE from my FreeBSD
> based NAS to my Mac.
>
> Takes nine hard drives to get that sort of speed though. TrueNAS is the
> bistro on the NAS.
>
That's quite impressive! I don't think, with a Mac in this mix, you'd
have been using SMB in this case (Appletalk?).

I'd been trying for a few years after upgrading to GBe, to get the over
the wire speed past the 50% mark between my win2k desktop and the FreeNAS
box, trying various PCI GBe adapters to get over the 60MB/s write speed
limit into the NAS (read speeds being around 55MB/s max with GB sized
media files), continuing with the built in GBe LAN ports on the MoBo
upgrades to both desktop and NAS which gave very little improvement (64MB/
s max write speeds istr at this stage).

It wasn't until I took advantage of a customer's reasonably specced win7
desktop machine to run data transfer speed tests with the NAS that I
finally discovered the truth of the matter which turned out to be that
the win2k desktop machine had been the culprit for this latest speed
limitation all along (for GBe performance - it had been fine with fast
ethernet).

Unlike the win2k data transfer progress window, win7's data transfer
progress window reports more than just simply that infamous ETA to
completion ("Only 24 hours...no, wait, 36... er 18 hours from Tulsa") by
inclusion of the moment to moment transfer rate in MB/s which for the
first few seconds until the caches were exhausted, maxed out at circa
125MB/s before dropping back to the slowest of the HDD transfer rates
around the 85 to 90MB/s mark for the remainder of the transfer operation
- some 20GB's worth of multimedia files in all).

That test had been a real eye opener, revealing as it did, the FreeNAS
box's total innocence in this speed throttling issue which I could now
lay the blame squarely on my recently upgraded win2k desktop.

When I was forced to part company with win2k some two or three years
later with a MoBo upgrade lacking any win2k hardware driver support in
favour of Linux Mint, I was rather miffed to see the same piss poor
performance I'd suffered with every other Linux distro I'd ever tried.

In this case the write performance was just marginally better that what
I'd gotten out of win2k on the older hardware so just simply put up with
it since it was at least no worse than it had been before (at least for
writes to the NAS - reads were another thing in being noticeably slower
than before but that was less of an issue in my usage case).

I might have gotten round this speed limitation with SMB transfers by
using NFS but couldn't figure out how to set that up (in reality, ICBA to
delve deeply enough to figure it out). I've simply come to accept this as
a Linux limitation until I finally get round to sorting out a FreeBSD
desktop replacement to properly fix this annoyance once and for all.

I'd had reason to boot the NAS box off a Knoppix 5 Live cd image I'd
mounted onto a bootable 8GB USB pen drive as a temporary work around for
the 1TiB LBA address wrap around bug in FreeNAS's EXT2 driver I'd elected
to use over the, as I later discovered, much faster native UFS file
format. This change to a Linux OS had dropped the 55/60MB/s r/w speeds
down to a mere 25MB/s each way, echoing the behaviour I'd seen with
earlier versions of linux on fast ethernet based LANs where the speed had
been reduced from the win2k to win2k 10MB/s rates to a mere 6.8MB/s for
win2k to Linux based NAS file transfers.

As I've already mentioned, I've been very unimpressed by Linux's poor SMB
file transfer rates, hence my interest in having a go at setting up a
FreeBSD based desktop replacement.

Given my experience over the past two decades to date, I'd recommend
against using any Linux distro to build a NAS box. The use of a FreeBSD
based NAS such as FreeNAS's variously renamed successors such as XigmaNAS
(or whatever it's now called) is imo, far and away, the much better
option.

--
Johnny B Good

Re: Ransomware

<s7fona$5mq$1@gioia.aioe.org>

  copy mid

https://www.novabbs.com/aus+uk/article-flat.php?id=906&group=uk.comp.homebuilt#906

  copy link   Newsgroups: uk.comp.homebuilt
Path: i2pn2.org!i2pn.org!aioe.org!O7i23eC+zKSyKb3+I+mITA.user.gioia.aioe.org.POSTED!not-for-mail
From: patchmo...@gmx.com (RJH)
Newsgroups: uk.comp.homebuilt
Subject: Re: Ransomware
Date: Wed, 12 May 2021 05:22:51 +0000 (UTC)
Organization: Aioe.org NNTP Server
Lines: 39
Message-ID: <s7fona$5mq$1@gioia.aioe.org>
References: <s7bg1k$9t3$1@dont-email.me> <spCmI.161386$RTM1.73508@fx09.ams4> <ig0ivmFju2lU1@mid.individual.net> <_vImI.462413$hcZe.26309@fx46.ams4>
NNTP-Posting-Host: O7i23eC+zKSyKb3+I+mITA.user.gioia.aioe.org
Mime-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=fixed
Content-Transfer-Encoding: 8bit
X-Complaints-To: abuse@aioe.org
User-Agent: Usenapp/1.07.2/l for MacOS - Full License
X-Notice: Filtered by postfilter v. 0.9.2
 by: RJH - Wed, 12 May 2021 05:22 UTC

On 12 May 2021 at 05:07:22 BST, "Johnny B Good"
<johnny-b-good@invalid.ntlworld.com> wrote:

> On Tue, 11 May 2021 23:40:38 +0000, Jaimie Vandenbergh wrote:
>
>> On 11 May 2021 at 22:10:48 BST, "Johnny B Good"
>> <johnny-b-good@invalid.ntlworld.com> wrote:
>>
>>> It may not be any more secure but I aught to finally see full Gbe
>>> speeds
>>> between my desktop and the "FreeNAS" box using the SMB protocol (unlike
>>> Linux's 67% at best so far to date). Linux in my 10+ years experience,
>>> whether as a server or a client, has always fallen woefully short of
>>> performance in this regard.
>>
>> If it helps, I've had over 900megabytes/sec over 10gigE from my FreeBSD
>> based NAS to my Mac.
>>
>> Takes nine hard drives to get that sort of speed though. TrueNAS is the
>> bistro on the NAS.
>>
> That's quite impressive! I don't think, with a Mac in this mix, you'd
> have been using SMB in this case (Appletalk?).
>
> I'd been trying for a few years after upgrading to GBe, to get the over
> the wire speed past the 50% mark between my win2k desktop and the FreeNAS
> box, trying various PCI GBe adapters to get over the 60MB/s write speed
> limit into the NAS (read speeds being around 55MB/s max with GB sized
> media files), continuing with the built in GBe LAN ports on the MoBo
> upgrades to both desktop and NAS which gave very little improvement (64MB/
> s max write speeds

FWIW, my up-to-date iMac throws large files about at 100MB/s to a low-end
Synology NAS. Hesitate to say this, but fast enough . . .

--
Cheers, Rob

Re: Ransomware

<MPG.3b051438860cf52f989937@news.eternal-september.org>

  copy mid

https://www.novabbs.com/aus+uk/article-flat.php?id=907&group=uk.comp.homebuilt#907

  copy link   Newsgroups: uk.comp.homebuilt
Path: i2pn2.org!i2pn.org!eternal-september.org!reader02.eternal-september.org!.POSTED!not-for-mail
From: thiswill...@you.com (Philip Herlihy)
Newsgroups: uk.comp.homebuilt
Subject: Re: Ransomware
Date: Wed, 12 May 2021 10:50:03 +0100
Organization: A noiseless patient Spider
Lines: 60
Message-ID: <MPG.3b051438860cf52f989937@news.eternal-september.org>
References: <s7bg1k$9t3$1@dont-email.me> <YYbmI.600187$qNp.118463@fx39.ams4> <MPG.3b04636b728e687d989934@news.eternal-september.org> <ifvja5Fdvh8U1@mid.individual.net> <MPG.3b04ac7b69a9fb33989935@news.eternal-september.org> <ifvlq4Fef69U1@mid.individual.net>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Injection-Info: reader02.eternal-september.org; posting-host="13238e594fb05c640bda4ef564aeb03a";
logging-data="13060"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18frIMexeKq5cLW3uK6cAz+U3KtkaM2Lrc="
User-Agent: MicroPlanet-Gravity/3.0.10 (GRC)
Cancel-Lock: sha1:ZE8c0rsdFqWrhRldbpXK6Ruf+rU=
 by: Philip Herlihy - Wed, 12 May 2021 09:50 UTC

In article <ifvlq4Fef69U1@mid.individual.net>, jaimie@usually.sessile.org
says...
>
> On 11 May 2021 at 16:00:44 BST, "Philip Herlihy"
> <thiswillbounceback@you.com> wrote:
>
> > In article <ifvja5Fdvh8U1@mid.individual.net>, jaimie@usually.sessile.org
> > says...
> >>
> >> On 11 May 2021 at 10:49:00 BST, "Philip Herlihy"
> >> <thiswillbounceback@you.com> wrote:
> >>
> >> > In article <YYbmI.600187$qNp.118463@fx39.ams4>, johnny-b-
> >> > good@invalid.ntlworld.com says...
> >> >>
> >> >> On Mon, 10 May 2021 15:30:13 +0100, GB wrote:
> >> >>
> >> >> > Just thinking about ransomware, would a NAS or Linux system used for
> >> >> > backup be more resilient against ransomware? I assume most ransomware
> >> >> > runs on PCs, but if the PC can write to the NAS, presumably it can
> >> >> > overwrite the files on it with an encrypted version?
> >> >>
> >> >> If the NAS disk volumes are mapped to drive letters on the victim PC,
> >> >> that's true enough otherwise they should be safe if you only access them
> >> >> via a less 'convenient' mechanism (UNC paths? - I'm a little hazy on the
> >> >> details here).
> >> >>
> >> >> You can do a DDG search for more info on the current state of the risks
> >> >> involved - it's been several years since I last read anything about this
> >> >> topic.
> >> >
> >> > I read a credible recent report saying malware was out there that could
> >> > identify unmapped partitions containing data, map a drive letter to them, and
> >> > encrypt them. So in-machine backup data I'd hidden this way, um, isn't.
> >>
> >> If they're shares that are advertised on the network, with no security
> >> or you've saved the user/pass into your own account, yep.
> >>
> >> Cheers - Jaimie
> >
> > No, I thought I'd been smarter than that. I copied several months' worth of
> > backups onto a dedicated partition,which I then "hid" using "Diskpart Remove
> > letter=X". But apparently malware has been spotted which can find such
> > partitions, access them, and encrypt them.
> >
> > We're doomed, I tell ye...
>
> Might work if you twiddle the bits of the partition ID so it doesn't
> match a FAT/NTFS variant I suppose. But if you're going to the effort of
> an occasional offline backup, put it on a USB HDD and keep it in a
> different building.
>
> Cheers - Jaimie

What had seemed nice about this dodge was that I could do it remotely on a
customer's machine.

--

Phil, London

Re: Ransomware

<ig22ugFsn67U1@mid.individual.net>

  copy mid

https://www.novabbs.com/aus+uk/article-flat.php?id=908&group=uk.comp.homebuilt#908

  copy link   Newsgroups: uk.comp.homebuilt
Path: i2pn2.org!i2pn.org!weretis.net!feeder8.news.weretis.net!lilly.ping.de!fu-berlin.de!uni-berlin.de!individual.net!not-for-mail
From: jai...@usually.sessile.org (Jaimie Vandenbergh)
Newsgroups: uk.comp.homebuilt
Subject: Re: Ransomware
Date: 12 May 2021 13:19:12 GMT
Lines: 68
Message-ID: <ig22ugFsn67U1@mid.individual.net>
References: <s7bg1k$9t3$1@dont-email.me> <MPG.3b04ac7b69a9fb33989935@news.eternal-september.org> <ifvlq4Fef69U1@mid.individual.net> <MPG.3b051438860cf52f989937@news.eternal-september.org>
Mime-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=fixed
Content-Transfer-Encoding: 8bit
X-Trace: individual.net NhMOilWuT+o37r51MmsX4wQmz+N6q5aHB03Nx34ksK9Qc0LDP7
Cancel-Lock: sha1:XysVv8WI6f0kkpwVIgHvJIGWnTo=
User-Agent: Usenapp/1.07.2/l for MacOS - Full License
 by: Jaimie Vandenbergh - Wed, 12 May 2021 13:19 UTC

On 12 May 2021 at 10:50:03 BST, "Philip Herlihy"
<thiswillbounceback@you.com> wrote:

> In article <ifvlq4Fef69U1@mid.individual.net>, jaimie@usually.sessile.org
> says...
>>
>> On 11 May 2021 at 16:00:44 BST, "Philip Herlihy"
>> <thiswillbounceback@you.com> wrote:
>>
>> > In article <ifvja5Fdvh8U1@mid.individual.net>, jaimie@usually.sessile.org
>> > says...
>> >>
>> >> On 11 May 2021 at 10:49:00 BST, "Philip Herlihy"
>> >> <thiswillbounceback@you.com> wrote:
>> >>
>> >> > In article <YYbmI.600187$qNp.118463@fx39.ams4>, johnny-b-
>> >> > good@invalid.ntlworld.com says...
>> >> >>
>> >> >> On Mon, 10 May 2021 15:30:13 +0100, GB wrote:
>> >> >>
>> >> >> > Just thinking about ransomware, would a NAS or Linux system used for
>> >> >> > backup be more resilient against ransomware? I assume most ransomware
>> >> >> > runs on PCs, but if the PC can write to the NAS, presumably it can
>> >> >> > overwrite the files on it with an encrypted version?
>> >> >>
>> >> >> If the NAS disk volumes are mapped to drive letters on the victim PC,
>> >> >> that's true enough otherwise they should be safe if you only access them
>> >> >> via a less 'convenient' mechanism (UNC paths? - I'm a little hazy on the
>> >> >> details here).
>> >> >>
>> >> >> You can do a DDG search for more info on the current state of the risks
>> >> >> involved - it's been several years since I last read anything about this
>> >> >> topic.
>> >> >
>> >> > I read a credible recent report saying malware was out there that could
>> >> > identify unmapped partitions containing data, map a drive letter to them, and
>> >> > encrypt them. So in-machine backup data I'd hidden this way, um, isn't.
>> >>
>> >> If they're shares that are advertised on the network, with no security
>> >> or you've saved the user/pass into your own account, yep.
>> >>
>> >> Cheers - Jaimie
>> >
>> > No, I thought I'd been smarter than that. I copied several months' worth of
>> > backups onto a dedicated partition,which I then "hid" using "Diskpart Remove
>> > letter=X". But apparently malware has been spotted which can find such
>> > partitions, access them, and encrypt them.
>> >
>> > We're doomed, I tell ye...
>>
>> Might work if you twiddle the bits of the partition ID so it doesn't
>> match a FAT/NTFS variant I suppose. But if you're going to the effort of
>> an occasional offline backup, put it on a USB HDD and keep it in a
>> different building.
>>
>> Cheers - Jaimie
>
> What had seemed nice about this dodge was that I could do it remotely on a
> customer's machine.

I recommend BackBlaze :)

Cheers - Jaimie
--
"If you can't make fun of it, it's probably not worth taking seriously"
-- http://survivingtheworld.net/Lesson494.html

Re: Ransomware

<FFSmI.292314$k0F8.250360@fx27.ams4>

  copy mid

https://www.novabbs.com/aus+uk/article-flat.php?id=909&group=uk.comp.homebuilt#909

  copy link   Newsgroups: uk.comp.homebuilt
Path: i2pn2.org!i2pn.org!weretis.net!feeder8.news.weretis.net!newsreader4.netcologne.de!news.netcologne.de!npeer.as286.net!npeer-ng0.as286.net!peer02.ams1!peer.ams1.xlned.com!news.xlned.com!peer01.ams4!peer.am4.highwinds-media.com!news.highwinds-media.com!fx27.ams4.POSTED!not-for-mail
From: johnny-b...@invalid.ntlworld.com (Johnny B Good)
Subject: Re: Ransomware
Newsgroups: uk.comp.homebuilt
References: <s7bg1k$9t3$1@dont-email.me>
<spCmI.161386$RTM1.73508@fx09.ams4> <ig0ivmFju2lU1@mid.individual.net>
<_vImI.462413$hcZe.26309@fx46.ams4> <s7fona$5mq$1@gioia.aioe.org>
User-Agent: Pan/0.139 (Sexual Chocolate; GIT bf56508
git://git.gnome.org/pan2)
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Lines: 53
Message-ID: <FFSmI.292314$k0F8.250360@fx27.ams4>
X-Complaints-To: http://netreport.virginmedia.com
NNTP-Posting-Date: Wed, 12 May 2021 15:40:21 UTC
Organization: virginmedia.com
Date: Wed, 12 May 2021 15:40:21 GMT
X-Received-Bytes: 3110
 by: Johnny B Good - Wed, 12 May 2021 15:40 UTC

On Wed, 12 May 2021 05:22:51 +0000, RJH wrote:

> On 12 May 2021 at 05:07:22 BST, "Johnny B Good"
> <johnny-b-good@invalid.ntlworld.com> wrote:
>
>> On Tue, 11 May 2021 23:40:38 +0000, Jaimie Vandenbergh wrote:
>>
>>> On 11 May 2021 at 22:10:48 BST, "Johnny B Good"
>>> <johnny-b-good@invalid.ntlworld.com> wrote:
>>>
>>>> It may not be any more secure but I aught to finally see full Gbe
>>>> speeds
>>>> between my desktop and the "FreeNAS" box using the SMB protocol
>>>> (unlike Linux's 67% at best so far to date). Linux in my 10+ years
>>>> experience, whether as a server or a client, has always fallen
>>>> woefully short of performance in this regard.
>>>
>>> If it helps, I've had over 900megabytes/sec over 10gigE from my
>>> FreeBSD based NAS to my Mac.
>>>
>>> Takes nine hard drives to get that sort of speed though. TrueNAS is
>>> the bistro on the NAS.
>>>
>> That's quite impressive! I don't think, with a Mac in this mix, you'd
>> have been using SMB in this case (Appletalk?).
>>
>> I'd been trying for a few years after upgrading to GBe, to get the
>> over
>> the wire speed past the 50% mark between my win2k desktop and the
>> FreeNAS box, trying various PCI GBe adapters to get over the 60MB/s
>> write speed limit into the NAS (read speeds being around 55MB/s max
>> with GB sized media files), continuing with the built in GBe LAN ports
>> on the MoBo upgrades to both desktop and NAS which gave very little
>> improvement (64MB/
>> s max write speeds
>
> FWIW, my up-to-date iMac throws large files about at 100MB/s to a
> low-end Synology NAS. Hesitate to say this, but fast enough . . .

An echo of the statement, "640K is enough for everyone!" attributed to
Bill Gates eh? :-)

I'm of the same mind - I'll be a happy enough bunny if I can see the
same performance I'd experienced with that win7 desktop over six years
ago when I do eventually get round to testing out a BSD based desktop OS.

Oh, and BTW, I do realise (after hitting "send" of course) that I'd
gotten the capitalisation the wrong way round in "GBe". I rarely need to
use this LAN speed descriptor which, I now seem to recall, should be GbE
(Gbit Ethernet).

--
Johnny B Good

Re: Ransomware

<MPG.3b0f076f89dd5b1298993f@news.eternal-september.org>

  copy mid

https://www.novabbs.com/aus+uk/article-flat.php?id=954&group=uk.comp.homebuilt#954

  copy link   Newsgroups: uk.comp.homebuilt
Path: i2pn2.org!i2pn.org!eternal-september.org!reader02.eternal-september.org!.POSTED!not-for-mail
From: thiswill...@you.com (Philip Herlihy)
Newsgroups: uk.comp.homebuilt
Subject: Re: Ransomware
Date: Wed, 19 May 2021 12:31:35 +0100
Organization: A noiseless patient Spider
Lines: 29
Message-ID: <MPG.3b0f076f89dd5b1298993f@news.eternal-september.org>
References: <s7bg1k$9t3$1@dont-email.me> <YYbmI.600187$qNp.118463@fx39.ams4> <MPG.3b04636b728e687d989934@news.eternal-september.org> <ifvja5Fdvh8U1@mid.individual.net> <MPG.3b04ac7b69a9fb33989935@news.eternal-september.org> <ifvlq4Fef69U1@mid.individual.net> <MPG.3b051438860cf52f989937@news.eternal-september.org>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Injection-Info: reader02.eternal-september.org; posting-host="11b1c56e6f3675ceedddbbc78188d650";
logging-data="9994"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18JgLmm4340tFYJzXAToXXbGHxMlXi9Zjs="
User-Agent: MicroPlanet-Gravity/3.0.10 (GRC)
Cancel-Lock: sha1:ZDEb9x2c3hkttrUistvhHD3w0Jk=
 by: Philip Herlihy - Wed, 19 May 2021 11:31 UTC

In article <MPG.3b051438860cf52f989937@news.eternal-september.org>,
thiswillbounceback@you.com says...
>

> > >
> > > No, I thought I'd been smarter than that. I copied several months' worth of
> > > backups onto a dedicated partition,which I then "hid" using "Diskpart Remove
> > > letter=X". But apparently malware has been spotted which can find such
> > > partitions, access them, and encrypt them.
> > >
> > > We're doomed, I tell ye...
> >
> > Might work if you twiddle the bits of the partition ID so it doesn't
> > match a FAT/NTFS variant I suppose. But if you're going to the effort of
> > an occasional offline backup, put it on a USB HDD and keep it in a
> > different building.
> >
> > Cheers - Jaimie
>
> What had seemed nice about this dodge was that I could do it remotely on a
> customer's machine.

Spotted the link about this new strain of malware.
https://www.itpro.co.uk/security/359580/new-darkside-ransomware-variant-
targets-disk-partitions

--

Phil, London

1
server_pubkey.txt

rocksolid light 0.9.8
clearnet tor