- cross-posted to:
- technology@lemmy.world
- cross-posted to:
- technology@lemmy.world
cross-posted from: https://lemmy.zip/post/1088852
Archived version: https://archive.ph/cR91h
Archived version: https://ghostarchive.org/archive/F2HRY
cross-posted from: https://lemmy.zip/post/1088852
Archived version: https://archive.ph/cR91h
Archived version: https://ghostarchive.org/archive/F2HRY
As someone who deals with this sort of thing, for ransomware and other destructive intrusions, the first thing they go for is the backups themselves.
Companies that have an second backup copy that is seperate somehow so non-lateral movement isn’t possible are the ones that survive this level of breach.
Or they could just be stupid (cheap) and didn’t have any lol
well they dealt in malware, perhaps they wanted the evidence to be easy to delete in case law enforcement decided to visit
oh_shit_burn_it_all.sh
I go for stupid &cheap, most people think backups is when onedrive and Microsoft reinforces that insane idea with popups).