ransomware virus on Linux

Polytropon freebsd at edvax.de
Sat Nov 21 04:57:19 UTC 2015

On Fri, 20 Nov 2015 10:57:37 -0500, Garance A Drosehn wrote:
> On 19 Nov 2015, Charles Swiger wrote:
> > On Nov 19, 2015, at 4:21 PM, RW via freebsd-questions 
> > <freebsd-questions at freebsd.org> wrote:
> >> What worries me is that the next version might target Linux 
> >> workstations
> >> where there's a lot of very complex software running as the owner of
> >> the user data.
> >
> > Ransomware which encrypts your stuff isn't a major problem if you have 
> > a current backup.
> >
> > So, verify that your backups work.
> Which really means:  Verify that your *restores* work!  :)

That's already in the definition: A backup which you cannot
restore is not a backup - it's garbage. :-)

> (Certainly I've seen cases where someone was running backups
> regularly & automatically, and everything looked fine.  But when
> they finally needed to restore something, they found out that those
> backups were not really working, or were working but not backing up
> as much as the user thought they were backing up)

True, I've seen that too. Untested backups with "experts"
relying on them (and other "experts"' assurance that everything
would work if needed). The worst thing _I_ have actually seen
in reality was (many years ago) a customer who's "professional
consultant" had messed up the backup process so nothing was
written to the tapes, and nobody had checked the logs, so
the customer ended up with a box of blank tapes; the box was
labeled "BACKUP". You can imagine how "satistied" the customer
was with his expensive "service" when the worst case happened,
disks crashed, and he would just have to restore yesterday's
backup... :-)

Magdeburg, Germany
Happy FreeBSD user since 4.0
Andra moi ennepe, Mousa, ...

More information about the freebsd-questions mailing list