Skip to content
 
If you can read this, either the style sheet didn't load or you have an older browser that doesn't support style sheets. Try clearing your browser cache and refreshing the page.

(The Register)   Scottish EPA tells a ransomware gang to go pound our clean McSand   (theregister.com) divider line
    More: Cool, Computer security, Police, Security, United States Environmental Protection Agency, security experts, ongoing ransomware attack, internal systems, full detail of the 1.2GB of information  
•       •       •

890 clicks; posted to STEM » on 19 Jan 2021 at 4:19 PM (5 weeks ago)   |   Favorite    |   share:  Share on Twitter share via Email Share on Facebook



12 Comments     (+0 »)
 
View Voting Results: Smartest and Funniest
 
2021-01-19 11:20:13 AM  
Chan eil e mar gum biodh iad a 'tuigsinn na chaidh a sgrìobhadh, co-dhiù.
 
2021-01-19 4:59:19 PM  
media1.tenor.comView Full Size
 
2021-01-19 5:41:46 PM  
If ye dinna pay up we are ginna prove climate change!
 
2021-01-19 5:53:23 PM  
A WHOLE 1.2GB??? I've got more free storage space in my internet connected chastity cage than that.
 
2021-01-19 6:44:49 PM  

Orallo: A WHOLE 1.2GB??? I've got more free storage space in my internet connected chastity cage than that.


1.2G of cherrypicked useful to steal stuff probably - not 1.2G of random nonsense.  We're talking just basic textual information, that's a lot of stuff.
 
2021-01-19 7:34:50 PM  
Macsand, you stinking Irish Submitter.
 
2021-01-19 8:04:06 PM  

Orallo: A WHOLE 1.2GB??? I've got more free storage space in my internet connected chastity cage than that.


Yeah... I deal with files that are 1GB and directories that are TBs.  If you backup correctly ransomware shouldn't be an issue almost ever.
 
2021-01-19 10:35:35 PM  
You expect Scottish environmentalist to pay to keep possibly embarrassing documents out of circulation? Even if they weren't cheap ass scots, environmentalists would love to have secrets leaked by a third party.
 
2021-01-20 10:19:37 AM  

wildcardjack: You expect Scottish environmentalist to pay to keep possibly embarrassing documents out of circulation? Even if they weren't cheap ass scots, environmentalists would love to have secrets leaked by a third party.


Depends on how long you've been infected but not activated.  If you were infected months ago, then all of your backups are since then are infected too.  So now you're talking months of data gone.  This sounds to me more like they were targeted for specific business info.  Whether to gain access to or destroy.
 
2021-01-20 10:48:15 AM  

zeroflight222: wildcardjack: You expect Scottish environmentalist to pay to keep possibly embarrassing documents out of circulation? Even if they weren't cheap ass scots, environmentalists would love to have secrets leaked by a third party.

Depends on how long you've been infected but not activated.  If you were infected months ago, then all of your backups are since then are infected too.  So now you're talking months of data gone.  This sounds to me more like they were targeted for specific business info.  Whether to gain access to or destroy.


Your backups should be on a separate network entirely, or physically vaulted off-site.  If a ransomware attack takes out your backups, the first order of business is firing your CISO.
 
2021-01-20 12:23:52 PM  

American-Irish eyes: zeroflight222: wildcardjack: You expect Scottish environmentalist to pay to keep possibly embarrassing documents out of circulation? Even if they weren't cheap ass scots, environmentalists would love to have secrets leaked by a third party.

Depends on how long you've been infected but not activated.  If you were infected months ago, then all of your backups are since then are infected too.  So now you're talking months of data gone.  This sounds to me more like they were targeted for specific business info.  Whether to gain access to or destroy.

Your backups should be on a separate network entirely, or physically vaulted off-site.  If a ransomware attack takes out your backups, the first order of business is firing your CISO.


You're talking about getting locked out the same day you're infected, which rarely happens.  In most scenarios, they infect and quietly spread for a long time, silently encrypting files but not doing any damage or restricting anything, yet still infected.  Then the files receive the activation notice, they quickly change, and you get the lock-out message.  You can only restore from a point that they were known to be safe, which may have been months ago if you didn't detect the thing for a long while.

Scenario:  You have normal backups (off-site tape, among others).  You're hit with the "We've got yer files" message.  You find out that your files had been infected 5 months ago.  That means your backups since that point are all infected too.  Not that the infection spread to the backup systems, but that the files that were backed up were already infected.
 
2021-01-20 2:46:10 PM  

Some Junkie Cosmonaut: Orallo: A WHOLE 1.2GB??? I've got more free storage space in my internet connected chastity cage than that.

1.2G of cherrypicked useful to steal stuff probably - not 1.2G of random nonsense.  We're talking just basic textual information, that's a lot of stuff.


Yeah, that's true... but I'm not sure the EPA handles any sort of national security information... maybe some sort of scandal or coverup or embarrasing data... sure... anything worth paying a buttload of money for... I doubt it.
 
Displayed 12 of 12 comments

View Voting Results: Smartest and Funniest

This thread is closed to new comments.

Continue Farking





On Twitter



  1. Links are submitted by members of the Fark community.

  2. When community members submit a link, they also write a custom headline for the story.

  3. Other Farkers comment on the links. This is the number of comments. Click here to read them.

  4. Click here to submit a link.