How long is your backup!

Computers screensRestoring backups can take some time! A number of years ago we had a NAS die on us. That was ok because we had it backed up on tape! (you know where this story is going?) Well the restore worked ok, and we were lucky because we could grab what we needed and then worry about the rest later…. but it took well over a week (and a lot of stuffing tapes into a machine) to get that thing  up and running again.

I helped a friend back up her laptop the other day – we used a usb3 drive that had an ssd installed – it took about an hour to restore 6-7 hundred gig’s worth of data. How much data do you have?

One element of contemporary Cyber Security is to have multiple backups so that if you don’t want to pay all that bitcoin to the bad guys, you just start with a new machine (or wipe the old one, if your brave enough) and start from backup.

The problem is of course is that if your whole network or 70 of your machines are now large bricks? How long is that process going to take and how much human power are you going to need to get things running again? Not to mention the cost.

A couple of things to consider is Cyber liability insurance. (although this is still not going to help if your public reputation is part of the issue)

A very good disaster recovery plan that is regularly tested and paid for as part of the on going company budget. The frustrating thing of course is that we hope that you never need this (just like dental work) we hope that things are going to be just fine and all. But hey – stay safe on the inter-webs people…. and maybe consider how long that backup / restore process takes.

If you want to read more about the horrors of being hacked and ransome ware and further discussion of the backup process this article from Brian Kerbs is well worth the read.

 

https://krebsonseurity.com/2021/07/dont-wanna-pay-ransom-gangs-test-your-backups/

xeuledoc

xeuledoc is a tool (hacking?) that can determine the owner of a google doc and often the name and email are available. I’ve been testing it and it seems to work well! Although it seems to only work with publicly shared documents.

The interesting thing is that you may not want your name and email address available to every one! Ever shared info via a google doc? You may be exposing at least your name and email to people who are unscrupulous – might be time to think about all the docs you may have shared! Is it a good thing that your email address and name are linked to this data?

It also seems to work with the “Security setting” anyone who has this link. It will be interesting to see if google “fix” this, and how long it might take.

Note this above example is included in the application as published by its owner.

Github link to application
https://github.com/Malfrats/xeuledoc

Apparently it can also work on
Google Docs – Google Spreadsheets – Google Slides – Google Drawning – Google My Maps – Google Apps Script – Google Jamboard

Terminal escape injection techniques

It’s interesting in that shell scripts (small one’s) seem just like friendly bits of code that you can run. That’s not always the case, it’s probably never a good idea to just download a script and run it (esp using curl or wget). I discovered this very interesting article the other day about terminal escape injection and it works on pretty much every platform – mac, windows linux and even within python!

When in dought use cat -v in fact cat -v may be my new default for viewing code!

https://www.infosecmatter.com/terminal-escape-injection/

Why it’s important to monitor logs

A while back I wrote sshfail. It’s a script to look at attempts on the ssh protocol on servers. You can find it up on git hub if your interested and want to install in your self. https://github.com/nevetsanderson/sshfail .

The interesting thing is that even if you use a non standard port to run ssh on (which is what this data relates to) it’s only a matter of time before modern hackers or bots or some Bs8dutard’s find that information and it gets propergated. Have a look at this raw data.

DateAttemptsips
1/3/20202828
1/4/2020239129
1/5/2020204125
1/6/2020337106
1/7/2020322167
1/8/2020386142
1/9/2020452195
1/10/2020273169
1/11/20205873197
1/12/20204346116
1/13/20208892191
1/14/20206192128
1/15/202000

As you can see things got ugly after about 11 days… from 28 to 5873 attempts on the server per day and within 2 weeks. Also worth considering is how did things go from weeks of no one being able to detect this, to 28 ip address suddenly finding my machine on the same day and then it increasing to 195 (Jan 3-9). I’d love to know what’s going on in the background. How is information is being propergated?

So as you can also observe on the 15 th, I changed the port and things have been have quiet since then but the issue is… If I hadn’t been observant and actually looked at the numbers then I’d be giving the bad guys a chance at reeking havok…

Stay safe out there people, and actually look at your log data!