On this Halloween eve, we’d like to present three true tales of disaster in the data center, why the victims got in trouble and how the Villains got away.
Â
All too often Organizations just like yours focus on the wrong things. They invest tens or hundreds of thousands of dollars in Managed Security (which makes the Corner Office feel protected), without taking care of the simple stuff first.
“The Device Password Attacks”
Once upon a time there existed a major Energy Transportation company. They had all the best technology and spend hundreds of thousand dollars on a well-known Managed Security solution. Auditors had given them great marks on Active Directory password security and their Managed Security solution routinely ran email phishing tests, notifying managers when users opened suspicious attachments. They thought they were well protected.
Â
Unfortunately, their IT team had neglected to harden passwords on devices like firewalls which were used to create VPN connections for users. Worse yet, they had used the same passwords for devices and systems like ESXi and local passwords on Windows. All the Villains had to do was brute-force a firewall password and they had cart-blanche access to the Energy Transportation company’s systems.Â
Â
The moral to the story is to check your device passwords and make sure they are all at least 16 character randomized passwords, stored securely.
“The Threat Actor Migrated Laterally”
In a faraway land existed a fun and friendly Automotive Sales Company with dealerships all over the USA. These were smart cookies who did everything right. Passwords were good, OS versions and firmware were up-to-date and they had a full Disaster Recovery plan with replication to a remote facility in case anything did go wrong.
Â
What Automotive Sales didn’t count on was user apathy. A single Member of the IT team, an admin with access to the master password database, had taken it on his/her own to copy and store passwords in plain text on a document which was later found on Members desktop.
Â
At some point, another (unprivileged) User had clicked a suspicious attachment, giving the Villain remote access to Users desktop.
Â
You might think “no big problem here, because User was unprivileged,” but you’d be wrong! You see, Villain had weeks to snoop Users desktop and at some point an Administrator had logged on to Users desktop, probably to provide support or install an application.
Â
Unfortunately, Active Directory (especially if not up-to-date and at latest Forest levels) is known for the ability to discover passwords of users and Administrators who log on to systems and then move sideways, escalating to other systems on the network with Administrators credentials.
Â
Now this is already bad enough. Villain had weeks to steal information and browse the network, one system at a time. Villain had all they needed to deploy Ransomware right there and cripple Automotive Sales. But what about the Disaster Recovery site? Well, the Villain had discovered the plaintext passwords, including the password to the master database, which included the passwords to the Disaster Recovery environment as well!
Â
When Villain was ready to strike, it was everything at once. Ransom all of the running systems, and then ransom the DR environment too! Automotive Sales came to a standstill.
Â
Fortunately, Automotive Sales had chosen to protect a few of their most critical systems with Immutable Cloud Backups that Villain was unable to touch. While all of their day-to-day operations remained offline because they were protected only by Replication (which Villain destroyed), Automotive Sales was able to quickly recover the heart of their business and slowly rebuild functionality.
Â
The moral of the story is two-fold: First, NEVER store any passwords in plaintext. Second, implement a 3-2-1 compliant backup solution which includes BOTH Replication and Cloud Immutable Backups for all systems.
“The Threat Actor Encrypted all our Backups”
In a dark metropolis existed an Analysis Firm where important things were analyzed every day. Thousands of companies counted on data from Analysis Firm.
Â
One dark and stormy Friday night, a Villain gained access to Analysis Firms systems when one of their users clicked on an attachment from Villain (“you’ve won $1,000,000”).
Â
Villain was able to deploy Ransomware within a matter of minutes, Rendering all of Analysis Firms AD systems useless. Unfortunately, Analysis Firms backup system was also a member of their AD domain, also rendering all of the backups useless as well.
Â
Analysis Firm team members had a good and unknowing weekend, and when they returned to the office on Monday, nothing worked!
Â
The moral of the story is that your backup systems SHOULD NOT be part of your AD domain, and it should use a separate, strong password which is stored securely. Also, this situation could have been prevented if Analysis Firm had implemented a 3-2-1 compliant backup solution, with at least one copy stored securely in the Cloud.
A Happy Ending?
If you contact VMsources, we can implement a full DRaaS solution for your Organization within a matter of days (a week at most) and protect all your critical data with both Replication and Offsite Immutable Backups (full 3-2-1 Compliance). And if Replication isn't in the budget, we can at least protect your data with Immutable Cloud Backups, so you can restore when something happens.
Â
What's the difference between DRaaS (Replication) and Immutable Cloud Backups?
- With true DRaaS (Replication), you can fail-over to our VMware VCloud immediately when a disaster occurs, giving your Organization a RTO of 1-hour or less. Also, resources like IP addresses are pre-assigned, and networking is pre-configured, further speeding the process.
- With Immutable Cloud Backups only, the systems must be restored to our VMware vCloud before they can be failed-over to, giving a typical RTO of 12-24 hours. Also, resources like IP addresses must be assigned at the time of restore (before fail-over can occur) and networking must be configured.
Â
Best of all, new customers get 90 Days Free with any DRaaS or Offsite Backup
Â