Quantcast
Channel: R&D Forums
Viewing all articles
Browse latest Browse all 1764

VMware vSphere • Re: Veeam 12.1.1 do not detect hacker encrypt volumes with Bitlocked

$
0
0
1. Using bitlocker is not very common.
-> It do not protect agaist ramsonware
-> It makes unable to restore individual files most cases
-> It makes Backup data much bigger
2. Bitlocker is very efficience tool for todays hackers espesially if ramsonware detecting software (Veeam) do not detect this as data mess attackt
-> there are several ways to enable bitlocker Powershell, AD-group policy etc, no need get special software injected to server environment.
-> hackers can enable bitloker and actually lock the filesystem after several moth to verify all backupdata is also encrypted.

Veeam bring new feature to compare changes about backdata to detect possible encryption attack
If someone (known or unknown) enabled Bitlocker on server, would it be at least nice to get a note: "looks new backup data have all changed compared previous backup. Is this expected ?"

It is not a big deal to create a buttom: "detect all kind enclryption chages": enable/disable

If you google about "hacker uses windows bitlocker" you will get several examples....
Repeating myself: Personally I have see environment destroyed with MS Bitlocker, ½ year backups also......

Statistics: Posted by esa.riikonen — Apr 24, 2024 8:30 pm



Viewing all articles
Browse latest Browse all 1764

Trending Articles