<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Ransomware/Cryptoware prevention in Network and Storage Protocols</title>
    <link>https://community.netapp.com/t5/Network-and-Storage-Protocols/Ransomware-Cryptoware-prevention/m-p/100997#M7587</link>
    <description>&lt;P&gt;Hi!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Recently one of our customers was hit by a ransomware/cryptoware.&lt;/P&gt;
&lt;P&gt;The have a NAS server with CIFS which holds home and common folders.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;A couple of clients in the customer environment got some&amp;nbsp;suspicious emails that they probably opened.&lt;/P&gt;
&lt;P&gt;And their client AND all mapped shares on the NAS server was then encrypted (all MS Office files changed the file names)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;They didn´t wanna do a restore on the whole volume, as they didn´t wanna loose any progress of the files NOT affected.&lt;/P&gt;
&lt;P&gt;So what we ended up doing was to do a vol clone on the snapshot created the day before the incident and then run a powershell script to scan/delete and replace the affected files with the clone as source.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Now we had a "lessons learned" meeting with the customer, and they was wondering how to prevent a simular attack.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Is there a function to get alert, if a client changes alot of files in a short time period&lt;/LI&gt;
&lt;LI&gt;Is there a function to prevent executable files to change files on NAS folders&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is there any other options/ideas to implement to prevent these attacks?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 24 Feb 2015 17:46:16 GMT</pubDate>
    <dc:creator>connoisseur</dc:creator>
    <dc:date>2015-02-24T17:46:16Z</dc:date>
    <item>
      <title>Ransomware/Cryptoware prevention</title>
      <link>https://community.netapp.com/t5/Network-and-Storage-Protocols/Ransomware-Cryptoware-prevention/m-p/100997#M7587</link>
      <description>&lt;P&gt;Hi!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Recently one of our customers was hit by a ransomware/cryptoware.&lt;/P&gt;
&lt;P&gt;The have a NAS server with CIFS which holds home and common folders.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;A couple of clients in the customer environment got some&amp;nbsp;suspicious emails that they probably opened.&lt;/P&gt;
&lt;P&gt;And their client AND all mapped shares on the NAS server was then encrypted (all MS Office files changed the file names)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;They didn´t wanna do a restore on the whole volume, as they didn´t wanna loose any progress of the files NOT affected.&lt;/P&gt;
&lt;P&gt;So what we ended up doing was to do a vol clone on the snapshot created the day before the incident and then run a powershell script to scan/delete and replace the affected files with the clone as source.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Now we had a "lessons learned" meeting with the customer, and they was wondering how to prevent a simular attack.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Is there a function to get alert, if a client changes alot of files in a short time period&lt;/LI&gt;
&lt;LI&gt;Is there a function to prevent executable files to change files on NAS folders&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is there any other options/ideas to implement to prevent these attacks?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Feb 2015 17:46:16 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Network-and-Storage-Protocols/Ransomware-Cryptoware-prevention/m-p/100997#M7587</guid>
      <dc:creator>connoisseur</dc:creator>
      <dc:date>2015-02-24T17:46:16Z</dc:date>
    </item>
    <item>
      <title>Re: Ransomware/Cryptoware prevention</title>
      <link>https://community.netapp.com/t5/Network-and-Storage-Protocols/Ransomware-Cryptoware-prevention/m-p/113741#M8129</link>
      <description>&lt;P&gt;We had a couple of more incidnets with ransomware.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I thought of fpolicy.&lt;/P&gt;&lt;P&gt;Can we create an fpolicy to prevent someone to encrypt the files.&lt;/P&gt;&lt;P&gt;All files are left, but they are named file.encrypted instead of file.excel for exampel.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Does anyone know how the ransom engine works.&lt;/P&gt;&lt;P&gt;Does it copy the original file and paste an ecrypted version?&lt;/P&gt;&lt;P&gt;Or does it just rename it?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;if it copys and replace it.. I don´t think a fpolicy is goog, because then it can remove all files and the option to get lists with affected files are then gone.&lt;/P&gt;&lt;P&gt;If it only renames it, it might work&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thoughts?&lt;/P&gt;</description>
      <pubDate>Tue, 15 Dec 2015 15:11:31 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Network-and-Storage-Protocols/Ransomware-Cryptoware-prevention/m-p/113741#M8129</guid>
      <dc:creator>connoisseur</dc:creator>
      <dc:date>2015-12-15T15:11:31Z</dc:date>
    </item>
    <item>
      <title>Re: Ransomware/Cryptoware prevention</title>
      <link>https://community.netapp.com/t5/Network-and-Storage-Protocols/Ransomware-Cryptoware-prevention/m-p/116351#M8243</link>
      <description>&lt;P&gt;Have a look of this blog :&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.tobbis-blog.de/netapp-ontap-fileserver-gegen-ransomware-abschotten/" target="_blank"&gt;http://www.tobbis-blog.de/netapp-ontap-fileserver-gegen-ransomware-abschotten/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Stefan&lt;/P&gt;</description>
      <pubDate>Fri, 26 Feb 2016 09:25:37 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Network-and-Storage-Protocols/Ransomware-Cryptoware-prevention/m-p/116351#M8243</guid>
      <dc:creator>maxuptime</dc:creator>
      <dc:date>2016-02-26T09:25:37Z</dc:date>
    </item>
    <item>
      <title>Re: Ransomware/Cryptoware prevention</title>
      <link>https://community.netapp.com/t5/Network-and-Storage-Protocols/Ransomware-Cryptoware-prevention/m-p/116352#M8244</link>
      <description>&lt;P&gt;now i tested the fpolicy and it works fine:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;nodeb&amp;gt; fpolicy create f_Ransomware screen
File policy f_Ransomware created successfully.
nodeb&amp;gt; fpolicy ext inc set f_Ransomware locky,xxx,zzz
nodeb&amp;gt; fpolicy monitor set f_Ransomware -p cifs,nfs create,rename
nodeb&amp;gt; fpolicy options f_Ransomware required on
nodeb&amp;gt; fpolicy enable f_Ransomware
Warning: User requests may be denied because there are no file screening servers registered with the filer. Are you sure? y
File policy f_Ransomware (file screening) is enabled.&lt;/PRE&gt;&lt;P&gt;now you can´t rename or create any files with extension lockyxxx,zzz&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;regards&lt;/P&gt;&lt;P&gt;stefan&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 26 Feb 2016 09:38:14 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Network-and-Storage-Protocols/Ransomware-Cryptoware-prevention/m-p/116352#M8244</guid>
      <dc:creator>maxuptime</dc:creator>
      <dc:date>2016-02-26T09:38:14Z</dc:date>
    </item>
  </channel>
</rss>

