Heard one of the best presentations ever today at the Tri State Telecom Conf in 
Sun Valley, Id.  It was a real world story told by the CEO of Syringa Networks.

He said he would share his PPT.  If he does I will post it there.  It was 
striking how he described how professional the extortion guys were.  They even 
offered references to assure them if they paid they would get their files back. 
 They paid the ransom in bitcoin.  The FBI was zero help.  It was actually 
their insurance company that provided the most helpful guidance.  The insurance 
company said “relax, we do this 5 times a month”.

He would not say how much it cost them.  He recommends  you pay if  you are 
dealing with an “ethical” extortion company.  

They have transitioned away from anything microsoft as much as possible.  
Giving everyone ipads or macs.  Making everything cloud based.  2FA 
authentication using fobs (I think).  Airgapped local backups.  

It was a two stage attack.  First came from a worker taking a laptop home and 
getting infected with something that then was brought to work to spread.  They 
stampped it out.  Apparently that virus collected info that was sold to the 
ransomware company that used it to expertly infect their whole network.

One take away is DO NOT REBOOT.  If you do you are screwed.
He said linux systems running on a VM running on a windows machine were fine, 
but the machine was frozen.  They could  not do anything with it. 
-- 
AF mailing list
AF@af.afmug.com
http://af.afmug.com/mailman/listinfo/af_af.afmug.com

Reply via email to