Quantcast
Ransomware attacks on U of C and RDC - Beyond.ca - Car Forums
Page 1 of 2 1 2 LastLast
Results 1 to 20 of 24

Thread: Ransomware attacks on U of C and RDC

  1. #1
    Join Date
    Apr 2005
    Location
    Somewhere North of Calgary
    My Ride
    Gas guzzler!
    Posts
    116
    Rep Power
    0

    Default Ransomware attacks on U of C and RDC

    http://www.cbc.ca/news/canada/calgar...tack-1.3620979

    http://www.cbc.ca/news/canada/calgar...tack-1.3646120

    Nasty stuff, worked all weekend to scan servers and bring back VDI. Surprised U of C don't have backups.

  2. #2
    Join Date
    Apr 2008
    Location
    calgary
    My Ride
    CLK 55 / 2g Eclipse / EP3
    Posts
    4,422
    Rep Power
    23

    Default

    Do you know why they dont use backups - or were they affected as well?

  3. #3
    Join Date
    Jan 2006
    Location
    Calgary
    My Ride
    Axis powers
    Posts
    2,486
    Rep Power
    24

    Default

    This is old news, they have backups but considering the data they chose to pay the ransom anyways to make sure everything was decrypted
    Sig nuked by mod.

  4. #4
    Join Date
    Jan 2004
    Location
    Calgary, Alberta
    My Ride
    Bicycle
    Posts
    9,279
    Rep Power
    49

    Default

    Originally posted by adam c
    They have backups but considering the data they chose to pay the ransom anyways to make sure everything was decrypted
    The only scenario where this is true is that they consider paying $20K for the key is cheaper than a restore process. (Which could happen either a) union/staff overtime wages or b) outsource contract charges separately for restores.)

    I really wish to learn what really happened to UC in this incident. But I am betting on some users uses local PST that isn't backed up.
    Last edited by Xtrema; 06-23-2016 at 01:49 PM.

  5. #5
    Join Date
    May 2010
    Location
    Calgary,AB
    My Ride
    2015 Kia Forte5 SX
    Posts
    1,008
    Rep Power
    17

    Default

    I found an article somewhere else online that went into a bit more detail about it:

    http://www.scientificamerican.com/ar...-universities/

    Would bitlocker encryption help in either of these situations, I know that U of C do not have bitlocker encryption protection yet. Oh and at the U of C peoples networked drives are also online as public shares, or atleast some of them are, I think it used to be the case for all IT staff but now is restricted and you have to request it.
    Quote Originally Posted by BavarianBeast View Post
    This quote is hidden because you are ignoring this member. Show Quote

    Could have been over 60% if I wasn’t a paper hand bitch

  6. #6
    Join Date
    Jan 2004
    Location
    Calgary, Alberta
    My Ride
    Bicycle
    Posts
    9,279
    Rep Power
    49

    Default

    Originally posted by nzwasp
    Would bitlocker encryption help in either of these situations, I know that U of C do not have bitlocker encryption protection yet. Oh and at the U of C peoples networked drives are also online as public shares, or atleast some of them are, I think it used to be the case for all IT staff but now is restricted and you have to request it.
    Bitlocker will only safeguard against physical theft. Not randomware.

    Say if AHS has patient data exported to a laptop, that laptop better have bitlocker on so data can't be retrieved unless someone can actually log into that laptop.

  7. #7
    Join Date
    Feb 2004
    Location
    Calgary
    My Ride
    '03 ep3
    Posts
    613
    Rep Power
    21

    Default

    The ransomware encrypted the UofC's email datastores. For those of you who know nothing about exchange, you can't just encrypt the mail stores from a client machine unless they had directly mapped the mail stores (which is beyond idiotic).

    What happened was the attackers either gained access directly to one of the mailbox servers or some idiot IT guy initiated the ransomware encryption on the mail server directly.

    Newer versions of exchange use database availability groups that spread the "load" of mail data across multiple servers and the system is designed that if one of the databases dies then mail can be restored from other databases.

    Either they aren't up-to-date or their IT department is a bunch of retards.

    Also, the ransomware will encrypt all mapped drives that the end user has write permissions on. Make sure your organization has granular folder level permissions.
    Last edited by SmAcKpOo; 06-23-2016 at 04:08 PM.

  8. #8
    Join Date
    Sep 2006
    Location
    Secret City, Alberta
    My Ride
    2018 Civic Si coupe
    Posts
    661
    Rep Power
    39

    Default

    MY IT contact there said they were right in the middle of a migration to office 365, backups hadn't been set up yet on the new system. It couldn't have happened at a worse time. 9000 accounts had to be rebuilt, IT staff was sleeping on cots in hallways as they were working 24 hrs.

  9. #9
    Join Date
    Jan 2004
    Location
    Calgary, Alberta
    My Ride
    Bicycle
    Posts
    9,279
    Rep Power
    49

    Default

    Originally posted by SmAcKpOo
    Also, the ransomware will encrypt all mapped drives that the end user has write permissions on. Make sure your organization has granular folder level permissions.
    Already seen it. Nasty shit. I can understand general user felt for it but IT guy and Exchange admin to boot?

    Originally posted by Swank
    MY IT contact there said they were right in the middle of a migration to office 365, backups hadn't been set up yet on the new system. It couldn't have happened at a worse time. 9000 accounts had to be rebuilt, IT staff was sleeping on cots in hallways as they were working 24 hrs.
    So this hit new servers (I assume Exchange 2013 Hybrid with Office 365)?

  10. #10
    Join Date
    Sep 2006
    Location
    Secret City, Alberta
    My Ride
    2018 Civic Si coupe
    Posts
    661
    Rep Power
    39

    Default

    It's my understanding that it hit both new and old server, Lync also got slaughtered. I'm not very familiar with Lync, I assume it ties in tightly with exchange, which would explain it going down with the ship.

  11. #11
    Join Date
    Jul 2006
    Location
    Calgary
    My Ride
    FJR1300/2018 Giant Trance 3
    Posts
    1,649
    Rep Power
    19

    Default

    .

    "We need a vaccination for stupidity, with booster shots against an unwillingness to learn."

  12. #12
    Join Date
    Apr 2009
    Location
    calgary
    My Ride
    acura TYPE A
    Posts
    399
    Rep Power
    16

    Default

    with all the brains they have at that place could they of not of prevented it? or simply they just didnt care?

  13. #13
    Join Date
    Feb 2004
    Location
    Calgary
    My Ride
    '03 ep3
    Posts
    613
    Rep Power
    21

    Default

    Like I said man, bad IT.

  14. #14
    Join Date
    Oct 2009
    Location
    Unknown
    Posts
    1,157
    Rep Power
    0

    Default

    I've never seen a more nastier infection than Cryptolocker. I mean, with even the worst infection before such, you could resort to slaving the drive, and getting the data.

    Infected customers inevitably ask me 2 questions when they get infected:

    1) How did I get infected if I have an antivirus?

    Short non-polite answer is, "Because antivirus programs are basically snake oil". These antivirus programs simply can't cope with the amount of new variants being produced on a daily basis.

    2) Why isn't this being stopped?

    Short non-polite (but kind of) answer is, "The internet is global, and we have no jurisdiction in China, Russia, and India".

    NA ( the West) is going down, just like every empire does.

    With that said, in certain regard to Crypto, there is a trail leading back to the perpetrators. Problem is, there is no desire to pursue such.

  15. #15
    Join Date
    Apr 2008
    Location
    calgary
    My Ride
    CLK 55 / 2g Eclipse / EP3
    Posts
    4,422
    Rep Power
    23

    Default

    Originally posted by Swank
    MY IT contact there said they were right in the middle of a migration to office 365
    Wow, could the timing be any worse???

  16. #16
    Join Date
    May 2010
    Location
    Calgary,AB
    My Ride
    2015 Kia Forte5 SX
    Posts
    1,008
    Rep Power
    17

    Default

    Originally posted by thetransporter
    with all the brains they have at that place could they of not of prevented it? or simply they just didnt care?
    Lol, I don't think you understand the nature of University level IT.

    Most staff were students who worked from help desk level up into the higher positions. Many of them have no IT experience outside of what they know - there is a deep ingrained logic of "we have never done this any different so why do we need to change" mentality.

    Contractors are usually used to bring in those outside experiences but rarely have the opportunity to seriously change things unless their recommendations are followed. This is not specific to the u of c, it exists in alot of tertiary institutions I have worked at.

  17. #17
    Join Date
    Mar 2009
    Location
    403
    My Ride
    TL
    Posts
    205
    Rep Power
    0

    Default

    Originally posted by nzwasp


    Lol, I don't think you understand the nature of University level IT.

    Most staff were students who worked from help desk level up into the higher positions. Many of them have no IT experience outside of what they know - there is a deep ingrained logic of "we have never done this any different so why do we need to change" mentality.

    Contractors are usually used to bring in those outside experiences but rarely have the opportunity to seriously change things unless their recommendations are followed. This is not specific to the u of c, it exists in alot of tertiary institutions I have worked at.
    I've worked at the U of C IT department. You have some talented people working there, but it's not completely ridiculous for U of C to be caught in the middle of ransom ware.

  18. #18
    Join Date
    May 2010
    Location
    Calgary,AB
    My Ride
    2015 Kia Forte5 SX
    Posts
    1,008
    Rep Power
    17

    Default

    Originally posted by dandia89


    I've worked at the U of C IT department. You have some talented people working there, but it's not completely ridiculous for U of C to be caught in the middle of ransom ware.
    I worked there as well. There are some very smart people - and even the people that have worked their whole lives there are very smart but still...

    Ransomware can happen anywhere, I think its more an education issue for end users at the end of the day.

  19. #19
    Join Date
    Oct 2009
    Location
    Unknown
    Posts
    1,157
    Rep Power
    0

    Default

    Originally posted by nzwasp


    I worked there as well. There are some very smart people - and even the people that have worked their whole lives there are very smart but still...

    Ransomware can happen anywhere, I think its more an education issue for end users at the end of the day.
    I think its more an education issue for end users at the end of the day.
    That's basically what it's ALL about.

    But good luck with getting an IT department to prevent "I need my Pogo games" and clicking on everything in sight.

  20. #20
    Join Date
    Mar 2008
    Location
    Calgary
    My Ride
    Busa
    Posts
    404
    Rep Power
    17

    Default

    If you're migrating mailboxes without a backup you're doing it wrong. And if those mailboxes contain people's "life's work" then you're really doing it wrong.

    Thank god it was just cryptolocker. God forbid a non-recoverable disaster occurred.

    If you run or work in an IT department like that, get your shit together. That's sloppy on a whole different level.

Page 1 of 2 1 2 LastLast

Similar Threads

  1. Ransomware virus

    By cancer man in forum Computer Help Desk
    Replies: 8
    Latest Threads: 04-26-2014, 03:46 AM
  2. dog attacks in NE - woman with blue minivan and two crazy dogs

    By urban.one in forum Society / Law / Current Events / Politics
    Replies: 22
    Latest Threads: 07-07-2009, 10:33 AM
  3. Direct connection between the attacks of 911 and US Govt.

    By kdwebber in forum Society / Law / Current Events / Politics
    Replies: 1
    Latest Threads: 07-12-2006, 01:52 AM
  4. RDC People where you at?

    By Kirbs17 in forum Campus Chat
    Replies: 0
    Latest Threads: 09-12-2005, 11:04 AM
  5. Tiger attacks Roy of Sigfried and Roy!

    By Danger_Mouse in forum General
    Replies: 22
    Latest Threads: 10-12-2003, 05:07 PM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •