Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

What? I mean back up your data. Not your whole... computer, or whatever. Install latest software, import data from back up, back in business. It's trivial to tell intact data from ransomed data - the latter looks like random noise, as it's encrypted.

If your backup process "isn't that simple", then you should make it that simple. Otherwise failure looms.



You misunderstand. I'm saying the network has potentially been infiltrated for months, and there's no telling what configuration and files have been altered to facilitate future infiltration. See further discussion here: https://news.ycombinator.com/item?id=23929344

Particularly this conversation: https://news.ycombinator.com/item?id=23951941


Disconnect entire network. Factory reset all devices. Reinstall latest everything.


Clearly you know best




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: