<div dir="ltr"><div dir="ltr">inline:<br></div><br><div class="gmail_quote"><div dir="ltr" class="gmail_attr">On Sun, Jun 13, 2021 at 5:40 PM Steve B via PLUG-discuss <<a href="mailto:plug-discuss@lists.phxlinux.org">plug-discuss@lists.phxlinux.org</a>> wrote:<br></div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex"><div dir="ltr">Looking for some information regarding networked file systems and ransomware. If my understanding is correct, should a PC get infected with ransomware it can search out and encrypt NFS and SMB shares.</div></blockquote><div><br></div><div>Anything mounted current at point of infection is an obvious target, anything else it can find and attached to a plus. Scanning for tcp/111/2049 for nfs and tcp/139/445 for smb/cifs finds the honeypots once on-lan.<br></div><div> </div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex"><div dir="ltr"><div>Would it be correct to assume that in order to encrypt an NFS or SMB share they would have to be online? If the device on which the network file system was located were powered off, could it be woken via a WOL command and then encrypted?</div></div></blockquote><div><br></div><div>Online and have credentials to connect to it, yes. They could WOL in theory, but probably no one bothers with this. Enterprises tend to segment and defeat most WOL features requiring directed broadcasts by default (usually specific configs, particularly cisco), but SOHO lans perhaps with other crap like apple and dlna multicast. Who actually ever powers off a server, unless a responsible cloud-first company?<br></div><div> </div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex"><div dir="ltr"><div></div><div>I currently have a TrueNAS machine that houses all my media and is also my Plex server. It also has an NFS share to which I backup as needed. In addition I have a Synology NAS to which I have a backup copy of the TrueNAS server. </div></div></blockquote><div><br></div><div>If they can 1) connect to the nfs/smb port, 2) authenticate, and 3) get write permissions, they'll first download what they can, then encrypt it Simple as that. Network segmentation and proper firewall rules in theory prevent #1 there; strong creds, random rotation, 2fa prevents #2, file perms, fsacls, apparmor/selinux prevent #3. Sadly there still isn't much decent av/edr software out there for linux, but 98% of crims target windoze and apple luckily as the low-hanging fruit.</div><div><br></div><div>Don't expose any storage appliance or otherwise IOT-thingy to the internet via port-forwards from your internet router, upnp, or other. Just. Do. Not.<br></div><div><br></div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">
---------------------------------------------------<br>
PLUG-discuss mailing list - <a href="mailto:PLUG-discuss@lists.phxlinux.org" target="_blank">PLUG-discuss@lists.phxlinux.org</a><br>
To subscribe, unsubscribe, or to change your mail settings:<br>
<a href="https://lists.phxlinux.org/mailman/listinfo/plug-discuss" rel="noreferrer" target="_blank">https://lists.phxlinux.org/mailman/listinfo/plug-discuss</a></blockquote></div></div>