Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
Dirt Road Junglist
Oct 8, 2010

We will be cruel
And through our cruelty
They will know who we are

Sickening posted:

You should have sued them. Easy wrongful termination in there somewhere.

Suing requires resources. I was in my mid twenties with ongoing health issues, massive medical and student debt, and no family ties to anyone with lawyer powers. It was easier to cut my losses and find a new job.

Which is unfortunate, because I also had good cause on a sexual harassment complaint, too. But again, no resources to drag them into court with.

Adbot
ADBOT LOVES YOU

Ham Equity
Apr 16, 2013

i hosted a great goon meet and all i got was this lousy avatar
Grimey Drawer

Sickening posted:

You should have sued them. Easy wrongful termination in there somewhere.
Given that this is in Portland, OR... not really, no. You're lucky to get unemployment in the U.S. for something like that.

Dirt Road Junglist
Oct 8, 2010

We will be cruel
And through our cruelty
They will know who we are

Thanatosian posted:

Given that this is in Portland, OR... not really, no. You're lucky to get unemployment in the U.S. for something like that.

Even worse, it was Montana.

And I worked for a civil engineering firm that mostly worked off of public contracts during the "shovel ready" years of government grants.

You tell me who's gonna win that fight, the people who build roads and bridges for the state, or the woman claiming she was hard done by her boss and/or the co-worker who slopped his dick all over her leg at a Christmas party and then told her platonic male friend to gently caress her and report back because his wife wouldn't let him?

Bigass Moth
Mar 6, 2004

I joined the #RXT REVOLUTION.
:boom:
he knows...
The woman would probably win?

Weatherman
Jul 30, 2003

WARBLEKLONK

Bigass Moth posted:

The woman would probably win?

:wrong:

The coworker would be nominated for Chief Justice of the Supreme Court.

my cat is norris
Mar 11, 2010

#onecallcat

Since we've now sent public notices to our clients, I guess I can safely post about the fact that our primary SQL server got hosed by ransomware, resulting in a three day product outage (so far). Law enforcement and outside security specialists are involved in rectifying the issue. As a software provider to the healthcare industry, our databases are stuffed full of PHI, so this has been an ugly few days for our ops team. The one team lead has been working virtually non-stop since Tuesday night at 10:15pm, and another of our guys has been camped out in a data center two hours from the main office.

I'm lower down the totem pole AND my role is internal-only, so none of this really touches me. The worst I've had to deal with is everyone in the company speculating about what the gently caress happened. I've known since Tuesday that it was a ransomware incident, but I wasn't allowed to say jack poo poo until last night's communication. Everyone's basically in meltdown mode. I'm sitting here wondering how hosed the company is at large. They SAY nothing happened to the PHI data, but I don't think I'll really know more until a formal postmortem is issued.

PremiumSupport
Aug 17, 2015
The good news for the company is that if it was just a ransomware attack they're probably correct in saying none of the PHI was compromised. Still sucks though, and good luck getting any of that data unencrypted. Hope they had good backups!

Nth Doctor
Sep 7, 2010

Darkrai used Dream Eater!
It's super effective!


my cat is norris posted:

primary SQL server got hosed by ransomware

:stonk:

my cat is norris
Mar 11, 2010

#onecallcat

PremiumSupport posted:

The good news for the company is that if it was just a ransomware attack they're probably correct in saying none of the PHI was compromised. Still sucks though, and good luck getting any of that data unencrypted. Hope they had good backups!

I don't know a hell of a lot about SQL's built-in data encryption or whatever disk encryption our company is using, but it sounds like everything was encrypted to hell and back, so even if the ransomware thieves made off with anything, they'd have to figure out how to decrypt the protected data.

There's going to be a formal case study in about 30 days. It'll be conducted by an outside firm. If that gets posted somewhere, I'll be sure to share it. It sounds like the whole mess is pretty interesting even if it is pretty hosed.

Rooted Vegetable
Jun 1, 2002
No one has asked the backups question yet...?

nexxai
Jul 17, 2002

quack quack bjork
Fun Shoe

Heners_UK posted:

No one has asked the backups question yet...?

https://gfycat.com/uniformspecificharvestmouse-john-mcginley-zach-braff-scrubs

my cat is norris
Mar 11, 2010

#onecallcat

Heners_UK posted:

No one has asked the backups question yet...?

The DR connection was shut off to prevent propagation of the ransomware. We're apparently loading other back-ups into a whole new server; that was one of the first processes really started.

Arquinsiel
Jun 1, 2006

"There is no such thing as society. There are individual men and women, and there are families. And no government can do anything except through people, and people must look to themselves first."

God Bless Margaret Thatcher
God Bless England
RIP My Iron Lady

my cat is norris posted:

our primary SQL server got hosed by ransomware
All the goon :guinness: this weekend is raised in your honour.

Sirotan
Oct 17, 2006

Sirotan is a seal.


PremiumSupport posted:

The good news for the company is that if it was just a ransomware attack they're probably correct in saying none of the PHI was compromised. Still sucks though, and good luck getting any of that data unencrypted. Hope they had good backups!

There's really no good news when an incident involving patient data makes it to the press.

Rooted Vegetable
Jun 1, 2002

my cat is norris posted:

The DR connection was shut off to prevent propagation of the ransomware. We're apparently loading other back-ups into a whole new server; that was one of the first processes really started.

Gold star!

bonelessdongs
Jul 17, 2019

Heners_UK posted:

No one has asked the backups question yet...?

We don't need no stinkin backups

22 Eargesplitten
Oct 10, 2010



This person is a sysadmin:

I tell them that the reason their system is down is that the drive it’s installed on is not appearing on the server.

“That’s nearly impossible, it’s in a RAID. I mean I had some disk issues this morning but it should be fine.”

He shows me the raid controller software displaying a big red FAILED for one of the logical disks.

Neddy Seagoon
Oct 12, 2012

"Hi Everybody!"
Have they figured out what they attack vector was? Because either there's something unpatched or someone's really for the high-jump with unacceptable internet usage on the network.



gently caress you for reminding me of that episode :smith:.

my cat is norris
Mar 11, 2010

#onecallcat

Neddy Seagoon posted:

Have they figured out what they attack vector was? Because either there's something unpatched or someone's really for the high-jump with unacceptable internet usage on the network.

Not to my knowledge. If they know, they're keeping it quiet for now.

Only a handful of domain admins exist, and only domain admins can log into the server for anything more advanced than running queries against the database, so if someone hosed up they really have no excuse. At least an everyday end user can be like "idk wtf I'm doing lol."

my cat is norris
Mar 11, 2010

#onecallcat

More information was released about the ransomware.

It targets Windows servers only and runs through PowerShell. It encrypts data, but doesn't capture it, read it, or send it off to anyone. The only file that remains accessible on the machine is a readme with instructions for responding to the ransom. Still nothing on how it actually got onto the server, but it sounds like we're making a full recovery.

On the downside, one of our ops members got like stupid sick with stress and exhaustion! :ohdear: I think everyone on the team is going to be super well-comped and given some days to recuperate once this is over, though.

This is kinda drifting outside the purposes of this thread but we're all familiar enough with scope creep that I think you'll be able to forgive me.

Kyrosiris
May 24, 2006

You try to be happy when everyone is summoning you everywhere to "be their friend".



my cat is norris posted:

This is kinda drifting outside the purposes of this thread but we're all familiar enough with scope creep that I think you'll be able to forgive me.

Honestly I think we're just all kinda invested in knowing what happens at this point.

Dirt Road Junglist
Oct 8, 2010

We will be cruel
And through our cruelty
They will know who we are

my cat is norris posted:

It targets Windows servers only and runs through PowerShell.

:catstare:

Need to know more intensifies.

Mustache Ride
Sep 11, 2001



Sounds like MegaCortex that popped up earlier this year.

Malachite_Dragon
Mar 31, 2010

Weaving Merry Christmas magic

Kyrosiris posted:

Honestly I think we're just all kinda invested in knowing what happens at this point.
:agreed:
I don't even work in this field and I want to know how everything works out. We're rooting for you!

Arquinsiel
Jun 1, 2006

"There is no such thing as society. There are individual men and women, and there are families. And no government can do anything except through people, and people must look to themselves first."

God Bless Margaret Thatcher
God Bless England
RIP My Iron Lady

my cat is norris posted:

This is kinda drifting outside the purposes of this thread
No it isn't
:justpost:

Renegret
May 26, 2007

THANK YOU FOR CALLING HELP DOG, INC.

YOUR POSITION IN THE QUEUE IS *pbbbbbbbbbbbbbbbbt*


Cat Army Sworn Enemy

Malachite_Dragon posted:

We're rooting for you!

I'm not :evilbuddy:

I just like seeing how bad things can get. Honestly, I think it's just the natural progression for working in a position that deals specifically with outages. It's like when a weatherman gets super excited over a giant hurricane or tornado that does a gazillion dollars in damage and makes thousands of people flee in fear.

On Tuesday, our biggest data center got struck by lightning. The equipment was fine, but the resulting power surge caused every AC unit to shut down, and we couldn't get them to start up again until a bunch of safety features were bypassed. Within 30 minutes, the entire building was hotter than the surface of the sun and everything shut down.

I'm unreasonably disappointed that I wasn't there when it happened, because I get this weird giddy feeling during major service outages. The bigger, the better. My exciting role the next day was fixing the terribly documented ticket, figuring specific customer impacts, nailing down the timeline, and otherwise assisting the RCA. BOOOOORING

AlexDeGruven
Jun 29, 2007

Watch me pull my dongle out of this tiny box


Neddy Seagoon posted:

gently caress you for reminding me of that episode :smith:.

This. Wasn't prepared for being punched directly in the feels this morning. That loving ep.

my cat is norris
Mar 11, 2010

#onecallcat

Mustache Ride posted:

Sounds like MegaCortex that popped up earlier this year.

I'd think so, too, but the ransom note is missing any dumb Matrix references. One created process was cipher.exe, if that points anyone in the right direction.

There was also no solution available through https://www.nomoreransom.org/en/decryption-tools.html but I'm not sure how unusual that is.

my cat is norris fucked around with this message at 16:47 on Jul 27, 2019

my cat is norris
Mar 11, 2010

#onecallcat

Oh okay according to an email that went out an hour ago the ransomware variant is "Readme."

Identified "malicious IPs" are based in Chicago, Frankfurt, Chicago again, Montreal, and Gdansk. Probably all VPN fuckery.

my cat is norris fucked around with this message at 16:54 on Jul 27, 2019

spankmeister
Jun 15, 2008






my cat is norris posted:

Oh okay according to an email that went out an hour ago the ransomware variant is "Readme."

Identified "malicious IPs" are based in Chicago, Frankfurt, Chicago again, Montreal, and Gdansk. Probably all VPN fuckery.

Rackspace, Hetzner, OVH probably. Don't know the Gdansk one.

my cat is norris
Mar 11, 2010

#onecallcat

Everything is due to be online again tomorrow at 6 AM. Today was spent bringing SQL and other servers back to the internet at large. I think we're through this? I hope so!

Quoting some stuff from the client-facing posting, most of which makes no sense to me but I hope some of you'll find interesting:

quote:

The variant of ransomware is Readme. Per our forensics, as we have performed our kill chain analysis, we have observed the following indicators within the environment that we believe that the threat actor has mainly used: Sysfile64, rundll32.exe, powershell.exe.

We have successfully identified, contained, and removed multiple tools that the attacker was using. Our forensic team is deconstructing these tools and we will share more as we continue to learn.

Additionally, we are blocking the following which have process injection on this or past matters with this threat actor. This list will likely grow as we continue our investigation.

C​:\​​W​in​do​ws​\​​Sy​sW​OW​64​\​​we​rm​gr​.e​xe,
C​:\​​w​in​do​ws​\​​sy​sw​ow​64​\​​cl​ou​dn​ot​if​ic​at​io​ns​.e​xe,
C:\windows\syswow64\atbroker.exe,
C​:\​​W​in​do​ws​\​​Sy​sW​OW​64​\​​Cr​ed​en​ti​al​UI​Br​ok​er​.e​xe,
C:\Windows\SysWOW64\SndVol.exe,
C​:\​​W​in​do​ws​\​​Sy​sW​OW​64​\​​Ca​me​ra​Se​tt​in​gs​UI​Ho​st​.e​xe,
C​:\​​W​in​do​ws​\​​Sy​sW​OW​64​\​​co​nt​ro​l.​ex​e,
**\rundll32.exe,
C​:\​​w​in​do​ws​\​​sy​sw​ow​64​\​​cm​d.​ex​e,
C​:\​​W​in​do​ws​\​​Sy​sW​OW​64​\​​ba​ck​gr​ou​nd​Ta​sk​Ho​st​.e​xe,
C:\Windows\SysWOW64\cmmon32.exe,
C:\Windows\SysWOW64\fontdrvhost.exe,
C​:\​​W​in​do​ws​\​​Sy​sW​OW​64​\​​Ce​rt​En​ro​ll​Ct​rl​.e​xe,
C​:\​​W​in​do​ws​\​​Sy​sW​OW​64​\​​Ba​ck​gr​ou​nd​Tr​an​sf​er​Ho​st​.e​xe,
C:\Windows\SysWOW64\PresentationHost.exe,
C​:\​​W​in​do​ws​\​​Sy​sW​OW​64​\​​mf​pm​p.​ex​e,
C:\Windows\SysWOW64\colorcpl.exe,
C​:\​​W​in​do​ws​\​​Sy​sW​OW​64​\​​dl​lh​os​t.​ex​e,
c:\windows\syswow64\pickerhost.exe,
**\powershell*.exe,
C:\Windows\SysWOW64\icardagt.exe,
C​:\​​W​in​do​ws​\​​Sy​sW​OW​64​\​​cm​st​p.​ex​e,
C​:\​​W​in​do​ws​\​​Sy​sW​OW​64​\​​cr​ed​wi​z.​ex​e,
%appdata\roaming\*\*.exe,
C:\Windows\SysWOW64\cmdl32.exe

Javid
Oct 21, 2004

:jpmf:
I'm not seeing the phrase "complete wipe of all affected systems" which isn't reassuring.

Methanar
Sep 26, 2013

by the sex ghost
Why did the kind of person to click bad email attachments have account permissions to execute anything on a database.

Sprechensiesexy
Dec 26, 2010

by Jeffrey of YOSPOS

Methanar posted:

Why did the kind of person to click bad email attachments have account permissions to execute anything on a database.

C-Level and sales.

my cat is norris
Mar 11, 2010

#onecallcat

Javid posted:

I'm not seeing the phrase "complete wipe of all affected systems" which isn't reassuring.

Oh the affected server(s) went into the hands of forensics and security specialists. They're no longer part of our environment. Anything we've kept that had even the slightest risk of exposure has indeed been thoroughly scrubbed.

Carbon Black is being installed onto everyone's machines as part of a new set of "preventative measures" or something.

Methylethylaldehyde
Oct 23, 2004

BAKA BAKA

my cat is norris posted:

Oh the affected server(s) went into the hands of forensics and security specialists. They're no longer part of our environment. Anything we've kept that had even the slightest risk of exposure has indeed been thoroughly scrubbed.

Carbon Black is being installed onto everyone's machines as part of a new set of "preventative measures" or something.

Carbon Black is pretty great for keeping 99% of the poo poo from not running. Malware infections went from 'a few per day' to 'maybe two a month' once we got it rolled out.

Mustache Ride
Sep 11, 2001



Depends on which carbon black they're talking about. Defense (previously known as Confer) is probably what they're talking about. Protect (previously Bit9) is the one that kills everything. The original Carbon Black is the endpoint forensics tool with the Postgres backend that doesn't scale.

Ditch it all and install CrowdStrike.

Methanar
Sep 26, 2013

by the sex ghost

Mustache Ride posted:

Ditch it all and install CrowdStrike.

Methylethylaldehyde
Oct 23, 2004

BAKA BAKA

Mustache Ride posted:

Depends on which carbon black they're talking about. Defense (previously known as Confer) is probably what they're talking about. Protect (previously Bit9) is the one that kills everything. The original Carbon Black is the endpoint forensics tool with the Postgres backend that doesn't scale.

Ditch it all and install CrowdStrike.

Yeah, we had bit9, and it worked pretty great.

Adbot
ADBOT LOVES YOU

Canuck-Errant
Oct 28, 2003

MOOD: BURNING - MUSIC: DISCO INFERNO BY THE TRAMMPS
Grimey Drawer

my cat is norris posted:

They're no longer part of our environment.

I hope you're not suggesting the front fell off.

  • 1
  • 2
  • 3
  • 4
  • 5