Ransomware Targets VMware ESXi: Melissa Palmer Explains the Threat

You've found The Backup Wrap-up, your go-to podcast for all things backup, recovery, and cyber-recovery. In this episode, we tackle one of the scariest threats out there - ransomware targeting VMware ESXi environments. I'm joined by Prasanna Malaiyandi and our special guest Melissa Palmer, also known as @vmiss, who's an independent technology analyst and ransomware resiliency architect. We get into why virtualization environments are such juicy targets for attackers, how they're specifically going after vCenter and ESXi hosts, and why your backup strategy is probably missing some critical components. If you've got a virtualized environment, you need to listen to this. Melissa brings her unique perspective from both the virtualization and security worlds to help you protect your most critical infrastructure. So buckle up - this is an episode you can't afford to miss if you want to keep your VMware environment safe from ransomware attacks.
You found the backup wrap up your go-to podcast for all things
Speaker:backup recovery and cyber recovery.
Speaker:Today I've got another popular classic episode that you probably
Speaker:haven't heard, Prasanna and I talked to Melissa Palmer, AKA @vmiss, a
Speaker:ransomware resiliency architect about why virtualization environments are
Speaker:such juicy targets for ransomware attackers, how they're specifically
Speaker:going after vCenter and ESXI hosts.
Speaker:And why your backup strategy is probably missing some critical components if
Speaker:you're trying to protect from that.
Speaker:If you've got VMware, you can't afford to miss our episode with @vmiss.
Speaker:See what I did there?
Speaker:By the way, if you don't know who I am, I'm w Curtis Preston, AKA, Mr. Backup,
Speaker:and I've been passionate about backup and recovery for over 30 years, ever since.
Speaker:I had to tell my boss that we had no backups.
Speaker:Of the production database that we had just lost.
Speaker:I didn't want that to happen to me again, I don't want it to happen
Speaker:to you, and that's why I do this.
Speaker:On this podcast, we turn unappreciated backup admins into Cyber Recovery Heroes.
Speaker:This is the backup wrap up.
Speaker:Welcome to the show.
Speaker:Hi.
Speaker:Welcome to the backup wrap up.
Speaker:I'm your host, w Curtis Preston, AKA Mr. Backup, and I have with me one of
Speaker:only three people who actually know and recognized my actual birthday today.
Speaker:Prasanna Malaiyandi, how's it going, Prasanna?
Speaker:Good.
Speaker:Curtis, how are you doing?
Speaker:Happy birthday.
Speaker:why is my birthday so complicated?
Speaker:Why do I make it
Speaker:You make it complicated.
Speaker:Exactly.
Speaker:I do.
Speaker:But why do I do that?
Speaker:I do it for a reason.
Speaker:Privacy.
Speaker:Privacy.
Speaker:Yeah.
Speaker:So my, my Facebook, LinkedIn, et cetera.
Speaker:Birthday was yesterday, . Um, and then my actual birthday is today.
Speaker:Uh, so
Speaker:You know how I figured that out?
Speaker:what's that?
Speaker:Because I saw on Facebook it was your birthday and the following day I totally
Speaker:forgot and I wished you happy birthday.
Speaker:And that's when you
Speaker:and you got it
Speaker:And you're like, oh no, it's actually today's my,
Speaker:got it wrong, but you got it right by getting it wrong.
Speaker:You got it right.
Speaker:Or by being delayed.
Speaker:exactly.
Speaker:Yeah.
Speaker:That's kind of funny.
Speaker:Um, sometimes I tell people like when they, you know, when they wish me.
Speaker:You know, happy birthday on Facebook.
Speaker:I'm like, yeah, thanks, you know, whatever.
Speaker:Uh, you know, but if it's like work people, I'm like, Hey, just so you
Speaker:know, I actually do this for a reason.
Speaker:Like it's privacy and, and you know, your birthday is only one of
Speaker:like, uh, two in the US only one of two pieces of private information
Speaker:that are needed to impersonate you.
Speaker:So, um, you know, the, the one is, you know, so the other one is
Speaker:social security number, which you don't typically put that out there.
Speaker:So are you sure you wanna be recording this on your, on the podcast and
Speaker:I, you know,
Speaker:it
Speaker:you know, if, if a hacker is willing to actually follow me on the podcast
Speaker:get a listen in.
Speaker:yeah.
Speaker:Yeah.
Speaker:We should get on to the business at hand.
Speaker:Um, our guest is known for her insightful virtualization comments on Twitter, so I
Speaker:was very excited to see her now focusing on Public Enemy number one, ransomware.
Speaker:She's been in the industry over 15 years, and in independent
Speaker:technology, analyst and ransomware resiliency architect, you can follow.
Speaker:At vmiss.net welcome to the podcast, Melissa Palmer.
Speaker:AKA @vmiss
Speaker:Hello gentlemen.
Speaker:Thank you so much for having me.
Speaker:how's it going?
Speaker:Uh, you know, it's funny.
Speaker:I knew I knew you and followed you for a long time and didn't
Speaker:know you had another name,
Speaker:I, I, I, same thing as well, like, I'm like, I've seen like all your tweets
Speaker:and everything else, but I'm like, I didn't know your actual name either.
Speaker:I was like, who is this Melissa Palmer person responding to emails?
Speaker:And
Speaker:I I get that a lot actually.
Speaker:People don't know we're the same person.
Speaker:Yeah.
Speaker:I, I, um, we actually, we've had a person on the podcast that, um, they continued
Speaker:to go by their Reddit handle Snorkel 42.
Speaker:It's like such a random name, you know.
Speaker:Uh, but yeah, he, like, he wasn't, he wasn't hiding or anything.
Speaker:He just preferred to go by snorkel42.
Speaker:So I'm glad to actually know and be able to use your first names.
Speaker:I'm very excited.
Speaker:Um, I, I, I am curious, so what, what made you sort of make that jump, right?
Speaker:You know, you were doing, I see that you, you know, you had background and
Speaker:backup, you know, good for you, uh, having worked at Veeam, uh, but you
Speaker:know, you, you've been spending so much time with virtualization lately.
Speaker:Uh, what, you know, what made you sort of jump over to ransomware.
Speaker:so it's kind of funny how things work out sometimes.
Speaker:I have always been, I would say, security minded.
Speaker:, um, as long as I can remember.
Speaker:I might have been at DEF com when I was 16 years old.
Speaker:Anyway, um, so it's kind of a
Speaker:thing.
Speaker:Yeah.
Speaker:Is that true?
Speaker:it's kind of a thing that has always been, uh, throughout my education,
Speaker:my master's in is in secure design.
Speaker:Throughout my career, I've been bringing it in, in Drs and drabs,
Speaker:but as ransomware started to pick up and I was really putting a big focus.
Speaker:Disaster recovery and recovery in general from at the VE perspective.
Speaker:A couple years ago, I kind of said, you know what?
Speaker:I think I really.
Speaker:pivot hard and focus on this cuz I, I just find it so interesting,
Speaker:like all aspects of it.
Speaker:Uh, and I've learned a lot and I've helped people fix a lot of things they
Speaker:had going very wrong in their environment.
Speaker:So hopefully they, they do not feel the impact of ransomware.
Speaker:So, like I said, I've had the security minded thing throughout my whole
Speaker:career and it just kind of got to the point where it was like, I'm
Speaker:gonna go further down this path now.
Speaker:And I think we need more people like that because there's so
Speaker:much ransomware out there, right?
Speaker:There's so many issues.
Speaker:It's, and I think everyone's trying to figure out, okay, what
Speaker:are sort of those best practices?
Speaker:What are the things we should be doing to sort of help protect
Speaker:ourselves from some of this?
Speaker:So I'm glad at least there's someone in addition trying to focus on this.
Speaker:So it helps.
Speaker:I Is ransomware really happening?
Speaker:I mean, is it really a thing?
Speaker:I thought that was like 2020, isn't it?
Speaker:So one of my favorite things is I just go to Google and I type in ransomware,
Speaker:and I just see what comes up.
Speaker:I was like, I, I, I, I think it's fun.
Speaker:yeah.
Speaker:Yeah.
Speaker:have a warped idea of fun as we've established.
Speaker:Um, but like I just go into Google and I type in ransomware and it, it's funny,
Speaker:the stuff that does make it to like the mainstream news and you see all these
Speaker:like people on all the news channels that like, I dunno, sometimes you get someone
Speaker:and they're like the cybersecurity expert, but they're also like the dog walking
Speaker:expert and like the cat fighting expert.
Speaker:I'm like, how do you find these people?
Speaker:But you'll see a lot of.
Speaker:So this kind of stuff going mainstream.
Speaker:So the threat is out there.
Speaker:It's becoming more and more pervasive.
Speaker:I don't think we're gonna see less of it.
Speaker:Um, cuz people have made a lot of money this way, right?
Speaker:When you have those, when you did your search though, right?
Speaker:What percentage do you think, or do you even think it's scratching the
Speaker:surface, like what you see publicly
Speaker:Oh no.
Speaker:versus like what's actually happening?
Speaker:I don't think people fess up unless they have to.
Speaker:, right.
Speaker:Unless there's a reason.
Speaker:And that's actually a problem I had at Veeam working with
Speaker:the disaster recovery product.
Speaker:Like no one wanted to be a customer reference.
Speaker:Like, I don't wanna admit I had a disaster or a ransomware attack or something
Speaker:and I use this stuff to save my behind.
Speaker:Like I'm not admitting that.
Speaker:Um, so that was actually a challenge getting people to like publicly fast on
Speaker:say, yeah, I got ransomware and everything went to Hella, but we recovered.
Speaker:Don't worry, like.
Speaker:Yeah.
Speaker:And by the way, uh, that reminds me to throw out our usual disclaimer.
Speaker:Um, I work for Druva, uh,Prasanna, works for Zoom, uh, and this is not
Speaker:a, this is an independent podcast, not a podcast of either company and
Speaker:the opinions that you hear are ours.
Speaker:And, um, also, uh, we'd love to have you join the conversation.
Speaker:Just reach out to me, uh, w Curtis Preston gmail or WC Preston on Twitter.
Speaker:Uh, as long as it's up and, um, For now.
Speaker:And, uh, also please rate us, uh, just, you know, scroll down to
Speaker:your, you know, you know, most of you based on the stats I'm seeing.
Speaker:Most of you are on Apple Podcast.
Speaker:Just scroll down to the bottom there and give us some stars.
Speaker:Give us some comments.
Speaker:We love comments.
Speaker:You can tell us how much for, well, for those of you that
Speaker:are watching it on video, which you can see@backupcentral.com,
Speaker:I didn't realize, I thought you guys told me the video was gonna be.
Speaker:For like outtakes and stuff.
Speaker:I've been sitting here making funny faces the whole time, like as we
Speaker:got started, like, cuz I thought you
Speaker:This may be the best.
Speaker:This may be the best recording ever.
Speaker:Uh, you can comment on how much you like, you know, personas,
Speaker:uh, are, are we at a tweard yet?
Speaker:You will tell me when you get to a tweard, right?
Speaker:I think it's a, it's a, theard right,
Speaker:The, the a the, yeah.
Speaker:You're, you're at a tweet, but you're not at a, the when is the, the.
Speaker:Uh, two months.
Speaker:Really.
Speaker:Um, so that would be, I, if you don't follow Melissa, he hasn't shaved,
Speaker:uh, or cut his hair since Covid.
Speaker:Um, so he is at, at almost at a three year beard, otherwise known as a,
Speaker:I cannot relate to that.
Speaker:I'm sorry at all.
Speaker:It was initially supposed to be a year, which is a year long
Speaker:beard, and it just kept going.
Speaker:So
Speaker:It's interesting, it's been getting grayer lately.
Speaker:Um,
Speaker:getting grayer.
Speaker:what,
Speaker:it's a stress.
Speaker:Curtis's stress.
Speaker:in the Molly Andi household?
Speaker:Yeah.
Speaker:getting too stressed by your ransomware.
Speaker:Um, yeah, so anyway, um, yeah, I, I agree with you of how much it's
Speaker:gotten out into the, you know, the general, what, what do we call that?
Speaker:Like the general mindset.
Speaker:don't know the regular people like
Speaker:um, yeah, the regular people.
Speaker:The Normies.
Speaker:I see it a lot on tv.
Speaker:I'm seeing it in TV shows, right?
Speaker:I, uh, the, the, you know, I don't know if you've
Speaker:Undeclared.
Speaker:War
Speaker:the undeclared war is a great show.
Speaker:Have you seen that, Melissa?
Speaker:No,
Speaker:Um, you, uh, so it's, I don't remember where I saw it.
Speaker:Did I sit on Peacock?
Speaker:Thank you.
Speaker:So it's actually a B B C show and it's set in.
Speaker:Um, so yeah, so, so try to, try to sort of see how crazy this idea seems.
Speaker:So the bad guy in, you know, the bad.
Speaker:Country in the show is Russia.
Speaker:And, and the good guy in the show is, is, you know, England
Speaker:and, and, and US basically.
Speaker:But England is the target.
Speaker:And Russia in the show is using a variety of, uh, cyber attacks
Speaker:and misinformation attacks to try.
Speaker:real.
Speaker:Like this is, wait, this is fake.
Speaker:Like,
Speaker:is, this is a, this is a drama.
Speaker:It's a series.
Speaker:It's a series.
Speaker:And, uh, to try and get to, basically to try and get England
Speaker:to actually declare a war.
Speaker:They, they're, they're using it, they're using this undeclared war to
Speaker:get England to actually declare a war.
Speaker:Um, and, and, and.
Speaker:It was pretty good.
Speaker:Uh, you know, they, they got a lot of the tech in there and they
Speaker:even, I even learned a few things.
Speaker:Um, so like I learned about, yeah.
Speaker:What three words have you heard of what?
Speaker:Three words?
Speaker:So there's a, there's a group that has taken, uh, every three
Speaker:meter segment in the world, right?
Speaker:Three meter squared segment in the world and has assigned three words.
Speaker:So that, so that you can, you can say, um, you know, uh, you
Speaker:can go to what three words.com.
Speaker:You can
Speaker:this is so cool.
Speaker:can enter your address and like your house will have multiple three words segments.
Speaker:Right now it has two purposes.
Speaker:Uh, one is meeting somebody at Coachella.
Speaker:Right.
Speaker:I, I'm, I'm at Squirrel Pizza, you know, tree.
Speaker:And, and they can put that into, um, it's much easier than saying
Speaker:I'm at 1 53 negative one genome.
Speaker:Right.
Speaker:. Um, and then they can, they can find you.
Speaker:But also in a lot of the undeveloped world, there's a lot of people
Speaker:that don't have addresses and this allows them to have an address.
Speaker:Right.
Speaker:And they can buy things on Amazon, uh, and have stuff delivered to
Speaker:their house using what, three words.
Speaker:Anyway, I learned it from.
Speaker:So, um, I really don't know how we got onto this, but anyway, the Oh, oh, the
Speaker:point was that it's, it's out there in the, you know, um, I mean even, is it
Speaker:the, there's the doctor that has, um, Asperger's, that's, is that the good
Speaker:Oh, the good doctor.
Speaker:Yeah.
Speaker:They had a ransomware attack, took down the
Speaker:Grey's Anatomy had a ransomware
Speaker:episode.
Speaker:Grace Anatomy
Speaker:big Grey's Anatomy fan, but then the whole Derek thing happened, and I
Speaker:don't know how I feel about it, and I'm still struggling with that years later.
Speaker:Um, but yes, Grey's Anatomy had a ransomware episode and I remember
Speaker:sitting it, watching it just like hysterical through the whole thing.
Speaker:I was like,
Speaker:I didn't even have words for it.
Speaker:I'm like, my favorite TV show has ran somewhere on it.
Speaker:My life is complete.
Speaker:yeah.
Speaker:I, I get excited when shows have backup in it and it, um, my wife
Speaker:showed me a show just yesterday.
Speaker:Darn it.
Speaker:I can't remember what it was, but back up.
Speaker:Oh, oh, I remember it was, there was a, I don't remember
Speaker:the show, but there was in the.
Speaker:The, this woman got interrupted because her, I'm guessing teenage son
Speaker:called her and saying, Hey, um, like I, my, I'm, my laptop is messed up.
Speaker:I can't get in my laptop or something.
Speaker:And, and so he's, and he needs the, the data and she's like, you should
Speaker:have backed it up like I told you to.
Speaker:And then she hung up on him and I was
Speaker:I, yeah, there was a show, and this had to be years ago and I don't
Speaker:remember Trump, I'm gonna have to go figure it out afterwards, where
Speaker:like the ESXi shell was like in like
Speaker:Oh,
Speaker:really?
Speaker:And I remember losing my mind.
Speaker:I remember the guy and it was really hot, but that's all I remember.
Speaker:Like, I'm gonna have to go figure this out afterwards.
Speaker:That's funny because you know, normally when you see the sh the stuff like this
Speaker:in the, in tv, it's not an actual vsx.
Speaker:I shell, right?
Speaker:It's some.
Speaker:Total random thing.
Speaker:Um, and it's complete nonsense.
Speaker:Um, here's a question,Prasanna.
Speaker:Have you seen any ransomware attacks in Bollywood?
Speaker:I don't think I have yet.
Speaker:Oh, please, please come find me one.
Speaker:I love Bollywood
Speaker:know what we need.
Speaker:You know what we need?
Speaker:We need a musical, a ransomware,
Speaker:Please.
Speaker:Oh, can we,
Speaker:ransomware, attack, music
Speaker:this?
Speaker:Like, I've thought about this, I literally have thought about this.
Speaker:I used to do a lot of musical theater and college and stuff like that.
Speaker:Like I would be so into a ransomware musical.
Speaker:Like that would be amazing.
Speaker:This could be, this could
Speaker:That could be awesome.
Speaker:yeah.
Speaker:You know, send some, send some notes.
Speaker:I I might have come up with some alternate Taylor Swift lyrics
Speaker:about ransomware at one point.
Speaker:I'm
Speaker:Oh, are you guys gonna get into a battle now?
Speaker:so you, you know, um,
Speaker:battle.
Speaker:Yeah.
Speaker:So Melissa, I've actually produced a handful of parody music videos that had
Speaker:Oh no, really?
Speaker:backup.
Speaker:Yeah.
Speaker:Um, and one about
Speaker:to send me some.
Speaker:I need to see these.
Speaker:Um, I'll give, I'll give you a quick sample.
Speaker:Um, Walk into the lab.
Speaker:Have you seen my VM server?
Speaker:I'm, I'm so pumped about getting VMs in my server guests on a big disc.
Speaker:It's so damn freaky.
Speaker:People like, man, that's downright sneaky strolling into server rooms.
Speaker:VMs have some massive appeal moving on to guests.
Speaker:Even database aside for real, putting in some Hyper V. Microsoft said it's free.
Speaker:Should have done it sooner.
Speaker:Thing my boss would agree.
Speaker:Uh, the um,
Speaker:That's good.
Speaker:Um, the, the chorus is I'm gonna build VMs, got at least 20 gifts in my server.
Speaker:I'm on virtual, getting rid of servers.
Speaker:VMs are so awesome.
Speaker:It's, it's, uh, what was the original, what was the original song?
Speaker:Um, what was that song?
Speaker:What was
Speaker:Uh, We're, we're gonna go pop some uh uh, McLemore
Speaker:McLemore.
Speaker:Yeah.
Speaker:I'm gonna pop some tags.
Speaker:Yeah, yeah.
Speaker:Anyway, it is available on, it is available on YouTube.
Speaker:I'll throw a link for those of you that are
Speaker:I've been rewriting Taylor Swift songs lately on a regular basis just because
Speaker:I don't know why I do this, but I do.
Speaker:And I used to do demos.
Speaker:That was my sign of doing a demo.
Speaker:Like, am I ready to cold do this on stage or something?
Speaker:Can I sing Taylor Swift while I do the demo?
Speaker:Like just sing my thing, click through all my stuff, whatever.
Speaker:And that was like my sign of like, you can't get me on this nowhere.
Speaker:What happens?
Speaker:I'm good to go.
Speaker:Like I have to be able to sing a Taylor Swift song while doing the
Speaker:that's okay.
Speaker:I just have to tell you a ran a random, this is, uh, so, uh, several
Speaker:years ago when I was underemployed, I started doing Uber right.
Speaker:And then it just turned out I liked it.
Speaker:So I do it when I'm bored, like I go out and do.
Speaker:Uber, right.
Speaker:And, um, like, and also I'm, I'm an extrovert stuck at home,
Speaker:so I, you know, it's my outlet.
Speaker:But one night I picked up this couple and the woman had just
Speaker:broken up with her best friend of like many years over a guy, right?
Speaker:And she gets in her car, she gets in my car, and she is inconsolable like she's.
Speaker:Bawling, like just, just ridiculously over the top, bawling her eyes out.
Speaker:And then she goes, she's, she just, she just, uh, she touches me on
Speaker:the shoulder and she goes, can you, can you play some Taylor Swift?
Speaker:Can you play, play some Taylor Swift, any Taylor Swift song and just go, you
Speaker:know, uh, and I was just like, oh my God.
Speaker:And then I just, I just said, Hey, you.
Speaker:Uh, Hey Siri.
Speaker:Play, play Taylor Swift on Spotify.
Speaker:Stop it.
Speaker:Nope.
Speaker:Nope.
Speaker:I don't want it.
Speaker:Sorry.
Speaker:It started doing it, uh, and it picked a breakup song,
Speaker:Aw.
Speaker:which of course all of them are right.
Speaker:And so, uh, it didn't, and it, it didn't help.
Speaker:Anyway,
Speaker:so we were talking about ransomware.
Speaker:Um,
Speaker:We were.
Speaker:in the general public
Speaker:yeah, because, because it is so huge, right?
Speaker:And the impact too, right?
Speaker:It's no longer, Hey, it's just this backend company that gets impacted.
Speaker:Right?
Speaker:It's like hospitals, schools, right?
Speaker:Every, every company, every organization is, yeah.
Speaker:Is at.
Speaker:Yeah.
Speaker:So what do, what do you think?
Speaker:Um, it, it, it, you know, looking out there from a security, I know from a
Speaker:backup perspective, um, what do you think from a security perspective,
Speaker:what do you think are the things that most people get wrong when they're
Speaker:They don't have their stuff backed up.
Speaker:Can we
Speaker:start with
Speaker:Okay.
Speaker:Okay.
Speaker:We
Speaker:like, can we just start there?
Speaker:Because like there's this weird cross pollination between
Speaker:backup and insecurity at
Speaker:There.
Speaker:There is.
Speaker:There is there.
Speaker:By the way, we used to be
Speaker:have it backed up, we used to,
Speaker:We used to be enemies, but we're over that.
Speaker:Yeah.
Speaker:Yeah.
Speaker:it's ridiculous.
Speaker:Like if you don't have your BA stuff backed up, how do you think
Speaker:you're ever gonna recover it?
Speaker:And the amount of people that don't have their stuff backed up still or don't have
Speaker:everything backed up is still astounding.
Speaker:When you do, do you run into, you don't run into corporate people that don't
Speaker:have their stuff backed up, do you?
Speaker:Oh.
Speaker:Yeah,
Speaker:It hurts me.
Speaker:It hurts me.
Speaker:it hurts.
Speaker:Or they don't have everything backed up.
Speaker:Like, well, this was too expensive to back up before, so we weren't backing it up.
Speaker:I'm like, well,
Speaker:how expensive is it if
Speaker:Or yeah, or someone just spun up something, right?
Speaker:Your shadow it use cases, right?
Speaker:And they're like, Hey, corporate, it didn't know about this.
Speaker:And so no backups were done.
Speaker:yeah.
Speaker:Okay.
Speaker:I, yeah, I can, you know, I think, I think the second part Yeah.
Speaker:That you said, Melissa, like they missed, they missed something that I
Speaker:I like, I, I can't tell you how many times like working for a backup vendor, they
Speaker:would be like, well, it's too expensive to back up this over here cuz it's
Speaker:only test dev, so we don't back it up.
Speaker:I'm like, okay, it's test dev.
Speaker:That's where you're doing all your active development.
Speaker:You're not backing it up.
Speaker:So what happens if that goes away?
Speaker:And they're like, but it's not production.
Speaker:I'm like, it's not production until something happens.
Speaker:Then you realize it's production.
Speaker:My, my
Speaker:that.
Speaker:I think that was a common thing.
Speaker:My favorite test dev story, and this, this is an old story.
Speaker:Uh, by the way, this month I'll have been in the industry 30 years, Melissa.
Speaker:Um, and so this is like 28 years ago.
Speaker:Um, we had a developer group came to me and said, we need
Speaker:to restore this directory tree.
Speaker:And they handed me a directory tree that started with /tmp right?
Speaker:And, and I said, we don't back up temp. Like it's well documented.
Speaker:We don't back up temp, we don't back up, you know, temp, right?
Speaker:And this was an HP server, which I don't know what they do
Speaker:these days, but Temp was in ram.
Speaker:And so what happened was they rebooted and what went away was a directory, a source
Speaker:code tree that was like 15 developers.
Speaker:Storing their source code tree in temp and um, for like months.
Speaker:And they're like, you don't understand.
Speaker:This is really important.
Speaker:I'm like, you don't understand.
Speaker:You were
Speaker:backed it up.
Speaker:source code in.
Speaker:You know that song, that Beyonce, that like made really pop.
Speaker:Or if you like it, then you should've put a ring on it.
Speaker:Like that song.
Speaker:If you like it, then you should've backed it up.
Speaker:Very simple.
Speaker:Yeah, I, I, I do see, uh, and Prasanna, you've run into it as well, right?
Speaker:Like people not backing up, you know, either, either not having backups or,
Speaker:you know, we, the, the last episode we talked about, you know, a company
Speaker:that had a homegrown backups, right?
Speaker:Um, that was
Speaker:or, or not even backing up everything required for that application.
Speaker:right,
Speaker:Hey, I
Speaker:it's application dependency.
Speaker:Mapping's, the worst part of all this
Speaker:Yeah.
Speaker:Yeah.
Speaker:That's why, you know, you know, going all the way back.
Speaker:That's why I've always just been a fan of, you know, back up all the things.
Speaker:Right.
Speaker:Back up all the servers and all the directories.
Speaker:I know it costs more money, but, um, what,
Speaker:Ah, but how much will a ransomware attack cost you these days?
Speaker:To Ching?
Speaker:There's your justification.
Speaker:Here's your budget.
Speaker:Go protect your stuff.
Speaker:Now.
Speaker:Finally,
Speaker:Exactly.
Speaker:What, one question I have, I know we'll get to it probably at some
Speaker:point, but with virtualization, does it make it easier to sort of figure
Speaker:out like everything that's needed,
Speaker:It depends of course, cuz everything in it depends.
Speaker:Uh, if everything's hosted in the virtualization environment,
Speaker:then yeah, it's simple.
Speaker:But when you get into crazy stuff like well this database is on the Oracle
Speaker:Rack cluster over there and that's not virtualized cuz Oracle and virtualization
Speaker:we're not even gonna go there.
Speaker:Um, that's when you get a little dicey with stuff like that.
Speaker:Or, you know, especially with hybrid cloud now too.
Speaker:If you have a app that spans like on-prem in the cloud, then.
Speaker:Good luck guys.
Speaker:I hope you actually know what you're doing.
Speaker:But would you say though, in the virtualized environment that for those
Speaker:applications which are fully virtualized,
Speaker:love this question
Speaker:it
Speaker:we're gonna go down a dark path right after this.
Speaker:it makes it a little easier where maybe it doesn't cover, like you said, a hundred
Speaker:percent of your environment, but it covers some good chunk of your environment
Speaker:All right, let,
Speaker:you have a general solution and the rest of it you can focus
Speaker:Let's go with that.
Speaker:If you're an organization that's a hundred percent virtualized, which if you're
Speaker:a company that was started in the last 10 to 20 years, you probably are right?
Speaker:Yeah.
Speaker:Just back up the whole virtualization environment and you're good to go.
Speaker:But you know what else that means?
Speaker:That's a really big juicy target for the ransomware actors.
Speaker:They can come in, come through your virtualization environment
Speaker:and ransomware you a hundred times faster and a hundred times worse.
Speaker:If they get Es Xi or vCenter, yay.
Speaker:Right.
Speaker:I think that's one thing that isn't talked about a lot
Speaker:It's not.
Speaker:It's not, and it drives me up a wall.
Speaker:You brought up an interesting topic there, and I don't think it's one
Speaker:that's discussed enough, and that is,
Speaker:environments like vCenter are being targeted as a thing that
Speaker:they're not just targeting the VMs, they're targeting vCenter.
Speaker:They're going after vm.
Speaker:The VMware infrastructure itself, not just the VMs.
Speaker:I mean, any Windows server you pop these days is probably a vm, right?
Speaker:If it's OnPrem, no, no, no.
Speaker:They're going after vCenter, which is a management interface, and the
Speaker:S X I hosts, they are going after the VMware environment as a whole.
Speaker:Yeah.
Speaker:And that, that sort of hurts, right?
Speaker:Because like you
Speaker:go up to the backup environments too.
Speaker:because, uh, yes, no, we, we talk about that a lot on this podcast.
Speaker:Um, that, um, and it, you know, and I know, I know this, I know this reaches
Speaker:out to your former employer, but backup environments that are exclusively
Speaker:Windows based, uh, bug me, right?
Speaker:Uh, right , um, because I am worried about that,
Speaker:Because windows is just like the most secure thing ever.
Speaker:Like how many vulnerabilities out there?
Speaker:Target windows.
Speaker:Like,
Speaker:come on guys.
Speaker:no one, no ransomware, no one has Windows, laptops that they then bring,
Speaker:that get infected, and then they bring it
Speaker:No.
Speaker:Never.
Speaker:Never.
Speaker:You're talking about VMware, does sort of this ransomware angle also affect like
Speaker:the VMware cloud offerings as well in your mind, or do you think it's more about the
Speaker:on-prem customer deployed implementations?
Speaker:would say if, if I was, so, I, I, you know, you know, you've heard the whole
Speaker:red verse blue team thing, right?
Speaker:So I would say I'm usually like a blue team or a defender,
Speaker:recover, all that kinda stuff.
Speaker:I got, like, when it comes to VMware, I got like a little bit of red team in me.
Speaker:I gotta be honest, like I got some red team in there.
Speaker:Um, it kind of comes down to level of effort, right?
Speaker:If you've deployed VMware cloud the right way, it's probably harder to get into.
Speaker:Then your traditional on-prem infrastructure, if you've done
Speaker:everything right, if I have everybody, if everybody can log into my Cloud
Speaker:V center anyway, and I put it on the internet, then it's a target, right?
Speaker:Like that kind of thing.
Speaker:Um, but I would say I've seen a lot of the easier targets are
Speaker:still the on-prem kind of stuff.
Speaker:So that's where people go first.
Speaker:Um, but I, I, I think that everything is a target.
Speaker:There's kind of a misnomer that the cloud is more secure, right?
Speaker:Not, it's sometimes a little harder.
Speaker:So why there's enough low hanging fruit and data centers, why not start there?
Speaker:Yeah.
Speaker:Well, I go after that harder target.
Speaker:Yeah.
Speaker:Yeah.
Speaker:Do you want to, for those that don't know what a red and blue
Speaker:team are, you wanna, uh, fill that?
Speaker:Yeah, I will.
Speaker:So if, if you think about it in two different ways, uh,
Speaker:red team is more like offense.
Speaker:Like I am the person penetration testing and actively trying to
Speaker:break stuff and trying to figure out where the weaknesses are.
Speaker:The blue team is really defense.
Speaker:I'm the defender.
Speaker:Um, I'm trying to make sure the red teamers can't break everything cause
Speaker:I'm trying to secure it and I really feel that backup and recovery does also
Speaker:fall under the blue team too, right?
Speaker:Like if I'm, if everything does go to hell, we are ransomware.
Speaker:We're gonna try, we're putting everything in place now so we can recover later.
Speaker:Yeah.
Speaker:I actually know a guy that is a physical pen tester.
Speaker:Um, and yeah, his, his job is to physically like to
Speaker:not, he doesn't break in.
Speaker:He uses
Speaker:no.
Speaker:He gets someone to let him in
Speaker:the door.
Speaker:engineering and then his job is to get to somewhere where he's not supposed to be.
Speaker:And take a picture and then, and then get, and then get the hell out.
Speaker:but that's very valid.
Speaker:Right?
Speaker:It's, it's all, there's all different layers and levels of security.
Speaker:That actually sounds fun.
Speaker:I think I'd be good at something like that.
Speaker:I know you can't tell how tall I am, but I'm like five feet tall.
Speaker:I'm like, wait, like nothing.
Speaker:So I'm like a tiny little unsuspecting, put a big smile on my face, put some pink
Speaker:on, like I could probably get it anywhere.
Speaker:yeah.
Speaker:I, I think, I think a female physical pen tester would be a, a, a force
Speaker:to be reckoned with , I think.
Speaker:You know, um,
Speaker:career opportunity, Melissa.
Speaker:just, you know, just play the . It's a little innocent.
Speaker:I'm not doing anything, you know, I'm lost.
Speaker:Play, play on all our biases.
Speaker:That would be mean, but very effective.
Speaker:Um, so, okay, so we talked about, you know, we talked
Speaker:about backing up everything.
Speaker:We talked about the fact that that vCenter is a target, so you need to learn, and,
Speaker:and I'm, you know, hyper V is a target.
Speaker:Linux is a target as well.
Speaker:Like everything's a target.
Speaker:kvm.
Speaker:Everything is a target.
Speaker:But here's the thing that people don't do, and like I said, I'm generally a
Speaker:blue teamer, but I got some red teaming.
Speaker:What comes to VMware and I'm kind of thinking, okay, I'm
Speaker:like a ransomware person.
Speaker:What do I want?
Speaker:I wanna make money.
Speaker:I wanna make you pay the ransom, which means I'm gonna do as much
Speaker:damage as quickly as possible before you figure out I'm.
Speaker:Right.
Speaker:VMware, kind of VMware.
Speaker:I'm, I'm, I'm kind of like torn right now.
Speaker:I don't know.
Speaker:What's a better target?
Speaker:VMware or your backups?
Speaker:Probably both.
Speaker:If you get two people in there right, hit 'em at the same time.
Speaker:That way you can't recover and everything's gone.
Speaker:Um, but I'm just looking for a high impact way to wreak havoc.
Speaker:Hit the VMware environment, that's gonna be fast.
Speaker:Um, I do nerdy stuff like read ransomware, release notes, and I can't remember
Speaker:which strain it was, but they're like, oh, we redid something and now
Speaker:we encrypt, you know, much faster.
Speaker:We use more CPU threads, right?
Speaker:So you've got this big, massive vfu host sitting there with all these CPUs in it.
Speaker:Once you power everything down so you can encrypt it, boom, it's gonna go so fast.
Speaker:You're probably not even gonna notice before everything is encrypted.
Speaker:And this encryption, does that happen at the vCenter level or is
Speaker:it literally you pop each VM one
Speaker:no, you don't even have to do that.
Speaker:This is cake.
Speaker:Let me explain how this works.
Speaker:So, a VMware cluster is usually a bunch of physical servers in a cluster.
Speaker:We need shared resources so that these VMs can move around the cluster based on
Speaker:load balancing and if something fails, restarted, all that kind of stuff.
Speaker:So the shared resources are basically, um, network and storage,
Speaker:which means if I have eight nodes in my cluster, let's just use that.
Speaker:That one host is connected to all the data stores and they
Speaker:all see the same thing, right?
Speaker:So if I get into one host, I can see all the storage for the whole cluster.
Speaker:Now, when we get to the storage level or the data store level,
Speaker:in VMware, a VM is just a file.
Speaker:It's a file.
Speaker:They're encrypting.
Speaker:It's not, it's.
Speaker:at the file level, right?
Speaker:They just encrypt all the files on the data store, pretty much.
Speaker:It's not like I have to go VM by vm.
Speaker:They're just files at that point, which is why it happens so
Speaker:quick and why it's so dangerous.
Speaker:yeah.
Speaker:And unlike like your traditional file system, right, these data store files
Speaker:are pretty large in size, right?
Speaker:Yeah.
Speaker:Yeah.
Speaker:Regarding the, you know, or, or go, you know, go after V
Speaker:center or go after backup.
Speaker:Um, the, the big, the big concern that I have, not just cuz generally what
Speaker:you know, if they're going after the backup system, historically it's been
Speaker:to just take it out, take it out of the equation, cuz they're gonna do
Speaker:damage somewhere else and they don't want the backup system used to recover.
Speaker:um, you can pretty easily get at least a doomsday copy.
Speaker:Like if you're, if you're doing an on-prem system, most of them have the ability
Speaker:to get something in the cloud, uh, to u to use to, to, you can deal with that.
Speaker:hopefully people have half a brainer putting a copy of their backup data
Speaker:in the cloud, like just by default,
Speaker:right?
Speaker:Like hopefully, hopefully.
Speaker:is some of the encryption methods used by some of the backup vendors
Speaker:aren't that great and that they can also use basically the backups that,
Speaker:you know, you talked about how do I get paid the most if I'm a ransomware
Speaker:Yeah, exactly.
Speaker:If you can figure out the, the encryption method used by the backup server.
Speaker:Now, not only do you have you.
Speaker:All the D, you have unencrypted copies of everything, right?
Speaker:That, and then you can do an extortion attack, right?
Speaker:You can say, Hey, I
Speaker:I love the, I love me a good cup of extortion in the morning.
Speaker:Like, come on.
Speaker:That's how you, that's how you and, and like that's how you
Speaker:get people to pay too, right?
Speaker:Ooh, I found pictures of your ct c o doing a little something, something.
Speaker:I'm gonna take
Speaker:whammy.
Speaker:Wow.
Speaker:You go right for the, you go right for the ju.
Speaker:I do.
Speaker:I
Speaker:I I was just thinking like, you know, the CEO's, cuz you know, the thing
Speaker:is you showed me an email system and I'll show you, I'll show you
Speaker:emails that shouldn't have been sent.
Speaker:Right.
Speaker:Um,
Speaker:yeah, let's go with that.
Speaker:It's a little more tamer.
Speaker:Like
Speaker:Yeah.
Speaker:Yeah.
Speaker:Uh, emails that, um, I, you know, I've known, you know, and, and like even
Speaker:in places where, you know, we, you know, I've been in the corporate world
Speaker:for 30 years now, and it's changed over the years when we talk about
Speaker:things like sexual harassment, right?
Speaker:Um, it ha it ha it has changed, right?
Speaker:Um, But like, what a lot of it has done is it's just gone closeted, right?
Speaker:It's like, you know, so guys still talk amongst each other, but
Speaker:they still do it on email, right?
Speaker:And you're
Speaker:Oh, I've got some stories about
Speaker:Oh, I'm, I am absolutely sure
Speaker:I got stories.
Speaker:I am sure you do.
Speaker:Uh, but that's what, if I were, if I were a hacker, I would be going after
Speaker:the backups and I would be going after backups specifically where I could
Speaker:figure out the encryption mechanism.
Speaker:and that I can, maybe, I can't decrypt the data directly, but what I can do is
Speaker:I can get administrative access to the backup server and then I can restore
Speaker:whatever I want, wherever I want.
Speaker:And a lot of people, a lot of people aren't watching their backup
Speaker:one.
Speaker:No, they're
Speaker:Right.
Speaker:Um, not like, not like they should be because, well, let me ask you this.
Speaker:So you, you, you've dealt with a lot of backup folk.
Speaker:I have.
Speaker:It, it's, it's still this thing of like, nobody wants to do it.
Speaker:Right.
Speaker:And so it's the junior person
Speaker:I will say, I will say one of my specializations when I worked with backup
Speaker:was also monitoring the backup systems.
Speaker:And I was telling everybody, you realize you need to be monitoring
Speaker:these two for like a number of reasons, especially like if you're
Speaker:ransomware and you go to Restore and you realize your backups weren't running.
Speaker:Like that's a big one too, but kind of looking at like, Hey, like why is Bob
Speaker:from accounting restoring a VM at 3:00 AM.
Speaker:Bob from accounting shouldn't be doing that.
Speaker:Like what is going on here?
Speaker:Well, someone got his credentials and he had access to the backup server.
Speaker:Hello?
Speaker:yeah, yeah.
Speaker:Um, least privilege, right?
Speaker:The
Speaker:One of my favorites.
Speaker:That is probably like my number one, I talk to people about
Speaker:like, let's start there please.
Speaker:yeah.
Speaker:Yeah.
Speaker:Especially when it comes to VMware, right?
Speaker:Like Bob, I like Bob.
Speaker:I'm gonna pick on Bob from accounting now, like Bob from Accounting
Speaker:shouldn't be able to log into vCenter.
Speaker:I'm just putting that out there
Speaker:Yeah, I know Bob from accounting's, an idiot.
Speaker:Are there other things you would recommend sort of as like best practices
Speaker:to sort of reducing the risk of ransomware in a vCenter environment?
Speaker:put vCenter on the internet.
Speaker:If you go to Showdan, it's all over the place.
Speaker:People still do this.
Speaker:People put their ES x I hosts on the internet too.
Speaker:Do not do this, please.
Speaker:And I know, but Melissa, there's valid reason that we would do this.
Speaker:And if you do it in a protected manner and blah, blah, blah, and
Speaker:you think it's safe, well whatever.
Speaker:Nothing's safe these days, fine.
Speaker:Fight me on it.
Speaker:But like, let's start there.
Speaker:Let's start with the basics.
Speaker:Um, that's important.
Speaker:Principle least privilege is a big thing.
Speaker:Um, Having a good strong E S X I root password is a good thing.
Speaker:Not having it written on or in a file on your desktop.
Speaker:What was it?
Speaker:I, so I follow a lot of this stuff and I can't remember, oh, it was some
Speaker:big hack and I can't remember which one right now, but it was really going
Speaker:around Twitter and like someone found the password file that was on someone's
Speaker:desktop and whoever posted on Twitter, it was all redacted with the passwords
Speaker:out, but they had every password to all of the infrastructure in a notepad file.
Speaker:So someone got into someone's desktop, cuz that's when a lot of it happens.
Speaker:They get access to your desktop or your PC or whatever they found it.
Speaker:And guess what?
Speaker:Now I have the root password for E S X I. I have the keys to the whole kingdom.
Speaker:Like, don't
Speaker:You know, the, the thing is these things sound so stupid, but you know
Speaker:that, you know, like so many of the hacks that happen, ransomware and,
Speaker:and, uh, and otherwise they're, because of really stupid stuff.
Speaker:Like not installing
Speaker:human error.
Speaker:right?
Speaker:Not installing a patch, having your root passwords up on a thing, um, you know,
Speaker:saved in a browser.
Speaker:Right?
Speaker:Your password.
Speaker:Like don't do
Speaker:yeah.
Speaker:Um, the, so, so it's like the, these seem like really basic things, but
Speaker:if everybody in the world did these really basic things, there would be
Speaker:a significantly, um, smaller amount of ransomware, I think, in the
Speaker:But I have a question about that though.
Speaker:I agree with everything you guys have said.
Speaker:. But if you got rid of all the low hanging fruits, wouldn't
Speaker:everything else become much har,
Speaker:Well, that's the thing, right?
Speaker:Once we get through this and we
Speaker:It'll be the next level.
Speaker:Yeah.
Speaker:that's the thing, right?
Speaker:So like these threat actors are out there doing this stuff day in and day out.
Speaker:Like, uh, it is like if I'm a threat actor, like.
Speaker:. I bet they, I bet these gangs have like VMware specialists working
Speaker:for them at this point, that all they do is go in and home.
Speaker:VMware, I'm sure they have a backup specialist that they
Speaker:know all the backup systems.
Speaker:They just go like, you have to understand that these threat actors are specialized.
Speaker:Right.
Speaker:Of course there's generalists.
Speaker:Um, you have the whole ransomware as a service thing where they just get in
Speaker:and they kind of hand it over to the threat actors and all that kind of stuff.
Speaker:So like all these people do is, and they're generally probably pretty smart
Speaker:people, is like, I'm just gonna figure out every way I. Just own VMware.
Speaker:And that's, that's, that's what they do day in and day out, right.
Speaker:So it, it's hard to compete that with that kind of stuff.
Speaker:And once we clear up the basics, yes, there's gonna be another area to target.
Speaker:There's gonna be something new to exploit.
Speaker:Um, those zero days are gonna come out and people aren't gonna patch 'em
Speaker:and everybody's watching it, right?
Speaker:Like I read, um, All the CVEs and stuff like that.
Speaker:Like they're just sitting there going, oh, I can exploit this and off to the races.
Speaker:Like it's, it's a big thing.
Speaker:There's no, there's no silver bullet.
Speaker:There's no one size fits all.
Speaker:It's just
Speaker:Well, I know.
Speaker:mitigate the risk.
Speaker:Right?
Speaker:Yeah.
Speaker:That, that's why my approach when talking to people has been, just assume that
Speaker:ransomware is going to get into your
Speaker:Assume breach.
Speaker:Thank you.
Speaker:let's, just, let's just stop playing around.
Speaker:Assume breach.
Speaker:How do you recover?
Speaker:How do you stop them?
Speaker:How do you recover?
Speaker:And how do you, and how do you limit the blast?
Speaker:Right.
Speaker:How do you, you know, we, you know, I
Speaker:do you, how do you limit, the amount of damage they can do and then recover.
Speaker:I know,
Speaker:That's where it has
Speaker:And a, and a great for those that are, you know, if you're listening
Speaker:to this and you're on, because you're a fan of @vmiss, that's great.
Speaker:Uh, you should check out this other guy that we, we had on a podcast.
Speaker:We went pretty deep into this Snorkel 42.
Speaker:I'll put a link in the show notes.
Speaker:Um, so we, you know, he went into things like, um, what do you call it?
Speaker:Um, um, limiting.
Speaker:U Rack reference?
Speaker:Like how did he come up with 42?
Speaker:You know what
Speaker:I
Speaker:Rack or is it like, what's that
Speaker:know, we didn't ask, we didn't ask.
Speaker:Oh, Hitchhiker's guide.
Speaker:the Universe?
Speaker:Yeah.
Speaker:The Hitchhikers guide.
Speaker:Yeah.
Speaker:Yeah.
Speaker:He posts on Reddit all the time on the CIS admin forum, so,
Speaker:Yeah.
Speaker:Um, and you know, he, he talked a lot about limit limit limiting
Speaker:or stopping lateral movement within your company, period.
Speaker:Cuz it's, it's, it's the kind of thing where people.
Speaker:I've only been in literally one company, one company in my entire
Speaker:career where lateral movement had been completely shut off.
Speaker:Right.
Speaker:And, and I, and I only knew that was because backup was really, really hard.
Speaker:like we, we had to go in and, yeah.
Speaker:And I had, there, there's a, there's a great story, which I won't retell right
Speaker:now, but it ends up with me losing.
Speaker:Stuff at late at night.
Speaker:Um, and, uh, because of they did that.
Speaker:But that's the kind of thing you have to do.
Speaker:Look at it's, it's, it's like the, it's like the concept of least privilege.
Speaker:Look at your network, figure out which servers need to talk to which servers
Speaker:and make that happen and nothing else.
Speaker:Um, what, anything else that you're, you're thinking about Melissa,
Speaker:Oh, there's so much.
Speaker:There's, there's so much.
Speaker:It's just like, it's a ridiculous amount of stuff and it's little stuff, right?
Speaker:It's like leaving s ssh on making sure it's turned off by detail fault.
Speaker:That's a good way to get in.
Speaker:Uh, anything, anybody who has access to vCenter, right?
Speaker:We
Speaker:RDP
Speaker:about rdp?
Speaker:Well, the good news is vCenter is a Linux-based appliance.
Speaker:So you can't already p to vCenter anymore, at least if there's still
Speaker:some Windows vCenters around there.
Speaker:Wish they probably are
Speaker:there, there.
Speaker:I shouldn't say that.
Speaker:See, I feel weird like saying all this stuff.
Speaker:Like I hate going places and be like, well here's how you break into word.
Speaker:Really screw it up.
Speaker:Um, I feel like I shouldn't be doing that, but I'm sure
Speaker:Yeah, I mean,
Speaker:stuff.
Speaker:Um, I think there's still some Windows V centers hanging around.
Speaker:. Um, but the same thing with the V Center, right?
Speaker:Don't, don't have SSH on there either.
Speaker:Turn off all the ssh s it's really simple to do, but people like it.
Speaker:It's like a thing, right?
Speaker:Like, oh, it's easier to ssh and go do whatever I have to do, but you forget to
Speaker:turn it off afterwards, stuff like that.
Speaker:Um, VMware's actually been very good about, um, they have like a whole
Speaker:ransomware page where they list everything out that they suggest and stuff like that.
Speaker:And that's like a good reading starting point for anybody.
Speaker:But people, people just get like sloppy and, and I get that
Speaker:and I have found like being.
Speaker:It's weird.
Speaker:I have like two personalities, like which Melissa's gonna show up?
Speaker:Is it VMware, Melissa and infrastructure VMware's infrastructure?
Speaker:Melissa's gonna show up.
Speaker:Or is security Melissa gonna show up?
Speaker:Are they gonna show up together?
Speaker:Like who knows, right?
Speaker:It's like I've got these two personalities.
Speaker:Um, and I've noticed that there is not a lot of cross
Speaker:pollination in this space, right?
Speaker:There's not a lot of VMware people doing security and there's not a lot of
Speaker:security people that really understand.
Speaker:and I've seen this gap for a very long time, and I'm like trying to
Speaker:bridge it with some of my blog posts and my content and stuff like that.
Speaker:So I'll be putting more effort into there.
Speaker:But you know, you really gotta the two organ, the two teams
Speaker:really just need to work together.
Speaker:that's interesting that you mentioned like, yeah, security and
Speaker:virtualization teams not necessarily
Speaker:Like I can tell you, every time I see a VMware ransomware article
Speaker:in the news, it is factually.
Speaker:, like, I don't know where they're getting their information from, from, but it's
Speaker:like usually wrong most of the time.
Speaker:And I'm just like, people don't understand these things.
Speaker:Yeah.
Speaker:I wonder if it's kind of like back in the day, how backup and
Speaker:virtualization teams never talked to each other and everything was broken.
Speaker:Maybe if they need something like that.
Speaker:I remember those days and I feel old saying that, but
Speaker:I, I do remember those days.
Speaker:Do you remember?
Speaker:You remember?
Speaker:Uh, what was it?
Speaker:Uh, V C B. You remember V c b
Speaker:Yeah.
Speaker:I said, I said that it stood for very crappy backup.
Speaker:That's what I said.
Speaker:It stood
Speaker:Yeah, I remember
Speaker:Um, yeah, that was
Speaker:More backup
Speaker:1.0. Um, yeah.
Speaker:So e everything you just said about VMware, I would take, and I would
Speaker:use, I would say exactly the same thing about backup teams, right?
Speaker:And they're often, they're often very junior.
Speaker:So what happens when we have to get the VMware team, the backup team, and
Speaker:the security team in the same room?
Speaker:What is
Speaker:And network and network team.
Speaker:Don't forget that.
Speaker:the network team too while we're at it.
Speaker:Well, I, I mean, hopefully these attacks have become so common, right.
Speaker:You know, um, Druva did a, a survey and, and half of the companies
Speaker:said that they had been hit with ransomware in the last three years.
Speaker:Right.
Speaker:Um, and.
Speaker:You know, hopefully things are become, because you know, if I back up, if I
Speaker:look at traditionally backup and Dr.
Speaker:Um, you could often, you could often say things like, well, if, if a meteor hits
Speaker:or if, if a, you know, if the earthquake takes out, I live in San Diego, right.
Speaker:If the earthquake and, and suddenly Arizona becomes beach freight property,
Speaker:I'm gonna be dead and I won't care.
Speaker:Right.
Speaker:And the, and the odds of that are, you know, right.
Speaker:But,
Speaker:And that's the
Speaker:but you can't say that with, with
Speaker:the problem with DR. And all the traditional dr. I like to say that
Speaker:ransomware is a disaster, right?
Speaker:Your disaster recovery plan is a great place to start.
Speaker:But here's the thing, how many organizations didn't actually bother?
Speaker:Cause we're gonna accept the risk of the meteor strike cuz it's not gonna happen.
Speaker:Right,
Speaker:Versus ransomware, which is so much
Speaker:gonna happen.
Speaker:It's not if it's
Speaker:Yeah.
Speaker:I remember being in a, in, in a, in a meeting trying to work with a large.
Speaker:Company, defense contractor and, and, and, and they were basically saying, yeah, if,
Speaker:if, you know, if, if that hit, if that happens, I will be dead and I won't care.
Speaker:That was literally his official position.
Speaker:Let's move on.
Speaker:Move on.
Speaker:He said . I was like,
Speaker:But one question I have, so we're saying that ransomware is common, right?
Speaker:People are hit with it, but are there sort of best practices like, Hey,
Speaker:here's what you should be doing, and not just in silos, like the backup
Speaker:team has stuff that they talk about the VMware, like you said, VMware published
Speaker:something on how to prevent it, but.
Speaker:Sort of looking holistically across all these organizations, security, networking,
Speaker:virtualization, backup teams, right?
Speaker:To come together as, Hey, here's really what you guys should be
Speaker:talking about before, letting each team sort of figure things out.
Speaker:So here's the interesting thing, part interesting thing.
Speaker:I think until the tail end of 2022, the number one way threat actors got
Speaker:in was through phishing attacks, right?
Speaker:Someone clicked a link in the email.
Speaker:, that was the number one way, but I believe in the later half of the year,
Speaker:and you guys might know better, it switched to vulnerabilities, right?
Speaker:Vulnerabilities are now the number one way threat actors are getting in.
Speaker:So I think we really need to start with.
Speaker:How are they getting in and starting there?
Speaker:And each piece right kind of starts with cleaning up their house,
Speaker:the VMware vulnerabilities, cuz there are VMware vulnerabilities.
Speaker:Like everybody likes to talk about hypervisor escapes.
Speaker:Like, that's like the classic VMware hacking thing.
Speaker:Like, hahaha hypervisor escape.
Speaker:I'm gonna be, and I'm gonna take over the hose.
Speaker:Like I, it drives me up a wall.
Speaker:I'm like, that's all anybody ever thinks of when they think about virtualization
Speaker:insecurity as a hypervisor escape.
Speaker:And that does not.
Speaker:, no one cares.
Speaker:That's not what's gonna get you.
Speaker:Right.
Speaker:So if we start with something like vulnerabilities, right?
Speaker:Everybody's gotta clean their own house, right?
Speaker:All the VMware team, the network team, the storage team, the backup
Speaker:team, cuz backup software has vulnerabilities sometimes too.
Speaker:Like anything can be vulnerable.
Speaker:So let's look at the way that the threat actors are getting in and
Speaker:everybody clean up their house.
Speaker:And then let's all get together and talk about how we clean up
Speaker:our house and go from there.
Speaker:Yeah.
Speaker:I think if, if we look at like all these teams, right?
Speaker:What they all have in common is let's get good passwords in a password
Speaker:management system, whatever you have, let's make sure that patch management
Speaker:and patch installs is, is top of the top of the priority, right?
Speaker:Get MFA.
Speaker:. Right.
Speaker:Um, and, you know, and, and, and, and, and monitoring and, and also
Speaker:the concept of least privilege.
Speaker:How are you, how are you implementing these concepts in your environment?
Speaker:Security team, backup team s you know,
Speaker:Security team too, right?
Speaker:They don't get a free pass.
Speaker:It's not like I'm the security person, so I don't have to update my software.
Speaker:Like it doesn't work that way.
Speaker:Like you're, you're the same as everybody else,
Speaker:Yeah, because I think if you, if you just, if you just put in like, so many
Speaker:hacks are simply based on zero zero day vulnerabilities that came out six
Speaker:months ago that have been, that have been
Speaker:and no one
Speaker:that no one patched, right?
Speaker:You know, you look, you look at what happened at Rackspace.
Speaker:The Rackspace, they're calling it a zero day vulnerability, but it was actually
Speaker:fixed only because it was unknown.
Speaker:Prior to that, but it was actually fixed by the patch that came
Speaker:out a month before the attack,
Speaker:And I think, um, I remember was it Exchange or something?
Speaker:I don't remember what, but I remember seeing this go around.
Speaker:It was, uh, some microsofty thing.
Speaker:I don't know if it was like RDP or Exchange R d p,
Speaker:ransomware Deployment Protocol.
Speaker:Um,
Speaker:they've,
Speaker:I.
Speaker:Um, so it was something that, it was like a lot of, uh, windows-based
Speaker:ransomware going around, but it was the same thing, like the vulnerability
Speaker:used was like six months old and no one had bothered to patch it so,
Speaker:Yeah.
Speaker:Yeah,
Speaker:So, uh, I know we talked about like each house cleaning up.
Speaker:I think though, the other thing that these four groups need coordinated with is when
Speaker:they do get hit by ransomware though, what does their response look like?
Speaker:I feel that a lot of organizations don't have that.
Speaker:of Worm as my friend.
Speaker:I know a lot of organizations don't have that plan.
Speaker:In fact, Curtis, when we had Tony from Spec Spectra Logic on the call, right?
Speaker:Talking through like what happened when Spectra Logic
Speaker:got hit with ransomware, right?
Speaker:His big thing was like, I don't even know where to start.
Speaker:Right?
Speaker:And luckily they had cyber insurance they had just signed
Speaker:up for the month before, right?
Speaker:And so they had experts who would come in and sort of guide them through that.
Speaker:But a lot of these organizations like, it's almost like you have
Speaker:to do that fire drill right ahead of time and be like, Hey,
Speaker:have it.
Speaker:That's what you have to do.
Speaker:You have to practice
Speaker:Honestly, uh,
Speaker:DR test, ransomware recovery test.
Speaker:I want us to do an entirely separate recording on that.
Speaker:I, I, I agree with you.
Speaker:We're already, we're already over our normal time.
Speaker:Uh, and we, and I don't wanna shortchange that topic.
Speaker:I think that topic is, is dead onPrasanna and, uh, and I
Speaker:think Melissa should come back.
Speaker:What do you think, Melissa?
Speaker:Yeah.
Speaker:Absolutely.
Speaker:I'd love to come back.
Speaker:All right.
Speaker:All right.
Speaker:Well, I have a birthday lunch waiting for me.
Speaker:You do.
Speaker:I'm gonna go do that.
Speaker:And, um, Melissa, uh, this, this has been great, uh, exciting and, and I'd love to
Speaker:hear, you know, uh, somebody talk about backup and security all at the same time,
Speaker:I know it's fun, right?
Speaker:There's like, how many of us are there out there?
Speaker:I don't think there's many of us.
Speaker:It's so nice to be able to have a conversation about it.
Speaker:yeah, and thanks again.
Speaker:Anytime.
Speaker:Nice to meet you, Melissa, and looking forward to having you back on.
Speaker:Absolutely.
Speaker:All right, and thanks again to our listeners.
Speaker:We're nothing without you.