Before posting, and to avoid disappointment, please read the following:

  • This forum is not for 2BrightSparks to provide technical support. It's primarily for users to help other users. Do not expect 2BrightSparks to answer any question posted to this forum.
  • If you find a bug in any of our software, please submit a support ticket. It does not matter if you are using our freeware, a beta version or you haven't yet purchased the software. We want to know about any and all bugs so we can fix them as soon as possible. We usually need more information and details from you to reproduce bugs and that is better done via a support ticket and not this forum.

Protecting NAS against ransomwear

SyncBackFree is the freeware version of SyncBack. It is *not* an evaluation version of SyncBackPro/SE.
Post Reply
brilliantweb
Newbie
Newbie
Posts: 3
Joined: Tue Oct 04, 2016 1:00 pm

Protecting NAS against ransomwear

Post by brilliantweb »

Hi

I have a NAS attached to a LAN via a switch.
The individual PC is set to backup to the NAS using SyncBackFree.

The PC was infected with Locky, which encrypted all the files on the PC, and then also reached into the NAS and encrypted the backup files as well.

Is there any configuration of PC / NAS / SyncBack that would allow SyncBack access to the NAS for backup purposes, without the ransomwear gaining access to the NAS?

Thanks
Brendon
brilliantweb
Newbie
Newbie
Posts: 3
Joined: Tue Oct 04, 2016 1:00 pm

Re: Protecting NAS against ransomwear

Post by brilliantweb »

If I set the destination NAS connection via FTP, and set a different password to the PC administrator password, and remove all network share links to the NAS, would that prevent the ransomware from gaining access to the NAS?

Thanks
Brendon
Swapna
2BrightSparks Staff
2BrightSparks Staff
Posts: 993
Joined: Mon Apr 13, 2015 6:22 am

Re: Protecting NAS against ransomwear

Post by Swapna »

Hi,

Sorry, but there is no setting in SyncBackFree/SE/Pro to stop ransomware from gaining access to your NAS drive. Note that ransomware itself can easily access and encrypt files stored on a mapped drives or USB drives for which a drive letter is assigned and drives that can be accessed directly without a password. Therefore, we suggest backing-up files to an offsite FTP, FTPS, SFTP server or Cloud server (like Amazon S3 or Azure).

I would suggest you to read these articles which provide suggestions on how to protect your important data from ransomware or cryptolocker:

http://www.2brightsparks.com/resources/ ... mware.html

http://www.2brightsparks.com/resources/ ... mware.html

But please note that some suggestions given in above articles requires using either SyncBackPro or SE. If you want you can test with SyncBackSE/Pro, which we offer a free 30-day evaluation. You can download and install latest version of SyncBackSE/Pro from here:

http://www.2brightsparks.com/downloads.html

Thank you.
brilliantweb
Newbie
Newbie
Posts: 3
Joined: Tue Oct 04, 2016 1:00 pm

Re: Protecting NAS against ransomwear

Post by brilliantweb »

Hi

Thanks for those links.

My client is in a rural area with very poor Internet connectivity, so cloud backup is not an option.
The client has a long history of being the point of failure for any backup process that requires manual intervention, so the solution has to be fully automated.

If I use FTP, and set the destination to a local IP on the network, would that work?

The NAS has a fixed IP, and accepts inbound FTP connections.

Thanks
Brendon
cowelln
Enthusiastic
Enthusiastic
Posts: 10
Joined: Thu Nov 29, 2012 3:14 am

Re: Protecting NAS against ransomwear

Post by cowelln »

Here are some interesting tips: http://csharpner.com/blog/index.php/how ... ansomware/

Perhaps we need a Linux version of SyncBack, but it's basically about making sure that the ransomware doesn't have access to everything.
Post Reply