Kuboid
Open Luck·Kuboid.in
Security BSides2023
Open in YouTube ↗

Backup ≠ Cyber Recovery

BSidesSLC11 views32:48almost 3 years ago

This talk outlines the critical distinction between traditional data backup and modern cyber recovery in the face of sophisticated ransomware attacks. It emphasizes that attackers frequently target backup infrastructure to prevent restoration, necessitating immutable, air-gapped, and zero-trust recovery architectures. The speaker provides a strategic framework for organizations to improve their cyber resilience, including the development of actionable response playbooks and the implementation of isolated recovery environments.

Why Your Backup Infrastructure Is the Ultimate Ransomware Target

TLDR: Ransomware operators have shifted their focus from encrypting production data to systematically destroying backup infrastructure to force ransom payments. This talk highlights that traditional backup solutions are often poorly secured, lacking MFA and immutability, which makes them easy targets for lateral movement. To defend against this, organizations must implement air-gapped, immutable recovery zones and treat backup management as a critical security function rather than a routine IT task.

Modern ransomware is no longer just about locking files. It is about ensuring you have no way out. Attackers have realized that if they can compromise your backup server, they hold the keys to your recovery. When an organization loses its production environment and finds its backups are either encrypted, deleted, or expired, the pressure to pay the ransom becomes absolute. This is not a theoretical risk; it is the standard operating procedure for groups like LockBit and BlackCat.

The Anatomy of a Backup Compromise

Most organizations treat their backup infrastructure as a secondary concern, often leaving it connected to the same Active Directory domain as their production environment. This is a fatal mistake. Attackers gain initial access through common vectors like phishing or unpatched vulnerabilities in edge devices. Once inside, they perform internal reconnaissance to locate the backup server.

The goal is to move laterally to the backup management console. If that console is running on a standard Windows server with weak access controls, the attacker can easily dump credentials or use existing administrative accounts to gain full control. Once they have access, they don't just delete the backups. They might modify the retention policies to expire data immediately or change the system clock to trick the software into thinking the backups are years old, triggering an automatic purge.

Why Your Current Setup Fails

Many backup platforms were designed for reliability, not for security against a motivated adversary. They often lack multi-factor authentication (MFA) or rely on local accounts that are easily compromised. If your backup server is joined to the same domain as your workstations, a single compromised domain admin account gives the attacker the keys to your entire recovery strategy.

Furthermore, many teams fail to implement immutable storage. If an attacker can issue a command to delete a backup file, they will. You need a system where the backup data itself is physically or logically incapable of being modified or deleted for a set period, regardless of the permissions held by the account that created it.

The Shift to Cyber Recovery

Moving from "backup" to "cyber recovery" requires a fundamental change in architecture. You must assume that your production network is already compromised. This means your backup infrastructure needs to be isolated.

1. Air-Gapping and Immutability

Your backups should reside in an environment that is logically or physically disconnected from the primary network. This is often achieved through a "clean room" or isolated recovery zone. Even if an attacker gains domain admin rights, they should not have the network path or the credentials to reach the backup storage layer.

2. Zero-Trust Access

Stop using shared service accounts for backup operations. Every interaction with the backup console should require MFA, ideally using a hardware token or a separate identity provider that is not tied to your primary Active Directory. If you are using RDP to manage these servers, you are already behind. Disable RDP entirely or gate it behind a VPN with strict IP whitelisting and MFA.

3. Observability and Threat Hunting

You need to know if your backups are being tampered with before you actually need them. Modern backup platforms should provide alerts for anomalous behavior, such as a sudden mass deletion of files or a change in system time. Export these logs to a centralized SIEM like Splunk or Microsoft Sentinel. If you see an alert indicating that your backup server is communicating with an unknown external IP, you have a live incident.

Testing the Recovery Playbook

A recovery plan that has never been tested is just a document that will fail when the pressure is on. During an engagement, I often find that teams have no idea how to restore their most critical systems in an isolated environment. They assume the "restore" button works, but they haven't accounted for the fact that the production network might be full of malware that will immediately re-infect the restored systems.

Run tabletop exercises that simulate a full-scale ransomware event. Force your team to answer the hard questions: How do we identify a clean recovery point? How do we verify that the restored data doesn't contain the original malicious payload? If your Active Directory is compromised, how do you restore it without bringing back the attacker's persistence mechanisms?

Stop thinking about backups as a way to recover a lost file. Start thinking about them as the last line of defense in a war. If you aren't actively securing your backup infrastructure with the same rigor you apply to your production environment, you are already waiting for a disaster. Audit your access controls today, enforce MFA on every management interface, and ensure your backups are immutable. The time to find out your recovery plan is broken is not at 3:00 AM on a Sunday during an active incident.

Talk Type
talk
Difficulty
intermediate
Category
blue team
Has Demo Has Code Tool Released


BSidesSLC 2023

11 talks · 2023
Browse conference →
Premium Security Audit

We break your app before they do.

Professional penetration testing and vulnerability assessments by the Kuboid Secure Layer team. Securing your infrastructure at every layer.

Get in Touch
Official Security Partner
kuboid.in