• @blabber6285@sopuli.xyz
    link
    fedilink
    89 months ago

    Depends. If you’re at home with a single endpoint, maybe.

    But in cases like the image there’s a lot of internal traffic and you’d want to stop the malware spreading internally. There might not even be internet connection at all.

    Most serious infections are able to work within isolated internal network. You can stop data breaches by cutting external traffic but if you have ransomware you might want to cut internal connections too.

    You might be able to stop the ransomware from triggering on some devices. That of course depends on the type of ransomware and whether it’s triggered based on time, external command or something else.

      • @blabber6285@sopuli.xyz
        link
        fedilink
        49 months ago

        I think that’s rather odd comment. Naturally nobody wants ransomware. And there are good reasons.

        Backups may exist, but do they work properly? Or are the backups encrypted too?

        How old are the backups? They might be less than a day old. But less than a day might still mean a lot of extra work and financial loss.

        There might be a lot of work restoring the backups. You might have a lot of different systems.

        In one of the largest ransomware cases in history, Maersk worked for months to get systems back up and running and data up to date. The insurance payout for it was 1,4 billions. Which is at least indicative of the cost.

        And Maersk had recent and working backups.

        • @ryannathans@aussie.zone
          link
          fedilink
          29 months ago

          Don’t tell me you’d try to continue using the compromised systems if you somehow aborted the drive encryption process

          • @blabber6285@sopuli.xyz
            link
            fedilink
            19 months ago

            Likely not, but definitely depends on the situation.

            And how do you know the backup is not compromised?

            I think it’s not as clear cut. It’s always a risk assessment and depends on context.

            I have to say that I’m not a security expert, just an amateur with conceptual understanding of the topic and some opinions.