Patrik:
At that point our goal was not to use forensics to figure out what happened,
nor quite honestly was I even worried about it. The sole point was to
recover the systems, and get the company operational again.
As a defense measure to ensure the systems were not re-infected, any backups
done during or shortly before the attack were destroyed. (read: tapes
incinerated)
--
Jim Oberholtzer
Agile Technology Architects
-----Original Message-----
From: MIDRANGE-L <midrange-l-bounces@xxxxxxxxxxxxxxxxxx> On Behalf Of Patrik
Schindler
Sent: Thursday, June 3, 2021 10:40 AM
To: Midrange Systems Technical Discussion <midrange-l@xxxxxxxxxxxxxxxxxx>
Subject: Re: Encrypting a library
Hello Jim,
Am 03.06.2021 um 16:50 schrieb <midrangel@xxxxxxxxxxxxxxxxx>
<midrangel@xxxxxxxxxxxxxxxxx>:
Once we got the LIC and QSYS fixed up, to the point of restricted state
operations we found most if not all the applications were clobbered.
Pity you could not take enough time to look more detailed at this
"clobbering". I'm very curious to learn what exactly happened to objects
being inaccessible according to tests by Rob.
:wq! PoC
--
This is the Midrange Systems Technical Discussion (MIDRANGE-L) mailing list
To post a message email: MIDRANGE-L@xxxxxxxxxxxxxxxxxx To subscribe,
unsubscribe, or change list options,
visit:
https://lists.midrange.com/mailman/listinfo/midrange-l
or email: MIDRANGE-L-request@xxxxxxxxxxxxxxxxxx
Before posting, please take a moment to review the archives at
https://archive.midrange.com/midrange-l.
Please contact support@xxxxxxxxxxxxxxxxxxxx for any subscription related
questions.
Help support midrange.com by shopping at amazon.com with our affiliate link:
https://amazon.midrange.com
As an Amazon Associate we earn from qualifying purchases.