Ransomware Recovery
By Veeam
Any App, Any Data , Across any Cloud
The Hyper-Availability solutions
Tanawit Chansuchai
System Engineer, Thailand
Tanawit.chansuchai@veeam.com
Ransomware – The Big Picture
Agenda
How you Get Attacked
Prevention
3-2-1 Rule
Endpoints Protection
1
2
3
4
5
IT Security
What Do You Think Of?
Malware Disrupts Your Business
• Halts productivity and service
delivery
• Loss of data on customers and
core competencies that is critical
to your competitiveness
• Damage to your brand and
reputation
• Legal and regulatory implications
Closer To You
Coming At You
How You Get Attacked
Ransomware Attack Entry Points
79% tied to email with
malicious
attachment/URLs
20% tied to malicious
websites and/or dropped
by exploit kits
1% are actual
ransomware files
How it Works
Multiple Attack Vectors Data Encrypted
Ransom Note Pay Ransom
Data Decrypted – ??
Restore from Backup
OR
Trend Micro research has
found 99% of ransomware in
email and web traffic
Email Threats
• Attachment
• URL
• Social Engineering
• Phishing
• Business Email Compromise
Web Threats
• Phishing
• Social Engineering
• Exploit
• Malvertisement
Identity Theft
• Stealing Your username/password
• Corporate, Personal, Email, Social Networking
• Personal Information – birthdate, home city, etc…
Preventing Ransomware
What can you do?
Veeam
Gateway
Immunize your backup repository against virus
The best backup is useless if a ransomware can access your backup repository!
22
E:Backup>dir
Volume in drive C is Veeam
Volume Serial Number is 6AE5-29
Directory of E:Backup
2016-07-27 16:04 <DIR> .
2016-07-27 16:04 <DIR> ..
2016-07-27 16:05 <DIR> Job-Oracle
2015-11-18 18:19 <DIR> Job-SQL
2015-11-18 18:19 <DIR> VeeamConfigBackup
0 File(s) 0 bytes
4 Dir(s) 17,381,437,440 bytes free
Backup Repositories
Oracle.VM.vbk
SQL.VM.vbk
DC.VM.vbk
All restore points are HEALTHY !
Oracle.VM.vbk
SQL.VM.vbk
DC.VM.vbk
Oracle.VM.vbk
SQL.VM.vbk
DC.VM.vbk
Oracle.VM.vbk
SQL.VM.vbk
DC.VM.vbk
Production Virtual
Infrastructure
Windows Server
Access denied to Virus. Repository
visible only using 3 Party API
Benefit: Your backup repository is protected against Virus
NAS Share
Local Disk Oracle.VM.vbk
SQL.VM.vbk
DC.VM.vbk
All restore points are lost !
Oracle.VM.vbk
SQL.VM.vbk
DC.VM.vbk
All restore points are lost !
Oracle.VM.vbk
SQL.VM.vbk
DC.VM.vbk
All restore points
are HEALTHY !
VM
Hypervisor
VM VM VM
Veeam
Server
Veeam
Proxy
NASBackup
H/W Duduplication
Immunize your backup repository against virus
The best backup is useless if a ransomware can access your backup repository!
2Different media
3Different copies
of data
1of which is off-site
cloud
0No errors after
backup recoverability
verification
1Is offline
3-2-1 Rule
3 Different copies , 2 Different media , 1 air-gapped from network
3–2–1 Rule with Veeam
Enables complete data Availability
Tape
Device
Storage
To insure data recoverability against ransomware:
Have three copies
of your data
Store on two
different media types
Keep one copy
off site
Veeam Cloud
Connect
Database, Applications,
Files & Data
Backup copy
Production Storage
Data Loss Avoidance
Replication Backup file to offsite
Create
Backup Job
Create
Backup
copy Job
Data Loss Avoidance
Replication VMs to Disaster Recovery Site
Create Replication Job
# From Production VMs
# From Backup File
Data Loss Avoidance
Replication VMs to Disaster Recovery Site
Create Replication Job
# From Production VMs
# From Backup File
Data Loss Avoidance
Replication VMs to Disaster Recovery Site (Fail-Back)
Fail back to Production
# Fail back to production
# Undo Fail over
Automate check backup file with schedule
Sure-Backup – Backup Compliance
Host-based
Replication
Automate check DR Situation with schedule
VM
Verification job
OS
Report
App
Sure-Replica – DR Compliance
Disaster Recovery Plan
Sure Replica report
You can schedule automatic report delivery for result of sure replica, you can to receive
report by email, Note that you can schedule report after sure replica job done.
Have visibility into suspicious behaviour
Agents
NEW Veeam Windows and Linux
agents deliver Availability to public
cloud workloads, as well as physical
endpoints, workstations and servers:
• Enable workload mobility
by allowing workloads
to move from on-premises to the cloud
• Streamline operations with one trusted solution
for virtual,
physical and cloud
EndPoint Protection
Veeam Agent for Windows 2.0
NEW Veeam® Agents for Microsoft Windows and Linux work alongside Veeam Backup & Replication™ to extend Availability to Microsoft
Windows and Linux workloads.
- To avoid downtime and data loss for Windows and Linux-based physical or public cloud-based servers, workstations and endpoints quickly and
easily!
NAT SWITCH
• Test update patch
• Troubleshoot issues
• Train IT Staff
• Provision dev application
Verified Protection & Leverage Data
SureReplica & On Demand Sandbox
Veeam
Hyper-Availability
Platform
Physical
Public Cloud
SaaSManaged
Cloud
Private
Cloud
Edge/
IoT
Any data, any app, across any cloud.
Universal APIs
Veeam Backup & Replication
Veeam ONE
Backup
for Office 365
Availability
for AWS
Agents for
Windows & Linux
Veeam Agent for Unix
NEW Beta Available for Download
Ready to Probe of Concept
…is already in development!
Beta Available : version 2 of Veeam Backup for Microsoft Office 365!
Thank you

Ransomeware Recovery by Veeam

  • 1.
    Ransomware Recovery By Veeam AnyApp, Any Data , Across any Cloud The Hyper-Availability solutions Tanawit Chansuchai System Engineer, Thailand Tanawit.chansuchai@veeam.com
  • 2.
    Ransomware – TheBig Picture Agenda How you Get Attacked Prevention 3-2-1 Rule Endpoints Protection 1 2 3 4 5
  • 3.
    IT Security What DoYou Think Of?
  • 6.
    Malware Disrupts YourBusiness • Halts productivity and service delivery • Loss of data on customers and core competencies that is critical to your competitiveness • Damage to your brand and reputation • Legal and regulatory implications
  • 8.
  • 10.
    How You GetAttacked
  • 11.
    Ransomware Attack EntryPoints 79% tied to email with malicious attachment/URLs 20% tied to malicious websites and/or dropped by exploit kits 1% are actual ransomware files
  • 12.
    How it Works MultipleAttack Vectors Data Encrypted Ransom Note Pay Ransom Data Decrypted – ?? Restore from Backup OR Trend Micro research has found 99% of ransomware in email and web traffic
  • 13.
    Email Threats • Attachment •URL • Social Engineering • Phishing • Business Email Compromise
  • 17.
    Web Threats • Phishing •Social Engineering • Exploit • Malvertisement
  • 19.
    Identity Theft • StealingYour username/password • Corporate, Personal, Email, Social Networking • Personal Information – birthdate, home city, etc…
  • 20.
  • 21.
  • 22.
    Veeam Gateway Immunize your backuprepository against virus The best backup is useless if a ransomware can access your backup repository! 22 E:Backup>dir Volume in drive C is Veeam Volume Serial Number is 6AE5-29 Directory of E:Backup 2016-07-27 16:04 <DIR> . 2016-07-27 16:04 <DIR> .. 2016-07-27 16:05 <DIR> Job-Oracle 2015-11-18 18:19 <DIR> Job-SQL 2015-11-18 18:19 <DIR> VeeamConfigBackup 0 File(s) 0 bytes 4 Dir(s) 17,381,437,440 bytes free Backup Repositories Oracle.VM.vbk SQL.VM.vbk DC.VM.vbk All restore points are HEALTHY ! Oracle.VM.vbk SQL.VM.vbk DC.VM.vbk Oracle.VM.vbk SQL.VM.vbk DC.VM.vbk Oracle.VM.vbk SQL.VM.vbk DC.VM.vbk Production Virtual Infrastructure Windows Server Access denied to Virus. Repository visible only using 3 Party API Benefit: Your backup repository is protected against Virus NAS Share Local Disk Oracle.VM.vbk SQL.VM.vbk DC.VM.vbk All restore points are lost ! Oracle.VM.vbk SQL.VM.vbk DC.VM.vbk All restore points are lost ! Oracle.VM.vbk SQL.VM.vbk DC.VM.vbk All restore points are HEALTHY ! VM Hypervisor VM VM VM Veeam Server Veeam Proxy NASBackup H/W Duduplication
  • 23.
    Immunize your backuprepository against virus The best backup is useless if a ransomware can access your backup repository!
  • 24.
    2Different media 3Different copies ofdata 1of which is off-site cloud 0No errors after backup recoverability verification 1Is offline 3-2-1 Rule 3 Different copies , 2 Different media , 1 air-gapped from network
  • 25.
    3–2–1 Rule withVeeam Enables complete data Availability Tape Device Storage To insure data recoverability against ransomware: Have three copies of your data Store on two different media types Keep one copy off site Veeam Cloud Connect Database, Applications, Files & Data Backup copy Production Storage
  • 26.
    Data Loss Avoidance ReplicationBackup file to offsite Create Backup Job Create Backup copy Job
  • 27.
    Data Loss Avoidance ReplicationVMs to Disaster Recovery Site Create Replication Job # From Production VMs # From Backup File
  • 28.
    Data Loss Avoidance ReplicationVMs to Disaster Recovery Site Create Replication Job # From Production VMs # From Backup File
  • 29.
    Data Loss Avoidance ReplicationVMs to Disaster Recovery Site (Fail-Back) Fail back to Production # Fail back to production # Undo Fail over
  • 30.
    Automate check backupfile with schedule Sure-Backup – Backup Compliance
  • 31.
    Host-based Replication Automate check DRSituation with schedule VM Verification job OS Report App Sure-Replica – DR Compliance
  • 32.
    Disaster Recovery Plan SureReplica report You can schedule automatic report delivery for result of sure replica, you can to receive report by email, Note that you can schedule report after sure replica job done.
  • 33.
    Have visibility intosuspicious behaviour
  • 35.
  • 36.
    NEW Veeam Windowsand Linux agents deliver Availability to public cloud workloads, as well as physical endpoints, workstations and servers: • Enable workload mobility by allowing workloads to move from on-premises to the cloud • Streamline operations with one trusted solution for virtual, physical and cloud EndPoint Protection
  • 37.
    Veeam Agent forWindows 2.0 NEW Veeam® Agents for Microsoft Windows and Linux work alongside Veeam Backup & Replication™ to extend Availability to Microsoft Windows and Linux workloads. - To avoid downtime and data loss for Windows and Linux-based physical or public cloud-based servers, workstations and endpoints quickly and easily!
  • 38.
    NAT SWITCH • Testupdate patch • Troubleshoot issues • Train IT Staff • Provision dev application Verified Protection & Leverage Data SureReplica & On Demand Sandbox
  • 39.
    Veeam Hyper-Availability Platform Physical Public Cloud SaaSManaged Cloud Private Cloud Edge/ IoT Any data,any app, across any cloud. Universal APIs Veeam Backup & Replication Veeam ONE Backup for Office 365 Availability for AWS Agents for Windows & Linux
  • 40.
    Veeam Agent forUnix NEW Beta Available for Download
  • 41.
    Ready to Probeof Concept …is already in development! Beta Available : version 2 of Veeam Backup for Microsoft Office 365!
  • 42.