Microsoft OneDrive a willing and eager 'ransomware double agent'
-
A series of mistakes by both Microsoft and third-party vendors have shown OneDrive to be an easily tricked piece of software eager to encrypt anything it can get a junction to.
The Cloud(tm) strikes again
"The good news is that in order to pull the attack off, the threat actor needs to have access to the target device in advance." <-- Yeah, I'm not losing sleep over this one.
-
A series of mistakes by both Microsoft and third-party vendors have shown OneDrive to be an easily tricked piece of software eager to encrypt anything it can get a junction to.
The Cloud(tm) strikes again
"The good news is that in order to pull the attack off, the threat actor needs to have access to the target device in advance." <-- Yeah, I'm not losing sleep over this one.
Kent Sharkey wrote:
"The good news is that in order to pull the attack off, the threat actor needs to have access to the target device in advance." <-- Yeah, I'm not losing sleep over this one.
Would be a pissed employee be dangerous? Or only his/her own data would be at risk (depending on who, that could already be bad enough)?
M.D.V. ;) If something has a solution... Why do we have to worry about?. If it has no solution... For what reason do we have to worry about? Help me to understand what I'm saying, and I'll explain it better to you Rating helpful answers is nice, but saying thanks can be even nicer.
-
Kent Sharkey wrote:
"The good news is that in order to pull the attack off, the threat actor needs to have access to the target device in advance." <-- Yeah, I'm not losing sleep over this one.
Would be a pissed employee be dangerous? Or only his/her own data would be at risk (depending on who, that could already be bad enough)?
M.D.V. ;) If something has a solution... Why do we have to worry about?. If it has no solution... For what reason do we have to worry about? Help me to understand what I'm saying, and I'll explain it better to you Rating helpful answers is nice, but saying thanks can be even nicer.
I suppose you’re right, but it just struck me as another of those “if they get access to your computer, they can do bad stuff” kind of story. I mean, yeah. That’s how bad stuff happens usually.
TTFN - Kent
-
Kent Sharkey wrote:
"The good news is that in order to pull the attack off, the threat actor needs to have access to the target device in advance." <-- Yeah, I'm not losing sleep over this one.
Would be a pissed employee be dangerous? Or only his/her own data would be at risk (depending on who, that could already be bad enough)?
M.D.V. ;) If something has a solution... Why do we have to worry about?. If it has no solution... For what reason do we have to worry about? Help me to understand what I'm saying, and I'll explain it better to you Rating helpful answers is nice, but saying thanks can be even nicer.