From: | Magnus Hagander <magnus(at)hagander(dot)net> |
---|---|
To: | Gordon Haverland <ghaverla(at)materialisations(dot)com> |
Cc: | PostgreSQL mailing lists <pgsql-general(at)postgresql(dot)org> |
Subject: | Re: Ransomware article |
Date: | 2015-02-03 14:37:29 |
Message-ID: | CABUevEyBr2w1PmcjkWpKnAf8Aj8K7c+sKKZkhyz=UPpPK49yQQ@mail.gmail.com |
Views: | Raw Message | Whole Thread | Download mbox | Resend email |
Thread: | |
Lists: | pgsql-general |
On Tue, Feb 3, 2015 at 3:33 PM, Gordon Haverland <
ghaverla(at)materialisations(dot)com> wrote:
> TheRegister is running an article about someone breaking into a dbase,
> taking control of the encryption key, and 6 or so months later
> demanding ransom from the owner of the dbase.
>
>
> http://www.theregister.co.uk/2015/02/03/web_ransomware_scum_now_lay_waste_to_your_backups/
>
> Anyone want to comment on this? In general, or PostgreSQL in
> particular?
>
As far as I can tell from that article they never broke into any database.
They broke into the PHP server, using bugs in PHPBB and injected encryption
code in the PHP application so that all data was encrypted *before* it was
sent to the database. The database itself was not compromised, it just
stored the encrypted texts as the application asked it to.
This would obviously break things as simple as a LIKE matching on a string,
but if the application is trivial enough not to use that, it's certainly
doable. But all the security issues are 100% within the application itself.
--
Magnus Hagander
Me: http://www.hagander.net/
Work: http://www.redpill-linpro.com/
From | Date | Subject | |
---|---|---|---|
Next Message | Adrian Klaver | 2015-02-03 14:53:33 | Re: dbmsscheduler |
Previous Message | Gordon Haverland | 2015-02-03 14:33:55 | Ransomware article |