My €0,02
Ransomware on z/OS is very unlikely, but it is possible. We cannot say
it is impossible.
The possibility depends on some circumstances which affect the results
and possible prevention. It will be disscuessed. below (a little bit).
Will backup help? NO!
Backup may be last resort, especially for operating system itself and
batch data. Not for online processing. In this case that could mean
outage and data loss. Imagine lost of half day transactions in a bank...
It is disaster for many businesses.
What about backup from tape and forward recovery from transaction log?
Hey, do you have log? Why can we assume the log is safe when we consider
tables are "ransomwared"? (encrypted by hacker - let me use this neologism)
And what about tape data? There were many voices about virtual tapes -
saying it's not the same as physical tape. Oh, yes - physical cart is
sexy. You can see it, you can touch it and you can remove it from ATL
and keep on you desk. Or even send it to the vault.
First: who removes tape from ATL? And why? Nowadays it can be poor
replacement for second ATL in remote location. Or third copy. Always
backlevel a little.
And how can you know the data on tape is OK and it is not ransomwared
copy of ransomwared dataset? Can I smell it? NO.
Hello - is it possible hacker ransomwared backups on the tape? Why not?
We just assumed he is able to ransomware DASD data.
Such cases did take a place in Windows world.
Conclusion: the only effective way is to do not allow ransomware attack
to happen. Yes, we have to prevent it. All other ideas are like good
advices to a guy after his house was already robbed. Too late. You
already lost a lot.
Reminder: all methods like backup, remote copy, third datacenter, tapes
in vault, etc. will NOT help for ANY PROBLEM. They will help for some
problems only. We are never 100% safe. It can be 99,9% or 99,9999%, but
the gap exists. What's in the gap? Example: Terrorist attack can destroy
our datacenter. There is no reason to assume the terrorists want to
attack us, but we cannot say it is impossible. But it is also possible
the terrorists would attack all our datacenters. BTW: such attack is not
only matter of wall thickness, sometimes it can be false pizza courier
with gun and hostages.
And regarding IPL in VTS environment: AFAIK it is quite possible to IPL
from virtual tape volume. IMHO tape IPL as problem recovery seems to be
obsolete, maybe except poor installations. It is much more convenient to
have rescue LPAR with small z/OS image. It is much faster and more
convenient. Bigger shops may have rescue system cloned to any DASD box
in the installation, it can be IPLable from any CPC, including DR site,
etc.
--
Radoslaw Skorupka
Lodz, Poland
W dniu 04.09.2020 o 20:50, Jesse 1 Robinson pisze:
It’s Friday, so don’t rag on me for venturing into IT fiction. No one has hit
us with this challenge (yet), but it could happen.
Ransomware is much in the news these days. As unlikely as it might be, some
nefarious genius manages to lock you out of your entire disk farm and demands
rubies and bitcoin to remove the lock. Meanwhile your shop is out of the water.
You have everything meticulously mirrored to another site, but as with any good
mirror, the lock has been reflected in your recovery site.
The classic mainframe response--short of forking over the ransom--would be to
IPL a standalone DSS restore tape, then locate and mount standard offload
backup tapes. Restore enough key volumes to IPL a minimal system, then proceed
to restore (all) other volumes. It will take a while, but it will work.
Eventually.
Now consider a smartly modern shop that has taken the advice of a generation of
hired gurus and eliminated 'real tape' altogether. No more physical tapes. No
more physical tape drives.
What would be your sage advice?
.
.
J.O.Skip Robinson
Southern California Edison Company
Electric Dragon Team Paddler
SHARE MVS Program Co-Manager
323-715-0595 Mobile
626-543-6132 Office ⇐=== NEW
[email protected]
----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN
======================================================================
Jeśli nie jesteś adresatem tej wiadomości:
- powiadom nas o tym w mailu zwrotnym (dziękujemy!),
- usuń trwale tę wiadomość (i wszystkie kopie, które wydrukowałeś lub zapisałeś
na dysku).
Wiadomość ta może zawierać chronione prawem informacje, które może wykorzystać
tylko adresat.Przypominamy, że każdy, kto rozpowszechnia (kopiuje, rozprowadza)
tę wiadomość lub podejmuje podobne działania, narusza prawo i może podlegać
karze.
mBank S.A. z siedzibą w Warszawie, ul. Senatorska 18, 00-950
Warszawa,www.mBank.pl, e-mail: [email protected]. Sąd Rejonowy dla m. st.
Warszawy XII Wydział Gospodarczy Krajowego Rejestru Sądowego, KRS 0000025237,
NIP: 526-021-50-88. Kapitał zakładowy (opłacony w całości) według stanu na
01.01.2020 r. wynosi 169.401.468 złotych.
If you are not the addressee of this message:
- let us know by replying to this e-mail (thank you!),
- delete this message permanently (including all the copies which you have
printed out or saved).
This message may contain legally protected information, which may be used
exclusively by the addressee.Please be reminded that anyone who disseminates
(copies, distributes) this message or takes any similar action, violates the
law and may be penalised.
mBank S.A. with its registered office in Warsaw, ul. Senatorska 18, 00-950
Warszawa,www.mBank.pl, e-mail: [email protected]. District Court for the Capital
City of Warsaw, 12th Commercial Division of the National Court Register, KRS
0000025237, NIP: 526-021-50-88. Fully paid-up share capital amounting to PLN
169.401.468 as at 1 January 2020.
----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN