01 Sep 2022
How Ransomware Infiltrates Your Backups
SLEEPER ATTACKS
Dormant ransomware is implanted in otherwise normal files so that it’s simply backed up into your immutable and air-gapped backups. Malware can also be buried in complex files, hidden from the most advanced antimalware scanning. Weeks or months may pass before the ransomware encrypts the live network. However, when the backups are restored, you’ll find they too are now infected too, and you’re caught in an attack loop, and the ransom must be paid.