I am starting a thread to document my findings observations and experience of having my server wiped out by Makop Ransomware.
So see this as a heads up to check your own stuff.
I suspect, (can't prove) that it got into the 'share' where all my VM qcow files were because a guest was able to connect 'upstream' to the SMB share that was running on the same partition. It encrypted everything on my entire datastore (that was shared on SMB for a number of reasons) .
How did they gain access ? Apparantly RDP into the guest Windows 10 with weak password.
I did not know that the "VMBR3.190 VLAN" does not have to have an ip address in the setup of the PVE.
It is because it had an IP address in the same VLAN, that the Ransomware was able to detect the 'upstream' SMB share. (Can some-one comment on this ?)
I had 'elsewhere' backups in PBS on a different partition. Same machine and in a VM. (qcow on different drive though)
So, lots of data saved. No current guest VM (with regular backups) lost. All old VM lost.
Here's the kicker : There are several VM's still running and working fine despite their qcow files being encrypted.
On restart they will fail (and be gone forever) or on any attempt to do something low level like 'drive imaging' (Observed by other guest VM's)
In at least one case I was able to HOT plug a new qcow into a VM and inside the guest, 'robocopy' the important data files to it.
I'll still have to rebuild from scratch, once done, try attach the newest hotplugged qcow to get data files back in.
Any other backup solution that tries low level access instantly crashes it, because essentially it's drive is gone.
The lesson learnt here is : Guest VM may NEVER EVER EVER see into it's parent.
If guests have need for SMB common shared location, build that into a seperate guest.
Don't share it to them from your Proxmox (Debian) host.
ISOLATE ISOLATE ISOLATE
BACKUP BACKUP BACKUP
So see this as a heads up to check your own stuff.
I suspect, (can't prove) that it got into the 'share' where all my VM qcow files were because a guest was able to connect 'upstream' to the SMB share that was running on the same partition. It encrypted everything on my entire datastore (that was shared on SMB for a number of reasons) .
How did they gain access ? Apparantly RDP into the guest Windows 10 with weak password.
I did not know that the "VMBR3.190 VLAN" does not have to have an ip address in the setup of the PVE.
It is because it had an IP address in the same VLAN, that the Ransomware was able to detect the 'upstream' SMB share. (Can some-one comment on this ?)
I had 'elsewhere' backups in PBS on a different partition. Same machine and in a VM. (qcow on different drive though)
So, lots of data saved. No current guest VM (with regular backups) lost. All old VM lost.
Here's the kicker : There are several VM's still running and working fine despite their qcow files being encrypted.
On restart they will fail (and be gone forever) or on any attempt to do something low level like 'drive imaging' (Observed by other guest VM's)
In at least one case I was able to HOT plug a new qcow into a VM and inside the guest, 'robocopy' the important data files to it.
I'll still have to rebuild from scratch, once done, try attach the newest hotplugged qcow to get data files back in.
Any other backup solution that tries low level access instantly crashes it, because essentially it's drive is gone.
The lesson learnt here is : Guest VM may NEVER EVER EVER see into it's parent.
If guests have need for SMB common shared location, build that into a seperate guest.
Don't share it to them from your Proxmox (Debian) host.
ISOLATE ISOLATE ISOLATE
BACKUP BACKUP BACKUP