Can cloud backup be hacked and is it immune to ransomware attacks? null


Cloud backup is one of those terms businesses and individuals blithely use to describe a number of services that aren’t in fact cloud backup at all!
It’s easy to see where the confusion arises. Take Google’s G Suite, for example – or indeed Microsoft 365, Dropbox, Box, or any number of similar solutions. They’re in the cloud and they look after your data – therefore they’re cloud data backup, right?
Not so. They hold your deleted files only for a certain number of days (typically only 20 – 30, depending on the service), archive them for only a few days longer (depending on how you’re consuming the service), and then blitz them forever. This is cloud storage, not cloud backup.
So, in attempting to answer the question as to whether cloud backup can be hacked, or if it is immune to ransomware, we first have to establish what cloud backup actually is.
About the author
Rob Stevenson is Director at BackupVault
Cloud backup: the good, the bad and the illegal
By its very nature, ‘backup’ means data must be retrospectively accessible for far longer than a mere few days.
Sixty days is the generally accepted bare minimum, but GDPR requirements and compliance regimes in highly regulated industries like finance can push this to several years or more.
This is where cloud backup, as a concept, really comes into its own. It stores huge volumes of backed-up data in a powerful data centre elsewhere (aka the cloud). If disaster befalls the office, it doesn’t take the backed-up data with it, because that data is offsite.
But cloud backup is not without its issues – and security is often one of them. This includes how physically secure the data centre itself is, whether the data held in it meets encryption standards both in transit and at rest, and indeed whether the data centre is actually based in a country whose security and data protection standards can be deemed compliant with the law in your own geography.
There are a lot of free or low-cost cloud backup services out there based out of the US, for example, but you could be breaking the law – and exposing yourself to prosecution if a breach occurs – by using them.
And sadly, the security concerns don’t end there. Ransomware – the very evil that online backup is supposedly well positioned to combat, since it can restore unaffected data back into your organisation – can exploit weaknesses in cloud backup to hold the backed-up data itself to ransom.
So, how does a ransomware attack happen? How does it infect cloud backup systems? And how – if at all – can cloud backup offer ransomware protection?
Cloud backup must haves: Configuration, immutability, point-in-time
Ransomware encrypts your data, locking it and making it unusable, and demands you pay a fine to obtain the key to decrypt it. It’s often triggered by a link in a phishing email, using an infected USB device, or opening a malicious attachment.
This can hit your revenues hard, and every type and size of business is at risk. Some 48% of UK companies were targeted by ransomware last year, yet it has also been reported that 2.8 million businesses in the UK back up in the same location as the original data – meaning they don’t really back up at all!
It should come as no surprise, however, that ransomware can compromise cloud backups – particularly given that it can compromise other cloud services easily enough. (Can ransomware affect Google Drive, for example? You bet it can. Is there such a thing as Office 365 email ransomware? Or Microsoft 365, to give it its new name? Yes and yes.)
When it comes to cloud backup solutions, the three bulwarks against ransomware are configuration, immutability, and point-in-time restore.
Configuration
The first is to do with the backup’s own security and access rules setup. Attackers exploit misconfigurations in these to gain access privileges, permanently delete all the backups, and then launch their ransomware attack.
In this scenario, you can’t restore your data from backup because there’s no data there to restore – but correctly configured backup shuts down this ransomware route.
Immutability
The second is to do with how the backup stores and updates data. Data is normally stored in a way that protects files as they are modified, but this can be tricked by ransomware into accepting encryption as a legitimate modification.
Pretty soon, this encryption spreads to all your backups, leaving you with locked-up data in your business and locked-up data in your backup. However, cloud backup that uses immutable storage prevents backed-up data being deleted or altered in any way throughout a specified retention lifetime, and so stops the ransomware in its tracks.
Point-in-time restore
The third, for its part, is about being able to retrieve backed-up data from a precise point in time.
Not only is this helpful for being able to restore data back into your organisation’s systems from the latest possible moment prior to an incident – so that your restored data is as current as possible – it also enables the backup system itself to revert to the latest unaffected files should a misconfiguration permit a ransomware attack within the backup system itself.
Immunity to ransomware? Taken together, these three features deliver what’s required.
Should you ditch cloud storage?
None of this means, however, that cloud storage solutions are somehow hopelessly ‘unbackupable’, even though they can be susceptible to ransomware.
Quite the opposite, actually, since you can simply connect these applications to a suitable cloud backup provider and your data is then both stored in the cloud, and backed-up in a separate cloud – which, should ransomware rear its ugly head at the storage level, keeps your backed-up data protected from it.
In fact, this not only satisfies, but exceeds, the cardinal 3-2-1 rule of data backup: at least three copies of your data (one in your desktop application, one in your storage provider’s cloud, one in cloud backup), in two different locations, at least one of which is offsite.
You can’t stop the hackers and you can’t eradicate ransomware. But with the right cloud backup, you can ensure all their efforts to hold your business hostage are in vain.
Cloud backup is one of those terms businesses and individuals blithely use to describe a number of services that aren’t in fact cloud backup at all! It’s easy to see where the confusion arises. Take Google’s G Suite, for example – or indeed Microsoft 365, Dropbox, Box, or any number…
Recent Posts
- DOGE can keep accessing government data for now, judge rules
- In a test, 2000 people were shown deepfake content, and only two of them managed to get a perfect score
- Quordle hints and answers for Wednesday, February 19 (game #1122)
- Facebook is about to mass delete a lot of old live streams
- An obscure French startup just launched the cheapest true 5K monitor in the world right now and I can’t wait to test it
Archives
- February 2025
- January 2025
- December 2024
- November 2024
- October 2024
- September 2024
- August 2024
- July 2024
- June 2024
- May 2024
- April 2024
- March 2024
- February 2024
- January 2024
- December 2023
- November 2023
- October 2023
- September 2023
- August 2023
- July 2023
- June 2023
- May 2023
- April 2023
- March 2023
- February 2023
- January 2023
- December 2022
- November 2022
- October 2022
- September 2022
- August 2022
- July 2022
- June 2022
- May 2022
- April 2022
- March 2022
- February 2022
- January 2022
- December 2021
- November 2021
- October 2021
- September 2021
- August 2021
- July 2021
- June 2021
- May 2021
- April 2021
- March 2021
- February 2021
- January 2021
- December 2020
- November 2020
- October 2020
- September 2020
- August 2020
- July 2020
- June 2020
- May 2020
- April 2020
- March 2020
- February 2020
- January 2020
- December 2019
- November 2019
- September 2018
- October 2017
- December 2011
- August 2010