Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Too easily bypassed #15

Open
ghost opened this issue Oct 9, 2020 · 3 comments
Open

Too easily bypassed #15

ghost opened this issue Oct 9, 2020 · 3 comments

Comments

@ghost
Copy link

ghost commented Oct 9, 2020

Ransomware seeking to avoid this protection can simply call the VSS API directly rather than invoking vssadmin, e.g. IVssBackupComponents::DeleteSnapshots.

@Neo23x0
Copy link
Owner

Neo23x0 commented Oct 9, 2020

As long as it works, I can't see no reason to do it in a different way.

@olliencc
Copy link
Contributor

So I've been thinking about this a little bit. At the moment we target the client to implement the functionality.

Looking at the design (https://docs.microsoft.com/en-us/windows/win32/vss/in-box-vss-writers) and also the implementation C:\WINDOWS\system32\vssvc.exe I wonder if we disable delete on the server side.

@RavenfireIT
Copy link

As long as it works, I can't see no reason to do it in a different way.

I think you are missing the point, if the entire system can be bypassed so easily ...

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants