There seems to be just another huge attack with crypto trojans. I have an office here, where I am responsible for the samba server that receives the windows backups (with windows backup tool)
In an efford to make the encryption of backup-data unlikely, I removed the w
-attribute recursively for the content of the folder that each machine backups to.
# This removes the w flag for all content of each backup folder
for i in `ls -a | grep 0`;do chmod a-w $i/* ;done
Done this, I realized, that the backup-tool needs to store certain information dynamically and I re-allowed the w
attribute for the following folders
for i in `find -name Catalog`; do chmod -R u+w,g+w $i; done
for i in `find -name SPPMetadataCache`; do chmod -R u+w,g+w $i; done
My plan is, to run this nightly when no backups occour. Actually I have two questions:
- What if
the Catalog
orSPPMetadataCache
gets corrupted? Will this invalidate the backups? - Are there any other folders that need to be writeable for the windows-backup-tool to work properly?