On 6/19/2022 4:30 AM, RayLopez99 wrote:
> As you imply, I have read two different things about ransomware: one says ransomware works very quickly, encrypting files within ten seconds. The other says the opposite, that ransomware might take several weeks to infect your entire drive. Hence the need for frequent snapshots (in Synology). It makes sense that both things could be true, that ransomware can be both fast and slow. The slow kind is probably the worse, since it forces you to maintain lots of versions of your files.
>
> RL
Hard drives support encryption of contents.
If you carry out the operation to "change the key"
inside the drive, the data is instantly erased.
That's an example of a fast mechanism for a ransomware,
using the drive to make the data inaccessible instantly.
*******
You may look at your hard drive, and say to me "but my
drive does not encrypt". It does, but it uses the default
key. It's never apparent to you, that the data-bits on
the platter, do not match what you see outside the drive.
I have no documentation, but this is part of the reason,
that if a hard drive controller board fails today,
you transfer the ROM from the old controller board to
the new controller board. If the ROM is burned by
excessive voltage, you're screwed.
On older hard drives, you could change between
controller boards, with no soldering required. On
newer hard drives, you have to move the ROM from
the defective board, onto the new/working board.
I don't know if any of this is addressed in the
latest ATA/ATAPI spec or not (gives hints you would
need to back up assertions like this).
Also, something else I've seen in a news article, is
that the drive internal encryption method is buggy. Microsoft,
when doing BitLocker, offers an option to use the
drive crypto instead of the BitLocker algo. You should
not accept that kind offer, as the integrity of the
drive methods (hardware accelerated) are unknown.
These are some of the "vast unknowns" hiding in our
tech products. Features you might never suspect are
in there.
Paul