You are reading a single comment by @hurricane_run and its replies. Click here to read the full conversation.
  • Yes and no. It can send as you by spoofing your email anddress and BCC the same address I guess, with an MTA in the printer, but without your credentials it can’t send “from” your account, only “as” your account, which might sound like a distinction without a purpose but is meaningful.

    The other question is how did the attacker get into Heftys mailbox otherwise?

  • So basically to protect from ransomware attacks you need a gapped master server with old fashioned terminals which are all kept in a secure space. All inputs and outputs are then subject to a myriad of security checks. The general bozos use a secondary server.

  • Isn't that what Tom Cruise got at in Mission Impossible dangling from a rope from the ceiling while the operator was vomiting in the loo :)

  • So basically to protect from ransomware attacks you need a gapped master server with old fashioned terminals which are all kept in a secure space. All inputs and outputs are then subject to a myriad of security checks. The general bozos use a secondary server.

    No, because then a normal business can't run. Something like a SCADA system is meant to* run the way that you describe, but that doesn't work for normal business applications.

    \* But, not always how they actually do run of course

About