Jump to content

Anti-Ransomware SSDs?

NinJake

Summary

An idea has stemmed from a team of researchers to help minimize ransomware attacks. How so? SSD firmware.

 

Quotes

Quote

As soon as it detects malicious activity, the mechanism disables input/output to the storage device, giving users the opportunity to remove the offending process that initiated the encryption.

 

My thoughts

While most of us techies may not go above and beyond to ensure our devices are patched and/or safe from ransomware attacks, I feel that todays "average" pc user might not even know what a ransomware attack is. Instead of having to create firewall rules and/or install "next-gen" antivirus, how could these researchers figure out a way to circumvent potential attacks for the average user? SSDs. Sure, there's still a bunch of people that have HDDs or companies that sell pre-builts with HDDs instead of SSDs.... this is a good step to help keep your data safe. With a supposed 100% success rate, I feel that this will definitely have a ton of support from small to medium sized businesses. And your "average" pc user might not even realize what's working on in the background, yet potentially keeping their data safe. You're welcome grandma.

 

We'll have to wait and see how this unfolds.

 

 

Sources

https://www.techradar.com/news/your-ssd-may-soon-be-able-to-detect-ransomware-attacks

Link to comment
Share on other sites

Link to post
Share on other sites

This actually sounds pretty interesting, though I could see it posing a problem in some applications. I'll have to keep an eye on this. 

Phobos: AMD Ryzen 7 2700, 16GB 3000MHz DDR4, ASRock B450 Steel Legend, 8GB Nvidia GeForce RTX 2070, 2GB Nvidia GeForce GT 1030, 1TB Samsung SSD 980, 450W Corsair CXM, Corsair Carbide 175R, Windows 10 Pro

 

Polaris: Intel Xeon E5-2697 v2, 32GB 1600MHz DDR3, ASRock X79 Extreme6, 12GB Nvidia GeForce RTX 3080, 6GB Nvidia GeForce GTX 1660 Ti, 1TB Crucial MX500, 750W Corsair RM750, Antec SX635, Windows 10 Pro

 

Pluto: Intel Core i7-2600, 32GB 1600MHz DDR3, ASUS P8Z68-V, 4GB XFX AMD Radeon RX 570, 8GB ASUS AMD Radeon RX 570, 1TB Samsung 860 EVO, 3TB Seagate BarraCuda, 750W EVGA BQ, Fractal Design Focus G, Windows 10 Pro for Workstations

 

York (NAS): Intel Core i5-2400, 16GB 1600MHz DDR3, HP Compaq OEM, 240GB Kingston V300 (boot), 3x2TB Seagate BarraCuda, 320W HP PSU, HP Compaq 6200 Pro, TrueNAS CORE (12.0)

Link to comment
Share on other sites

Link to post
Share on other sites

Boy at first blush this seems a lot like Neil DeGrasse Tyson's galaxy-brained "why don't they just make unhackable systems?" idea. If it was that easy to "detect malicious activity" then the problem would already be solved.

Corps aren't your friends. "Bottleneck calculators" are BS. Only suckers buy based on brand. It's your PC, do what makes you happy.  If your build meets your needs, you don't need anyone else to "rate" it for you. And talking about being part of a "master race" is cringe. Watch this space for further truths people need to hear.

 

Ryzen 7 5800X3D | ASRock X570 PG Velocita | PowerColor Red Devil RX 6900 XT | 4x8GB Crucial Ballistix 3600mt/s CL16

Link to comment
Share on other sites

Link to post
Share on other sites

Quote

the mechanism only increases latency between 12.8%-17.3% with a throughput drop that maxed out at 8%.

How much performance hit would you like with that?

 

Implementation sounds reasonable, since when you write, it doesn't actually overwrite the data but stores it in a new location. The old data is only unmapped, but it could be remapped as long as it hasn't actually been TRIM'd yet. You could undo that. The big danger is, if the data on the SSD is not what the system thinks is on it, you could end up with inconsistent states. 

 

I'm thinking this might be a good idea if you can selectively apply it. For example, you might have a designated user data area to be protected, but it would be low value to protect software or other replaceable files.

 

Other factors to be considered it not just how well it can pick up known attack patterns, but I'd want them to prove it is resistant to false positives too. For example, what if you actually do want to encrypt certain data? How do you tell that apart from malware doing same? Imagine you thought you encrypted something, but the SSD silently undid that in the background.

Gaming system: R7 7800X3D, Asus ROG Strix B650E-F Gaming Wifi, Thermalright Phantom Spirit 120 SE ARGB, Corsair Vengeance 2x 32GB 6000C30, RTX 4070, MSI MPG A850G, Fractal Design North, Samsung 990 Pro 2TB, Acer Predator XB241YU 24" 1440p 144Hz G-Sync + HP LP2475w 24" 1200p 60Hz wide gamut
Productivity system: i9-7980XE, Asus X299 TUF mark 2, Noctua D15, 64GB ram (mixed), RTX 3070, NZXT E850, GameMax Abyss, Samsung 980 Pro 2TB, random 1080p + 720p displays.
Gaming laptop: Lenovo Legion 5, 5800H, RTX 3070, Kingston DDR4 3200C22 2x16GB 2Rx8, Kingston Fury Renegade 1TB + Crucial P1 1TB SSD, 165 Hz IPS 1080p G-Sync Compatible

Link to comment
Share on other sites

Link to post
Share on other sites

Isn't this basically TPM for the SSD?  Or am I mistaken?

"Do what makes the experience better" - in regards to PCs and Life itself.

 

Onyx AMD Ryzen 7 7800x3d / MSI 6900xt Gaming X Trio / Gigabyte B650 AORUS Pro AX / G. Skill Flare X5 6000CL36 32GB / Samsung 980 1TB x3 / Super Flower Leadex V Platinum Pro 850 / EK-AIO 360 Basic / Fractal Design North XL (black mesh) / AOC AGON 35" 3440x1440 100Hz / Mackie CR5BT / Corsair Virtuoso SE / Cherry MX Board 3.0 / Logitech G502

 

7800X3D - PBO -30 all cores, 4.90GHz all core, 5.05GHz single core, 18286 C23 multi, 1779 C23 single

 

Emma : i9 9900K @5.1Ghz - Gigabyte AORUS 1080Ti - Gigabyte AORUS Z370 Gaming 5 - G. Skill Ripjaws V 32GB 3200CL16 - 750 EVO 512GB + 2x 860 EVO 1TB (RAID0) - EVGA SuperNova 650 P2 - Thermaltake Water 3.0 Ultimate 360mm - Fractal Design Define R6 - TP-Link AC1900 PCIe Wifi

 

Raven: AMD Ryzen 5 5600x3d - ASRock B550M Pro4 - G. Skill Ripjaws V 16GB 3200Mhz - XFX Radeon RX6650XT - Samsung 980 1TB + Crucial MX500 1TB - TP-Link AC600 USB Wifi - Gigabyte GP-P450B PSU -  Cooler Master MasterBox Q300L -  Samsung 27" 1080p

 

Plex : AMD Ryzen 5 5600 - Gigabyte B550M AORUS Elite AX - G. Skill Ripjaws V 16GB 2400Mhz - MSI 1050Ti 4GB - Crucial P3 Plus 500GB + WD Red NAS 4TBx2 - TP-Link AC1200 PCIe Wifi - EVGA SuperNova 650 P2 - ASUS Prime AP201 - Spectre 24" 1080p

 

Steam Deck 512GB OLED

 

OnePlus: 

OnePlus 11 5G - 16GB RAM, 256GB NAND, Eternal Green

OnePlus Buds Pro 2 - Eternal Green

 

Other Tech:

- 2021 Volvo S60 Recharge T8 Polestar Engineered - 415hp/495tq 2.0L 4cyl. turbocharged, supercharged and electrified.

Lenovo 720S Touch 15.6" - i7 7700HQ, 16GB RAM 2400MHz, 512GB NVMe SSD, 1050Ti, 4K touchscreen

MSI GF62 15.6" - i7 7700HQ, 16GB RAM 2400 MHz, 256GB NVMe SSD + 1TB 7200rpm HDD, 1050Ti

- Ubiquiti Amplifi HD mesh wifi

 

Link to comment
Share on other sites

Link to post
Share on other sites

31 minutes ago, BondiBlue said:

 though I could see it posing a problem in some applications. I'll have to keep an eye on this. 

 

Absolutely. I remember tripping ransomware protection on a company computer once because I was trying to legitimately delete a large folder.  It stopped the file deletion and wouldn't let me go any further (I had already copied the data I needed to another drive). I ended up having to boot into Linux to fix the issue. 

 

An SSD with this kind of "feature" is a hard pass for me if it can't be disabled. I see what they are going for, but no. I'd rather just risk having to format my machine then have to deal with my PC telling me I can't do something. 

Link to comment
Share on other sites

Link to post
Share on other sites

24 minutes ago, Dedayog said:

Isn't this basically TPM for the SSD?  Or am I mistaken?

It's more of VSS (Volume Shadow Copy Service), but at the hardware level instead of the OS.

Link to comment
Share on other sites

Link to post
Share on other sites

Or just keep a regular back up offline.  I've been a bit lazy of late, but usually I periodically take an image of all the PC's in my house and store them in a closet.  At the very least I always have a back up of all the important files in cold storage.

Grammar and spelling is not indicative of intelligence/knowledge.  Not having the same opinion does not always mean lack of understanding.  

Link to comment
Share on other sites

Link to post
Share on other sites

A Write-Once, Read-Many device would be a pretty hard target for ransomware to destroy. 
 

A SSD or HDD controller could be made with a write-protect feature that disregards delete commands, and includes a physical switch that toggled, wipes the entire drive. Not super convenient, but good for archival. Backups are a must too, but layers of protection is nice to have. 
 

This leaves the other problem of preventing ransoware from exfiltrating private data instead. 

My eyes see the past…

My camera lens sees the present…

Link to comment
Share on other sites

Link to post
Share on other sites

5 minutes ago, Zodiark1593 said:

A SSD or HDD controller could be made with a write-protect feature that disregards delete commands, and includes a physical switch that toggled, wipes the entire drive. Not super convenient, but good for archival. Backups are a must too, but layers of protection is nice to have.

having clear paths and a controller that can choose those paths to open, when selecting a number etc. and if open for write new or "update".

Link to comment
Share on other sites

Link to post
Share on other sites

Just now, The Unknown Voice said:

Until the closet catches fire, then what happens?

 

I grew up in a time when a house fire was the loss of nearly everything.  If my house catches fire I have bigger problems than the loss of my pictures and a few programs.

 

Suffice to say, my point was not to be absolute in perfection, but simply to avoid malware and the more common data loss issues.

Grammar and spelling is not indicative of intelligence/knowledge.  Not having the same opinion does not always mean lack of understanding.  

Link to comment
Share on other sites

Link to post
Share on other sites

Sounds good but... I'm not sure it can reliably identify attacks vs false positives. Is ransomware encryption that different from regular, user requested encryption? I could see this working a lot better if it simply required you enter a password in order to be allowed to run encryption.

 

Otherwise the simplest solution remains a cloud backup.

Don't ask to ask, just ask... please 🤨

sudo chmod -R 000 /*

Link to comment
Share on other sites

Link to post
Share on other sites

8 hours ago, whm1974 said:

Most Ransomware Issues are caused between the Chair and Keyboard. Don't Pirate and be careful of what and where you DL.

Thats pretty outdated advice, nowadays you could get infected even on a trusted site even without downloading anything.....

Link to comment
Share on other sites

Link to post
Share on other sites

I can see this becoming a cool technology that ultimately becomes too difficult to deal with due to all of the problems that come up as a result of this special firmware.

 

We need to remember that the biggest risk of modern day ransomware to businesses is the information exfiltration (e.g. customer records, etc) causing significant reputational damages in addition to the other damages of having your files encrypted.

 

Cost-effective backup options that allow you to use WORM (Write-Once, Read-Many) are out there for businesses that are looking for a disaster recovery solution.

 

In the end ransomware attacks will always be a possibility, since there will always be vulnerabilities.  But in the modern day of the internet - many companies have poor systems architecture (there is always the crusty server in the back), and so the best option in my opinion is for customers and vendors alike to start improving on their architectural security.

 

I know this is a long one - just my 2 cents.  This is a cool technology, but my hunch many businesses probably won't see it important enough to justify the cost.

Link to comment
Share on other sites

Link to post
Share on other sites

1 hour ago, jagdtigger said:

Thats pretty outdated advice, nowadays you could get infected even on a trusted site even without downloading anything.....

Click on Me.exe

(this element is corrupt and contains malware)

Link to comment
Share on other sites

Link to post
Share on other sites

2 hours ago, jagdtigger said:

Thats pretty outdated advice, nowadays you could get infected even on a trusted site even without downloading anything.....

Odd times when we agree.  But we do here.  Tech has become complex enough that even the well experienced tech heads can get caught out.

Grammar and spelling is not indicative of intelligence/knowledge.  Not having the same opinion does not always mean lack of understanding.  

Link to comment
Share on other sites

Link to post
Share on other sites

4 hours ago, jagdtigger said:

Thats pretty outdated advice, nowadays you could get infected even on a trusted site even without downloading anything.....

I wouldn't say that it is completely outdated. It still works for most Malware most of the time.

Link to comment
Share on other sites

Link to post
Share on other sites

38 minutes ago, whm1974 said:

I wouldn't say that it is completely outdated. It still works for most Malware most of the time.

remember when ccleaner ( a highly recommended sys tool from a large antivirus company) was compromised with malware causing millions of people to download a backdoor?

 

https://www.wired.com/story/inside-the-unnerving-supply-chain-attack-that-corrupted-ccleaner/

 

I also believe there was malware distributed through Linux repositories, but I haven't got a link and couldn't be bothered looking.  But that one was a bit nasty because the recommended way to get secure software installed was compromised (falaks or something if I remember).

 

It's no longer good enough to just be cautious and use common sense. 

Grammar and spelling is not indicative of intelligence/knowledge.  Not having the same opinion does not always mean lack of understanding.  

Link to comment
Share on other sites

Link to post
Share on other sites

I hope this will become a thing that actually works and will be implemented across all SSD's so that in the future it's a normal security feature. 

We have already seen what ransomware can do to hospitals and so on. It's terrifying. 

PC Setup: 

HYTE Y60 White/Black + Custom ColdZero ventilation sidepanel

Intel Core i7-10700K + Corsair Hydro Series H100x

G.SKILL TridentZ RGB 32GB (F4-3600C16Q-32GTZR)

ASUS ROG STRIX RTX 3080Ti OC LC

ASUS ROG STRIX Z490-G GAMING (Wi-Fi)

Samsung EVO Plus 1TB

Samsung EVO Plus 1TB

Crucial MX500 2TB

Crucial MX300 1TB

Corsair HX1200i

 

Peripherals: 

Samsung Odyssey Neo G9 G95NC 57"

Samsung Odyssey Neo G7 32"

ASUS ROG Harpe Ace Aim Lab Edition Wireless

ASUS ROG Claymore II Wireless

ASUS ROG Sheath BLK LTD'

Corsair SP2500

Beyerdynamic DT 770 PRO X (Limited Editon) & Beyerdynamic TYGR 300R + FiiO K7 DAC/AMP

RØDE VideoMic II + Elgato WAVE Mic Arm

 

Racing SIM Setup: 

Sim-Lab GT1 EVO Sim Racing Cockpit + Sim-Lab GT1 EVO Single Screen holder

Svive Racing D1 Seat

Samsung Odyssey G9 49"

Simagic Alpha Mini

Simagic GT4 (Dual Clutch)

CSL Elite Pedals V2

Logitech K400 Plus

Link to comment
Share on other sites

Link to post
Share on other sites

2 hours ago, mr moose said:

remember when ccleaner ( a highly recommended sys tool from a large antivirus company) was compromised with malware causing millions of people to download a backdoor?

 

https://www.wired.com/story/inside-the-unnerving-supply-chain-attack-that-corrupted-ccleaner/

 

I also believe there was malware distributed through Linux repositories, but I haven't got a link and couldn't be bothered looking.  But that one was a bit nasty because the recommended way to get secure software installed was compromised (falaks or something if I remember).

 

It's no longer good enough to just be cautious and use common sense. 

I went Windows free for awhile so no I don't remember this. However I recall the News about Linux Mint being Compromised. I'll have to read up on the details, but it was one person who gain The Chain of Trust by submitting good code.

 

Link to comment
Share on other sites

Link to post
Share on other sites

22 hours ago, James Evens said:

Can't wait for the McAfee SSD.

McAfee SSD Regular: 200$

McAfee SSD Ultra: 0,5kg of coke

McAfee SSD Super Safe: 1.25kg of coke

McAfeee SSD Ultra Instinct: 5kg of pure coke

DAC/AMPs:

Klipsch Heritage Headphone Amplifier

Headphones: Klipsch Heritage HP-3 Walnut, Meze 109 Pro, Beyerdynamic Amiron Home, Amiron Wireless Copper, Tygr 300R, DT880 600ohm Manufaktur, T90, Fidelio X2HR

CPU: Intel 4770, GPU: Asus RTX3080 TUF Gaming OC, Mobo: MSI Z87-G45, RAM: DDR3 16GB G.Skill, PC Case: Fractal Design R4 Black non-iglass, Monitor: BenQ GW2280

Link to comment
Share on other sites

Link to post
Share on other sites

That's quite neat.

| Ryzen 7 7800X3D | AM5 B650 Aorus Elite AX | G.Skill Trident Z5 Neo RGB DDR5 32GB 6000MHz C30 | Sapphire PULSE Radeon RX 7900 XTX | Samsung 990 PRO 1TB with heatsink | Arctic Liquid Freezer II 360 | Seasonic Focus GX-850 | Lian Li Lanccool III | Mousepad: Skypad 3.0 XL / Zowie GTF-X | Mouse: Zowie S1-C | Keyboard: Ducky One 3 TKL (Cherry MX-Speed-Silver)Beyerdynamic MMX 300 (2nd Gen) | Acer XV272U | OS: Windows 11 |

Link to comment
Share on other sites

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now

×