Data2Vault releases Ransomware Recovery capability for MS365 files

Data2Vault extends its existing malware detection and recovery from ransomware services to MS365 to combat evolving ransomware

Data2Vault, an Asigra Hybrid Partner, today announced it has now added the scanning of data in MS365 OneDrive and SharePoint files, detecting zero day exploits during both the backup and recovery processes, to its existing ransomware detection and recovery services.

The latest exploits are found in embedded malware, specifically evolved, time delayed ransomware. This new capability complements the existing scanning of Windows network files which is available within the Data2Vault backup service. Data2Vault now provides the most comprehensive multi-cloud, Recovery from Ransomware services in the market today.

As hacking groups develop more sophisticated ransomware strains, they continue to disrupt backup and Disaster Recovery solutions. Asigra have added a number of measures to ensure your backup files and data are appropriately protected. This includes Advanced Multi-Factor Authentication for a range of services from processing Trash folders to User enablement

As an enterprise-grade cloud backup service, Asigra continues to extend its support for the latest operating systems, hypervisors and applications. These include, but are not limited to, additional  Microsoft 2019 server environments, MS365 Teams, Oracle RDBMS 19c and VMWare vCloud Director 9.5, 9.7 and 10

Should you worry about Ransomware infecting your network or 365 data?

Yes, you should. By all measures, over the last 18 months ransomware has become the largest single Cyber threat to IT operations and Business Continuity. It is a consistent tool used by hackers in double extortion techniques.

It is combined with either Business Email Compromise and Invoice Fraud, or the exfiltration of data that is then sold on the dark web if a fee is not paid. Evolved ransomware infects Windows data, and uses Windows network protocols and programming techniques to traverse networks, embedding malware into Windows files, that will start encrypting data at a pre-set, future date. In a recent study IBM and Ponemon Institute concluded that the average time between a cyber breach and detection is now 207 days, during that time Evolved ransomware is contaminating corporate data.

Air-gapped backups, scanning snapshots or scanning backup files using pattern matching technology will not prevent a successful ransomware attack in 2020 and beyond. As the data gets infected, so do the daily backup files, irrespective of whether they are stored locally or offsite. Scanning backup and recovery files for zero day exploits and protecting backup files from deletion is the only way to combat Evolved ransomware.

If you have suffered a cyber breach, scanning with Asigra Attack Loop will tell you immediately if malware is embedded in your data, at which point the data can be quarantined or deleted

For more information about cloud backup, DR and Recovery from Ransomware services contact

Lorna Gevaux on 0333 344 2380 or at