Can infostealer recover deleted files and data (which were not securely erased by overwriting their original sectors) to be exfiltrated?
It's an interesting thought. While the tech to recover deleted files could theoretically be baked into malware, you have to look at it from the attacker's perspective.Can infostealer recover deleted files and data (which were not securely erased by overwriting their original sectors) to be exfiltrated?
So I do not have to securely erase files with classified data if I want to delete after use?It's an interesting thought. While the tech to recover deleted files could theoretically be baked into malware, you have to look at it from the attacker's perspective.
For an infostealer author, it's just not worth the effort. Adding that kind of feature makes the malware more complex, which in turn makes it easier to detect. Why would they bother with that risk when there's so much valuable, easily accessible data to steal?
They're focusing their efforts on grabbing browser passwords, cookies, and crypto wallets.
So, while it's not impossible, seeing an infostealer that recovers deleted files isn't a common or realistic threat.
Never confuse the behavior of common malware with the capabilities of a dedicated, sophisticated adversary. If you are handling data that is classified or sensitive in any way, you have a professional and ethical obligation to ensure its complete and permanent destruction after use. Standard deletion is not an option.So I do not have to securely erase files with classified data if I want to delete after use?
What Divegent said is the way to go. While malware is rarely designed to recover deleted files, computer forensics or malicious criminals have tools to do such thing if they have access to your PC. But there's rarely a case where you'll need Gutman's algorithm or similar nowadays. Usually one pass is okay, three passes if you wanna have peace of mind.So I do not have to securely erase files with classified data if I want to delete after use?
SA is annoying with use of some programs.I use the Secure Erase of Parted Magic. Works on SSD's/NvME's. $17 Available here: Parted Magic LLC – Store
Or you can use the Windows' built in 'cipher /w:C:\' to erase unused space on C:. Check cipher /?
But going forward, it is best to put classified data into separate accounts. And make a general surfing standard account for daily use.
HDD for storage of data; SSD is dedicated for OS.At this moment 1 pass with zero's or random is enough to make data unrecoverable. As RoboMan said Gutmen wipe and 35 pass is not needed. Now this is our current understanding, as you know as the years go on technology and new attacks come about and our knowledge about computers changes. But I don't think ordinary malware would look for deleted files, if the pro's can't recover a 1 wipe zero's deleted file then malware authors won't.
Also are you talking about normal 3.5" HDD or SSD? There is a difference on how they handle data deletion and storage. From memory (I stand to be corrected) SSD may leave residual traces of deleted files due the nature and technology of the drives. There has been much debate about this in the past, some say you can recover and some say you can't. The recommendation is to use secure delete option with SSD. Unsure how this affects current m2 SSD's, maybe someone will know and chime in?
In Gpedit, go to Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options > UAC behavior of elevation prompt for standard users : set to Automatically Deny elevation request . That will mean no UAC for Standard Accounts.Beside, in SA when prompted for admin prev, when I click "ok", would not make things as using admin account?
Major Geeeks has an very old version of it for free, but I think it doesn't do 'wipe free space only', but only does 'wipe entire drive'.$17 Available here: Parted Magic LLC – Store
God I hope that your classified data doesn't have access to the regular web where something like an infosteeler can infect it.So I do not have to securely erase files with classified data if I want to delete after use?
What is that ?accelerated lead
shotgun with 1" slugs and go to town. That's what we did in the field or we used Thermite. Pile up bunch of Comm equipment along with drives, set a few Thermite grenades on top of it and let it rip.What is that ?
Peazip can securely delete data.God I hope that your classified data doesn't have access to the regular web where something like an infosteeler can infect it.
The only way to remove/wipe classified data from a drive is via accelerated lead.
or get an FIPS self-encrypting drive and blank the key then overwrite the free space 3 times.