Repokey, passphrase compromised - how to proceed securely carrying backup history? #8956
-
After an infostealer attack on my computer, I'm assuming my credentials were compromised. I have already secured my BorgBase server and a/c access (much stronger password, added 2FA, changed SSH key), but my main concern is the Borg backup setup itself. (BorgBase repo was not accessed) Doc inidcates that changing the passphrase isn't enough if the repository key is also compromised. My questions are:
|
Beta Was this translation helpful? Give feedback.
Replies: 3 comments 3 replies
-
https://borgbackup.readthedocs.io/en/latest/usage/transfer.html this should work I suppose. I will try to look for a tutorial on it to see someone has published their experience. |
Beta Was this translation helpful? Give feedback.
-
As a quick measure, change passphrases everywhere (including ssh and borg key, but also e.g. for your e-mail accounts). The infostealer could theoretically have stolen your repokey also (because it likely had control of your machine). This would be a quite borg-specific attack though, thus I am not sure about how probable that is.
|
Beta Was this translation helpful? Give feedback.
-
borg-import now has a "from borg" importer! https://github.com/borgbackup/borg-import |
Beta Was this translation helpful? Give feedback.
Hey, thanks a lot for the detailed reply.
I have done that. All critical ones (email host, domain registrar, finance, storage etc) were changed within minutes and some more later and since then I have been on the rest of those.
About
My layperson's analysis indicates the attack failed because I didn't provide my Mac password and disconnected the Internet within seconds of first password popup which literally was at the script start.
The attack was pretty much this. I copied the script from the ru…