The Backup Wrap-Up cover art

The Backup Wrap-Up

The Backup Wrap-Up

By: W. Curtis Preston (Mr. Backup)
Listen for free

About this listen

Formerly known as "Restore it All," The Backup Wrap-up podcast turns unappreciated backup admins into cyber recovery heroes. After a brief analysis of backup-related news, each episode dives deep into one topic that you can use to better protect your organization from data loss, be it from accidents, disasters, or ransomware. The Backup Wrap-up is hosted by W. Curtis Preston (Mr. Backup) and his co-host Prasanna Malaiyandi. Curtis' passion for backups began over 30 years ago when his employer, a $35B bank, lost its purchasing database – and the backups he was in charge of were worthless. After miraculously not being fired, he resolved to learn everything he could about a topic most people try to get away from. His co-host, Prasanna, saw similar tragedies from the vendor side of the house and also wanted to do whatever he could to stop that from happening to others. A particular focus lately has been the scourge of ransomware that is plaguing IT organizations across the globe. That's why in addition to backup and disaster recovery, we also touch on information security techniques you can use to protect your backup systems from ransomware. If you'd like to go from being unappreciated to being a cyber recovery hero, this is the podcast for you.All rights reserved
Episodes
  • Emergency Episode: The PyPI Software Supply Chain Attack You Need to Know About
    Mar 26 2026

    A PyPI software supply chain attack hit LiteLLM — a library pulled into developer environments 97 million times a month — and if you use it, you may already be compromised. This wasn't a fake package or a typo-squatting trick. Attackers stole real credentials, published malicious code as the real thing, and walked out with SSH keys, cloud credentials, Kubernetes tokens, API keys, and more — all encrypted and sent home before anyone knew what happened.

    I'm doing something I've never done before: an emergency episode, recorded and published immediately because this is that serious. I brought in Dr. Mike Saylor, co-author of our book Learning Ransomware Response and Recovery, and my co-host Prasanna Malaiyandi to break down exactly what happened, how to find out if you were hit, and what you need to do to protect yourself going forward.

    We open with a story from 1982 that perfectly captures what this attack really is — getting poisoned by something you trusted completely. That framing matters. This wasn't a failure of the library. It was a failure of the supply chain. And it can happen again.

    Chapters:

    00:00:00 - Intro: Why this is an emergency episode

    00:01:35 - Meet the guests: Dr. Mike Saylor and Prasanna Malaiyandi

    00:02:31 - The Tylenol poisoning analogy and what it means for software supply chains

    00:05:51 - What LiteLLM is and what the malware actually did to your environment

    00:09:04 - Dependencies explained: why you're affected even if you didn't install LiteLLM directly

    00:12:24 - How to find out if you were hit: the first things to check right now

    00:14:23 - IOCs and TTPs: what to look for in your logs and on your systems

    00:19:07 - Network indicators: unusual traffic and what it tells you

    00:22:12 - How security teams can find out if developers installed it without telling anyone

    00:30:38 - Action items for the future: inventory, pinning, and hash verification

    00:36:55 - Sandboxing new downloads before they touch your environment

    00:37:59 - Immutable backups: why this attack makes the case for them

    00:40:33 - Modern authentication: MFA, its limits, and why passkeys matter

    00:46:53 - Where to get threat intel so you hear about attacks like this faster

    00:53:23 - Wrap-up

    If you installed or upgraded LiteLLM on or after March 24, 2026 without a pinned version, stop what you're doing and listen to this episode first.

    The story:

    https://futuresearch.ai/blog/litellm-pypi-supply-chain-attack/

    https://securitylabs.datadoghq.com/articles/litellm-compromised-pypi-teampcp-supply-chain-campaign/

    https://snyk.io/articles/poisoned-security-scanner-backdooring-litellm/

    https://www.wiz.io/blog/threes-a-crowd-teampcp-trojanizes-litellm-in-continuation-of-campaign

    https://checkmarx.com/zero-post/python-pypi-supply-chain-attack-colorama/

    https://www.upwind.io/feed/litellm-pypi-supply-chain-attack-malicious-release

    https://docs.litellm.ai/blog/security-update-march-2026

    https://www.helpnetsecurity.com/2026/03/25/teampcp-supply-chain-attacks/

    https://www.darktrace.com/resources/the-cisos-guide-to-cyber-ai

    https://securitylabs.datadoghq.com/articles/litellm-compromised-pypi-teampcp-supply-chain-campaign/

    Resources:

    https://www.stopransomware.com

    https://www.cisa.gov

    https://www.cve.org/

    Show More Show Less
    56 mins
  • Fileless Malware: The Attack That Lives in Memory
    Mar 23 2026

    Fileless malware is one of the most dangerous attack types out there — it never writes to your hard drive, lives entirely in RAM, and can steal your credentials before your antivirus has any idea it's there. In this episode, I bring in Dr. Mike Saylor — my co-author on Learning Ransomware Response & Recovery — to break down exactly how this attack works, why it's so hard to detect, and what you can actually do to protect yourself.

    Mike walks us through how fileless malware hides in memory, how bad guys maintain their foothold even after a reboot by modifying registry keys or rewriting the operating system itself, and why the ArcGIS attack is a perfect real-world example — attackers sitting undetected inside a network for two years. We also get into MFA, specifically why a lot of MFA setups are done wrong, why passkeys are the better answer, and when it's time to bring in an EDR or XDR tool.

    Fair warning: the action items here are a bit more advanced than our usual stuff. Think of this as the 401k conversation — don't have it before you've built your emergency fund. But this is stuff you absolutely need to know.

    00:01:26 - Welcome & intro

    00:04:43 - What is fileless malware?

    00:09:16 - How fileless malware achieves persistence (ArcGIS case study)

    00:15:02 - Can fileless malware spread beyond one machine?

    00:16:43 - Defending yourself: MFA done right

    00:20:38 - Why passkeys beat MFA

    00:23:00 - EDR and XDR explained

    00:28:03 - How modern EDR tools detect fileless malware

    00:30:01 - Wrap-up and action items

    Show More Show Less
    32 mins
  • Living Off the Land Attack: Hackers Using Your Own Tools Against You
    Mar 16 2026

    A living off the land attack is one of the sneakiest techniques in a ransomware operator's playbook — and in this episode, Dr. Mike Saylor breaks down exactly what it is, how it works, and what your organization can actually do about it.

    Instead of bringing their own tools into your environment (which might trip your alarms), attackers just use what's already there. PowerShell. WMI. RDP. The same tools your admins run every single day. To your monitoring systems, it looks completely normal. That's the whole point.

    Mike and Curtis cover why attackers prefer your tools over their own, how recon can quietly run for 30 to 90 days before the attack goes loud, and what defenders can actually do about it — removing admin privileges, system hardening, golden images, application whitelisting, and free tools like Nmap and Wireshark. There's also a match.com story involving organized crime and a wooden casket on someone's front porch that you really don't want to miss.

    0:00 - Intro

    1:21 - Welcome and Book Announcement

    3:28 - What Is a Living Off the Land Attack?

    5:38 - Real-World Example: Conti Ransomware and WMI

    8:12 - Why Attackers Use Your Tools Instead of Their Own

    13:05 - Admin Privileges: Best Practice vs. Reality

    17:31 - The Louvre Heist Analogy

    20:08 - Recon Phase: Low and Slow

    24:16 - What Defenders Can Do

    25:55 - RDP and Remote Access

    29:48 - The Recon Timeline: 30-90 Days

    30:48 - PowerShell and System Hardening

    34:10 - Network Discovery Tools (Nmap and Wireshark)

    37:37 - Application Whitelisting and Geo IP Blocking

    42:08 - Action Items and Wrap-Up

    Show More Show Less
    47 mins
No reviews yet