Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
    • Compliance & GRC
    • Endpoint Security
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs

Malware Protection for IBM Power Systems & IBM i

Fortra
04/14/2026
0
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


TL;DR

  • IBM Power systems and IBM i are vulnerable to malware attacks despite common misconceptions — real-world cases show 500,000+ files encrypted via IFS shares with weeks of recovery time
  • Power systems act as 'typhoid carriers' hosting infected files without symptoms while spreading malware to Windows clients, creating recurring infection cycles
  • Critical vulnerabilities include root directory shares with *ALLOBJ users, auto-started insecure services (FTP/HTTP), and overly permissive IFS authorities that ship as defaults
  • Windows-based scanning tools create security holes by requiring root shares and high-authority users — native scanning eliminates these vulnerabilities while providing stable, automated protection
  • Regulatory compliance (HIPAA, GLBA) requires protection against 'reasonably anticipated threats' — with 3.4 billion malicious emails daily and 22-day average ransomware downtime, malware qualifies as anticipated

The Malware Threat Landscape for Power Systems

This webinar addresses the persistent myth that IBM Power systems and IBM i servers are immune to malware threats. Security expert Sandi Moore presents compelling evidence that ransomware and malware attacks are not only possible but increasingly common on Power platforms. The session opens with sobering statistics: 3.4 billion malicious emails sent daily, 255 billion phishing attacks in 2022, and an average of 22 days of downtime following ransomware incidents. Moore emphasizes that Power systems, particularly IBM i with its Integrated File System (IFS), can act as 'typhoid carriers' — hosting infected files without showing symptoms while spreading malware to connected Windows clients. Real-world case studies demonstrate the severity of these attacks, including one customer who suffered 500,000 encrypted files and 248,000 copies of ransomware dropped across their IFS, resulting in two to three weeks of recovery time.

Security Vulnerabilities in IBM i Environments

The presentation identifies critical security weaknesses that make Power systems vulnerable to malware attacks. The root directory on IBM i ships with public *ALL authority, creating an immediate exposure point. Many organizations compound this risk by sharing the root directory over the network and allowing users with *ALLOBJ authority to map drives — a configuration that enables ransomware to encrypt the entire IFS. Moore explains that malware doesn't have its own permissions; it operates with whatever authority the compromised user possesses. Services like FTP and HTTP that auto-start after IPL create unnecessary attack surfaces, especially when they use insecure protocols that transmit credentials in clear text. The session also addresses the false sense of security created by Windows-based scanning tools, which require creating the exact security vulnerabilities (root shares and high-authority users) that should be eliminated.

Defense Strategies and Native Protection

Moore outlines a comprehensive malware defense strategy centered on native virus scanning and layered security controls. Key recommendations include implementing least-privilege access, eliminating root directory shares, restricting service access on a per-user basis, and maintaining current security patches across all connected devices. The presentation emphasizes that regulatory frameworks like HIPAA and Gramm-Leach-Bliley Act explicitly require protection against 'reasonably anticipated threats' — a standard that clearly encompasses malware given current attack statistics. Fortra's PowerTech Antivirus solution is positioned as the answer to native scanning requirements, offering both back-scanning and on-access scanning powered by Trellix (formerly McAfee) technology. The tool includes enhanced ransomware protection that monitors access patterns from Windows workstations and can block attacks in real-time, as demonstrated by a recent customer case where an infected workstation was automatically cut off before widespread damage occurred.

Chapters

0:00 - Introduction and Speaker Background
0:54 - Understanding the Threat Landscape
4:52 - Attack Motivations and Underground Marketplace
7:50 - Business Impact and Disruption Statistics
10:03 - Prevention and Detection Strategies
12:37 - Malware Threat Predictions
15:10 - Regulatory Compliance Requirements
18:33 - Real-World IBM i Ransomware Cases
21:26 - Defense Tactics for Power Systems
32:14 - Virus Scanning Best Practices
40:11 - Native vs Windows-Based Scanning
42:50 - PowerTech Antivirus Solution Overview

Key Quotes

19:37 "This particular customer ended up with half a million files encrypted by ransomware through the unfortunate practice of sharing the root directory and allowing an all object user profile to map that drive."
20:11 "This particular case, they had 248,000 copies of ransomware on their system. So huge impact two to three weeks down trying to recover and piecemeal restore their integrated file system back."
22:00 "With the IBMI and the AIX operating systems, unfortunately, they act as a bit of a typhoid berry where they don't show symptoms of infection necessarily, but they can act as a very happy host."
23:03 "You have to remember that viruses are only be able to spread to the files that users have access to. They're not going to be able to get to something you don't have access to. So the less a user has access to, the less damage there is."
30:27 "I'm going to say this, and I repeat this a lot, and it's a very common phrase for me, don't share your root directory. Root directory shares expose the entire system. The Qsys.lib, which is your operating system, is underneath the root."
47:36 "They had a workstation that became infected by ransomware and it started attacking and Partick Antivirus blocked that attack and that user's access was cut off so that no further files were damaged in this attack."

Categories:
  • » Data Protection » Backup & Recovery
  • » Cybersecurity » Endpoint Security
  • » Data Protection
Channels:
News:
Events:
Tags:
  • Data Protection
  • Endpoint Management
  • Compliance & Governance
  • Technical Deep Dive
  • Webinar
  • IBM i Security
  • Power Systems Malware Protection
  • Ransomware Defense
  • Integrated File System
  • IFS
  • Security
  • Native Antivirus Scanning
  • IBM i Access Control
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: Malware Protection for IBM Power Systems & IBM i

              Upcoming Webinar Calendar

              • 04/15/2026
                01:00 PM
                04/15/2026
                Service Account Security in the Age of AI: From Legacy Accounts to Agentic Identities
                https://www.truthinit.com/index.php/channel/1866/service-account-security-in-the-age-of-ai-from-legacy-accounts-to-agentic-identities/
              • 04/16/2026
                11:00 AM
                04/16/2026
                Beyond the Alert – Building the Human Centric Agentic SOC
                https://www.truthinit.com/index.php/channel/1372/beyond-the-alert-–-building-the-human-centric-agentic-soc/
              • 04/21/2026
                02:00 PM
                04/21/2026
                How Purpose Brands scales IT with Zendesk ITAM
                https://www.truthinit.com/index.php/channel/1881/how-purpose-brands-scales-it-with-zendesk-itam/
              • 04/23/2026
                01:00 PM
                04/23/2026
                Cultivating Trust as a Foundation for the Agentic Consumer in 2026
                https://www.truthinit.com/index.php/channel/1883/cultivating-trust-as-a-foundation-for-the-agentic-consumer-in-2026/
              • 04/30/2026
                10:00 AM
                04/30/2026
                Insights from the 2026 Keepit Annual Data Report on SaaS Data Protection
                https://www.truthinit.com/index.php/channel/1868/insights-from-the-2026-keepit-annual-data-report-on-saas-data-protection/
              • 04/30/2026
                01:00 PM
                04/30/2026
                The New Economics of VMware Exit
                https://www.truthinit.com/index.php/channel/1880/the-new-economics-of-vmware-exit/
              • 05/06/2026
                02:00 AM
                05/06/2026
                APAC: Harnessing AI to Identify Cyber Attacks Before They Evolve into Breaches
                https://www.truthinit.com/index.php/channel/1886/harnessing-ai-to-identify-cyber-attacks-before-they-evolve-into-breaches/
              • 05/12/2026
                11:30 PM
                05/12/2026
                APAC: Effective Strategies for Safeguarding Active Directory and Minimizing Data Exposure
                https://www.truthinit.com/index.php/channel/1888/effective-strategies-for-safeguarding-active-directory-and-minimizing-data-exposure/

              Upcoming Events

              • Apr
                15

                Service Account Security in the Age of AI: From Legacy Accounts to Agentic Identities

                04/15/202601:00 PM ET
                • Apr
                  16

                  Beyond the Alert – Building the Human Centric Agentic SOC

                  04/16/202611:00 AM ET
                  • Apr
                    21

                    How Purpose Brands scales IT with Zendesk ITAM

                    04/21/202602:00 PM ET
                    • Apr
                      23

                      Cultivating Trust as a Foundation for the Agentic Consumer in 2026

                      04/23/202601:00 PM ET
                      • Apr
                        30

                        Insights from the 2026 Keepit Annual Data Report on SaaS Data Protection

                        04/30/202610:00 AM ET
                        More events
                        Truth in IT
                        • Sponsor
                        • About Us
                        • Terms of Service
                        • Privacy Policy
                        • Contact Us
                        • Preference Management
                        Desktop version
                        Standard version