Re: Questionable position
I remember a heated conversation when a workplace had a serious infection and I refused to restore from backup.
Not until I know what I'm restoring to is safe, and that where I'm restoring from isn't subject to the same problems, and won't be put at risk by accessing it for that restoration.
We went totally clean-room. Pulled in every device. Created a totally isolated network configured from scratch. Marked every computer and drive with red/green markings and starting from known-blank drives to rebuild the servers and start pulling data FROM COPIES of the backups that were made entirely offiline on machines that had never been part of the network or connected to it.
Every computer was wiped.
Once the backup copy was made, that was exposed to the isolated network for restoration, then we started restoring piecemeal and at every stage we red/greenlit based on even the slightest suspicion (e.g. that we may have backed up malware, etc.).
It took FAR LONGER than "just a restore" and I caught lots of flak for it and refused to shortcut. I was not going to risk compromising ourselves further.
There was some payback for all the political fallout involved with doing so - when the (multiple, independent and very expensives) consultant's reports came in many months later on what defences we'd had, what extent we were compromised, etc. etc. etc. then the restoration process was highly-praised - the malware was literally unknown and unrecorded before (and hence had no detections or "clean" tool - not that I'd ever run one over a clean-room restore!), the restore process was 100% clean and the other systems we'd put in place were so good that we could pretty much prove that there had been no data exfiltration out of the network (basically it spread between desktop clients on an isolated VLAN and in the process disconnected itself from the network, but we had logs of all outgoing traffic destinations).
No data was ever discovered to be compromised, and the data protection people gave us a big thumbs-up for correctly reporting, having all the necessary systems in place, and being able to prove (at least to their satisfaction) that data could not have got out.
When you're compromised, you take ZERO chances because the downtime will never cost you as much as a repeat compromise or continued data exfiltration.