Crypto-Ransomware : Your Feared IT Catastrophe
Crypto-Ransomware  Remediation ProfessionalsRansomware has become an escalating cyberplague that presents an enterprise-level threat for organizations vulnerable to an attack. Multiple generations of crypto-ransomware like the CrySIS, WannaCry, Bad Rabbit, NotPetya and MongoLock cryptoworms have been out in the wild for a long time and continue to cause destruction. Modern strains of crypto-ransomware like Ryuk, Maze, Sodinokibi, DopplePaymer, Snatch and Egregor, plus daily unnamed viruses, not only perform encryption of on-line data files but also infect most configured system backups. Information synched to cloud environments can also be corrupted. In a poorly designed system, it can render automatic restoration hopeless and basically knocks the entire system back to zero.

Restoring applications and information following a ransomware intrusion becomes a race against the clock as the targeted organization fights to stop lateral movement, cleanup the ransomware, and resume enterprise-critical activity. Because crypto-ransomware requires time to spread across a targeted network, attacks are frequently sprung during nights and weekends, when attacks in many cases take longer to identify. This multiplies the difficulty of quickly assembling and organizing a qualified response team.

Progent has an assortment of solutions for securing Beverly Hills businesses from ransomware penetrations. These include user training to help identify and not fall victim to phishing attempts, ProSight Active Security Monitoring for endpoint detection and response (EDR) using SentinelOne's behavior-based threat protection to identify and suppress day-zero modern malware assaults. Progent in addition provides the assistance of veteran ransomware recovery consultants with the track record and perseverance to re-deploy a compromised network as soon as possible.

Progent's Crypto-Ransomware Recovery Services
Soon after a crypto-ransomware attack, sending the ransom demands in cryptocurrency does not ensure that cyber criminals will return the needed codes to decipher any or all of your information. Kaspersky determined that 17% of ransomware victims never restored their files after having paid the ransom, resulting in additional losses. The risk is also expensive. Ryuk ransoms are commonly a few hundred thousand dollars. For larger organizations, the ransom demand can be in the millions of dollars. The other path is to setup from scratch the essential components of your Information Technology environment. Without the availability of essential system backups, this calls for a wide complement of skill sets, well-coordinated project management, and the capability to work 24x7 until the job is over.

For decades, Progent has made available expert IT services for companies throughout the United States and has achieved Microsoft's Partnership certification status in the Datacenter and Cloud Productivity competencies. Progent's pool of subject matter experts includes consultants who have been awarded high-level industry certifications in key technologies including Microsoft, Cisco, VMware, and major distributions of Linux. Progent's cyber security experts have garnered internationally-recognized industry certifications including CISM, CISSP-ISSAP, CRISC, GIAC, and CMMC 2.0. (See Progent's certifications). Progent also has experience in financial management and ERP software solutions. This breadth of expertise provides Progent the skills to rapidly determine important systems and integrate the remaining parts of your Information Technology system after a crypto-ransomware event and configure them into a functioning system.

Progent's recovery team deploys powerful project management systems to orchestrate the complicated restoration process. Progent knows the urgency of working rapidly and in concert with a customer's management and IT team members to prioritize tasks and to get essential services back on line as soon as possible.

Client Story: A Successful Crypto-Ransomware Attack Restoration
A small business escalated to Progent after their company was brought down by Ryuk ransomware virus. Ryuk is believed to have been launched by North Korean government sponsored criminal gangs, possibly using strategies exposed from the U.S. NSA organization. Ryuk targets specific companies with limited ability to sustain operational disruption and is one of the most profitable examples of ransomware. Major targets include Data Resolution, a California-based information warehousing and cloud computing business, and the Chicago Tribune. Progent's customer is a single-location manufacturer located in the Chicago metro area and has about 500 workers. The Ryuk attack had frozen all essential operations and manufacturing processes. The majority of the client's system backups had been online at the start of the attack and were destroyed. The client considered paying the ransom demand (more than $200K) and praying for the best, but in the end made the decision to use Progent.


"I cannot tell you enough in regards to the expertise Progent gave us during the most critical time of (our) businesses existence. We most likely would have paid the cybercriminals if not for the confidence the Progent experts afforded us. The fact that you could get our e-mail and essential servers back into operation sooner than five days was incredible. Every single expert I talked with or texted at Progent was urgently focused on getting us restored and was working non-stop to bail us out."

Progent worked together with the client to rapidly get our arms around and prioritize the critical applications that had to be restored in order to resume business operations:

  • Active Directory
  • Electronic Messaging
  • Accounting and Manufacturing Software
To get going, Progent followed Anti-virus event response industry best practices by stopping the spread and disinfecting systems. Progent then started the work of recovering Microsoft AD, the core of enterprise environments built on Microsoft technology. Exchange messaging will not operate without AD, and the client's accounting and MRP system utilized Microsoft SQL, which depends on Active Directory for access to the database.

Within 48 hours, Progent was able to re-build Windows Active Directory to its pre-penetration state. Progent then accomplished reinstallations and storage recovery of critical servers. All Exchange Server ties and configuration information were intact, which accelerated the rebuild of Exchange. Progent was also able to assemble local OST files (Microsoft Outlook Off-Line Folder Files) on team desktop computers in order to recover mail data. A recent off-line backup of the businesses manufacturing software made them able to restore these essential services back servicing users. Although major work remained to recover fully from the Ryuk damage, critical systems were recovered quickly:


"For the most part, the assembly line operation showed little impact and we produced all customer shipments."

During the next few weeks key milestones in the recovery process were achieved through tight collaboration between Progent consultants and the customer:

  • In-house web sites were brought back up with no loss of data.
  • The MailStore Exchange Server with over 4 million archived messages was brought on-line and available for users.
  • CRM/Orders/Invoices/Accounts Payable (AP)/AR/Inventory Control modules were completely functional.
  • A new Palo Alto 850 security appliance was deployed.
  • Ninety percent of the user desktops and notebooks were fully operational.

"A lot of what occurred that first week is nearly entirely a blur for me, but our team will not forget the countless hours all of the team accomplished to give us our company back. I have trusted Progent for the past ten years, possibly more, and every time Progent has shined and delivered. This situation was a Herculean accomplishment."

Conclusion
A probable business-ending disaster was evaded due to dedicated professionals, a broad range of subject matter expertise, and tight teamwork. Although upon completion of forensics the ransomware virus penetration described here would have been shut down with modern security systems and NIST Cybersecurity Framework or ISO/IEC 27001 best practices, staff education, and well thought out incident response procedures for information backup and proper patching controls, the fact remains that government-sponsored cyber criminals from China, Russia, North Korea and elsewhere are relentless and are an ongoing threat. If you do fall victim to a ransomware penetration, feel confident that Progent's team of professionals has extensive experience in ransomware virus blocking, removal, and data restoration.


"So, to Darrin, Matt, Aaron, Dan, Jesse, Arnaud, Allen, Tony and Chris (and any others that were helping), thanks very much for letting me get some sleep after we got through the most critical parts. Everyone did an incredible effort, and if any of your guys is around the Chicago area, a great meal is on me!"

Download the Ransomware Remediation Case Study Datasheet
To review or download a PDF version of this customer case study, click:
Progent's Ryuk Recovery Case Study Datasheet. (PDF - 282 KB)

Contact Progent for Ransomware Recovery Services in Beverly Hills
For ransomware recovery consulting services in the Beverly Hills area, phone Progent at 800-462-8800 or see Contact Progent.



An index of content::

  • After Hours Beverly Hills Hermes Crypto-Ransomware Cleanup Beverly Hills-West Hollywood 24-7 Beverly Hills Maze Ransomware Recovery Beverly Hills-Century City
  • Beverly Hills At Home Workforce Beverly Hills Consulting Experts - Integration Consulting and Support Services Telecommuters Beverly Hills Expertise - Integration Consultants Beverly Hills-Century City, California
  • Beverly Hills Beverly Hills Supplemetary IT Staffing Help Temporary Network Support Staffing Help Consulting Beverly Hills-Bel Air, CA

  • Cisco Certified Technical Support PEN Testing
    Stealth Penetration Testing Cybersecurity Group

    Stealth intrusion testing is a key part of any comprehensive network security strategy. Progent's security professionals can perform thorough intrusion tests without the knowledge of your organization's internal IT resources. Stealth penetration checking uncovers whether existing security defense systems such as intrusion detection alerts and event history monitoring are properly configured and consistently monitored. Progent can provide ongoing autonomous penetration testing to define your internal and external attack surface and to identify ways that exploitable vulnerabilities, improper configurations, stolen credentials, skipped patches, and dangerous IT product defaults can be combined by threat actors into the multi-vector attacks typical of the latest strains of ransomware.

  • Beverly Hills Network Support Technician BlackBerry Professional Software BlackBerry Tech Support For Small Business Beverly Hills-Bel Air, California
  • Beverly Hills NotPetya Ransomware Forensics Investigation Beverly Hills Beverly Hills Crypto-Ransomware Regulatory Reporting Beverly Hills-West Hollywood, CA
  • Beverly Hills Offsite Workforce Management Tools Consulting Services Beverly Hills-Bel Air Beverly Hills-West Hollywood, United States Teleworkers Beverly Hills Consulting - Endpoint Management Systems Consultants
  • Beverly Hills Onsite Computer Services Microsoft and Cisco Certified Beverly Hills-Hollywood Technical Support Organization

  • Network Load Balance Online Technical Support
    Technology Consulting Services F5 Networks 3DNS

    Progent offers high availability load balancing consulting covering system load balancing, load balanced program, LAN/WAN backbone routing, and content dispatching products such as Cisco Content Engine. High availability load balancing providers for which Progent can provide consulting services include Windows 2003 Server Network Load Balancing Manager, Citrix Metaframe and Access Gateway, Cisco CSS, Cisco Content Distribution Manager and LocalDirector 400 series, and F5 Networks 3-DNS.

  • Beverly Hills Phobos Crypto-Ransomware Repair Beverly Hills, CA Beverly Hills Hermes Crypto-Ransomware Operational Recovery
  • Beverly Hills Telecommuters Support Consulting Beverly Hills-Westwood 24x7 At Home Workforce Consulting Services - Beverly Hills - Set up Consultants Beverly Hills-Bel Air, California

  • Colo IT Consultant
    24-Hour Co-Location Online Technical Support

    Progent's colocation center support services are designed for companies with hardware located at Internet Data Centers or data center colocation hosting facilities and in need of timely on-premises help at the colo facility plus remote support from Microsoft and Cisco Certified experts. Progent offers a full array of data center and IDC and colo consulting services including network architecture analysis, Windows and UNIX server installation and maintenance, tech support for server and telecommunications networking, design and installation of fault tolerant systems, defining and deploying layered security structures, firewall configuration and support, configuring load balancing environments, and creating fault tolerant server and storage clustering configurations.

  • Beverly Hills Urgent Crypto Removal Help Beverly Hills-Bel Air Urgent Beverly Hills Crypto Remediation Services Beverly Hills-Westwood, California, United States

  • Urgent HP Data Protector Specialists
    Engineers Apple Time Machine Backup

    Progent offers economical remote support from engineers with expertise in a wide array of utilities and technologies that provide solutions for backing up Windows, Mac, and Linux physical and virtual servers and workstations plus laptops and handhelds. Progent can provide expertise for leading data protection products such as Acronis Backup and Recovery, Barracuda Backup, Altaro VM Backup, Symantec Backup Exec, BackupAssist, HP Data Protector, Double-Take, Mozy, Retrospect for Macintosh, Apple Time Machine, VMware vSphere Data Protection (VDP), and Solaris FLARs. Progent can assist you to design, enhance, or troubleshoot backup/restore solutions for a variety of topologies such as local, remote, cloud, or a mix.

  • Beverly Hills Egregor Ransomware System-Restore Beverly Hills-Bel Air, California
  • Beverly Hills Windows 2008 Server Small Business IT Consulting Security Consulting Firms Microsoft Windows Server 2019 Beverly Hills-Century City, USA
  • Beverly Hills Work at Home Employees Help Desk Call Center Augmentation Guidance Beverly Hills-Century City, California 24/7 Telecommuters Beverly Hills Consulting - Call Desk Augmentation Consulting Services Beverly Hills-Century City, United States
  • Beverly Hills-Century City, CA Beverly Hills Crypto-Ransomware Susceptibility Beverly Hills Crypto-Ransomware Ryuk Preparedness Audit Beverly Hills-Westwood, California
  • Beverly Hills-West Hollywood 24-Hour Beverly Hills WannaCry Ransomware Operational Recovery Beverly Hills-Westwood, CA Beverly Hills Avaddon Crypto-Ransomware Data-Recovery

  • Specialists XenApp Virtual Windows Applications
    XenApp Virtual Applications Technology Professional

    Progent's Citrix-certified consultants can help you to design, implement, administer, and troubleshoot a virtual application delivery and management system built on Citrix XenApp. Progent's Cisco CCIE network consultants can help you enhance your network for distributing server and client-side applications, and Progent's datacenter management and support experts can help you to manage and maintain an off-site datacenter that features high uptime, enhanced protection, and rapid recovery.

  • CCNP Expert Certified prime infrastructure Support Services prime infrastructure Consultant Services
  • CISSP Security Auditing Biggest Firewall Consulting Services Beverly Hills
  • Beverly Hills Ryuk Ransomware Malware Removal Beverly Hills-West Hollywood, CA
  • Cisco Access Point Management Cisco Access Point Professional Services
  • Beverly Hills Ryuk Ransomware System-Restore Beverly Hills
  • Cisco IT Service Providers Beverly Hills-Bel Air Beverly Hills-Bel Air, California Cisco Security Consulting Companies

  • Printer firmware patch management Engineers
    Network infrastructure patch management Specialist

    File summary_Prosight-Patch-Management-Consultants.asp does not exist



  • Consultants for Beverly Hills Network Service Organizations Beverly Hills Consulting Expertise for Beverly Hills IT Service Firms
  • Debian Linux, Solaris, UNIX Outsourcing Consultant Services Suse Linux, Solaris, UNIX Beverly Hills
  • Engineer Lync Server 2013 and iPhone Lync Server 2013 PSTN Gateway Specialists
  • Immediate Linux with Windows Specialists 24x7 Specialists Linux with Windows
  • Largest Online Support Services Microsoft Firewall 24 Hour Internet Security and Acceleration Server Technology Consulting
  • MS Dynamics GP Reseller near Beverly Hills - Recovery Development Beverly Hills Beverly Hills Dynamics GP Upgrades Support Beverly Hills-Bel Air, California
  • Microsoft Certified Partner Beverly Hills-Westwood Business Computer Server Companies Support Firms Beverly Hills-Hollywood

  • Wireless Security Scan Consulting Services
    Network Security Scan Consultants

    Progent offers small organizations two specially designed network security evaluation scanning packages that include, for a preset price, remotely managed inventory scans of your security profile which are evaluated by certified security specialists who interpret the data collected by the scan, deliver unbiased evaluations of your current security vulnerability, and make recommendations for remediation. Progent has developed two non-overlapping network security inventory scanning packages for external and internal scanning that are priced to meet the budgets of small businesses while delivering enterprise-quality assessments of your IT network's vulnerability to assault.

  • Microsoft SharePoint Server 2013 On-site Support Beverly Hills Microsoft SharePoint Server Consultant Beverly Hills-Westwood, California

  • Virtual Office Job Microsoft Consultants
    Cisco CCDP Home Based Virtual Office

    Progent is seeking to hire fulltime, solutions-driven Microsoft certified engineers with Microsoft Certified Systems Engineer certification; Cisco accredited system engineers with Cisco CCDP or CCIE credentials; security professionals who have CISSP or CISM or equivalent security credentials; and high-end system design consultants with experience in mobile solutions, wireless networking, service continuity, workplace recovery, data preservation, and server virtualization. Progent also is hiring professionals to work on Progent's team of desktop support technicians and off-site support professionals. In addition, Progent is hiring talented administrators who can perform productively in Progent's fast-paced, virtual office culture.

  • Ransomware Rebuild Beverly Hills Biggest Egregor Ransomware Hot Line
  • Remote At Home Workforce Beverly Hills Consulting Services - Cybersecurity Solutions Expertise Beverly Hills-Bel Air, California Beverly Hills Telecommuters Security Systems Guidance
  • Remote Consulting Service Firm SQL Server 2014 Beverly Hills-Century City Top Quality Microsoft SQL Server 2017 Computer Consultancy Firm Beverly Hills-Century City, CA, United States

  • IT Consultants Hornetsecurity Altaro M365 Mailbox Backup
    Hornetsecurity Altaro M365 Mailbox Backup Technical Consultant

    Progent is an authorized Hornetsecurity/Altaro partner and can design, configure, and manage an implementation of 365 Total Backup to back up and restore your Microsoft 365 mailboxes, files stored on your organization's OneDrive Accounts and SharePoint sites, user and group Teams Chats, plus files on Windows endpoints.

  • Remote Workers Beverly Hills Expertise - Cloud Systems Guidance Beverly Hills-West Hollywood, California At Home Workers Beverly Hills Consulting - Cloud Systems Consulting Services Beverly Hills-Bel Air, CA
  • Remote Workers Consultants nearby Beverly Hills - Voice/Video Conferencing Technology Consultants Beverly Hills-West Hollywood, CA Beverly Hills Work from Home Employees Conferencing Technology Consultants Beverly Hills
  • Support and Help Antispam Emergency Anti-Spam Support and Integration
  • Support and Help Small Office Network Small Business IT Consulting
  • Telecommuters Consulting near me in Beverly Hills - IP Voice Systems Assistance Beverly Hills-Westwood At Home Workforce Beverly Hills Consulting Services - IP Voice Systems Expertise
  • Teleworkers Assistance near me in Beverly Hills - Backup/Restore Technology Expertise Beverly Hills-Century City, CA, US Beverly Hills Remote Workforce Backup/Recovery Technology Expertise Beverly Hills-West Hollywood
  • Top Ranked Network Engineers Progent Management Team Progent Management Technology Consultant
  • Top Rated Outsourcing Services Exchange Server 2016 Beverly Hills-West Hollywood, CA, U.S.A. Technology Consultant Microsoft Exchange Server 2013 Beverly Hills-West Hollywood, California
  • Beverly Hills Ryuk Ransomware Virus Data-Recovery Case Study Beverly Hills-Westwood, California
  • Top Rated SCCM Mobile Device Management Specialists IT Consulting SCCM
  • Urgent Beverly Hills MongoLock Crypto-Ransomware Settlement Negotiation Experts Beverly Hills-Century City, CA Top Beverly Hills Egregor Crypto-Ransomware Settlement Services Beverly Hills California, USA
  • Windows 2003 Cluster Computer Consultant Fault Tolerant Inter-Office Connection Remote Support
  • Beverly Hills California Beverly Hills Sodinokibi Ransomware Business-Recovery
  • Work from Home Employees Beverly Hills Assistance - Collaboration Technology Consulting Beverly Hills Remote Workforce Consulting near Beverly Hills - Collaboration Systems Consulting Beverly Hills-Century City, CA
  • Beverly Hills-West Hollywood, California Beverly Hills Snatch Crypto-Ransomware Mitigation

  • © 2002-2025 Progent Corporation. All rights reserved.