Ransomware Hot Line: 800-462-8800
24x7 Remote Access to a Senior Ransomware Consultant
Ransomware needs time to work its way across a network. Because of this, ransomware assaults are commonly unleashed on weekends and late at night, when support staff may take longer to recognize a breach and are less able to mount a rapid and coordinated response. The more lateral progress ransomware is able to manage within a target's system, the longer it will require to restore basic operations and damaged files and the more data can be stolen and posted to the dark web.
Progent's Ransomware Hot Line is intended to assist organizations to take the time-critical first phase in responding to a ransomware attack by stopping the bleeding. Progent's online ransomware experts can assist businesses in the Chattanooga metro area to identify and quarantine breached servers and endpoints and guard undamaged assets from being penetrated.
If your system has been breached by any strain of ransomware, don't panic. Get help quickly by calling Progent's Ransomware Hot Line at 800-462-8800.
Progent's Ransomware Recovery Expertise Offered in Chattanooga
Current variants of ransomware like Ryuk, Sodinokibi, DopplePaymer, and Egregor encrypt online data and invade any available system restores and backups. Data synchronized to the cloud can also be impacted. For a vulnerable network, this can make system recovery almost impossible and basically sets the IT system back to square one. So-called Threat Actors (TAs), the cybercriminals responsible for ransomware assault, insist on a settlement payment in exchange for the decryption tools needed to unlock scrambled files. Ransomware assaults also attempt to steal (or "exfiltrate") files and hackers require an additional settlement in exchange for not publishing this information on the dark web. Even if you are able to rollback your network to a tolerable date in time, exfiltration can be a major problem depending on the nature of the stolen information.
The recovery work after a ransomware attack involves several distinct phases, most of which can be performed in parallel if the response team has enough members with the necessary skill sets.
- Containment: This urgent first response requires blocking the lateral progress of the attack across your network. The longer a ransomware assault is allowed to go unchecked, the longer and more expensive the recovery process. Because of this, Progent keeps a 24x7 Ransomware Hotline staffed by seasoned ransomware response engineers. Quarantine processes include isolating affected endpoints from the network to block the contagion, documenting the IT system, and protecting entry points.
- System continuity: This covers restoring the network to a minimal useful level of functionality with the least downtime. This effort is typically at the highest level of urgency for the targets of the ransomware assault, who often perceive it to be an existential issue for their company. This project also demands the broadest range of technical skills that cover domain controllers, DHCP servers, physical and virtual machines, desktops, laptops and smart phones, databases, productivity and line-of-business apps, network topology, and secure remote access management. Progent's recovery experts use advanced workgroup platforms to coordinate the complex recovery effort. Progent appreciates the urgency of working rapidly, continuously, and in unison with a client's managers and network support group to prioritize tasks and to get critical services on line again as quickly as possible.
- Data restoration: The work necessary to recover files impacted by a ransomware assault depends on the state of the network, the number of files that are affected, and what recovery techniques are needed. Ransomware attacks can destroy pivotal databases which, if not properly closed, may need to be rebuilt from scratch. This can apply to DNS and Active Directory (AD) databases. Microsoft Exchange and Microsoft SQL Server rely on AD, and many ERP and other business-critical platforms depend on Microsoft SQL Server. Some detective work may be required to find clean data. For example, undamaged OST files (Outlook Email Offline Folder Files) may exist on employees' desktop computers and laptops that were not connected at the time of the ransomware attack. Progent's ProSight Data Protection Services offer Altaro VM Backup technology to protect against ransomware attacks via Immutable Cloud Storage. This creates tamper-proof data that cannot be erased or modified by anyone including root users.
- Deploying modern AV/ransomware defense: ProSight ASM uses SentinelOne's behavioral analysis technology to offer small and mid-sized companies the advantages of the identical anti-virus tools deployed by many of the world's largest enterprises including Walmart, Citi, and Salesforce. By delivering in-line malware blocking, detection, mitigation, restoration and analysis in a single integrated platform, ProSight Active Security Monitoring lowers TCO, streamlines administration, and expedites operational continuity. SentinelOne's next-generation endpoint protection (NGEP) built into in Progent's ASM was listed by Gartner Group as the industry's "most visionary Endpoint Protection Platform (EPP)." Progent is a SentinelOne Partner, dealer, and integrator. Find out about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware defense with SentinelOne technology.
- Negotiation with the threat actor (TA): Progent has experience negotiating ransom settlements with threat actors. This requires close co-operation with the ransomware victim and the cyber insurance carrier, if there is one. Services consist of determining the type of ransomware used in the attack; identifying and establishing communications the hacker persona; testing decryption capabilities; deciding on a settlement amount with the ransomware victim and the cyber insurance provider; establishing a settlement and timeline with the TA; checking adherence to anti-money laundering regulations; carrying out the crypto-currency transfer to the TA; acquiring, reviewing, and operating the decryption utility; troubleshooting failed files; building a clean environment; remapping and reconnecting drives to reflect exactly their pre-encryption state; and recovering computers and services.
- Forensic analysis: This activity involves learning the ransomware assault's progress across the targeted network from start to finish. This audit trail of the way a ransomware attack travelled within the network assists your IT staff to evaluate the impact and brings to light gaps in rules or work habits that need to be rectified to avoid later break-ins. Forensics involves the examination of all logs, registry, Group Policy Object (GPO), Active Directory (AD), DNS servers, routers, firewalls, scheduled tasks, and basic Windows systems to look for changes. Forensic analysis is usually given a high priority by the insurance carrier. Because forensic analysis can take time, it is vital that other important recovery processes such as business continuity are performed in parallel. Progent maintains an extensive roster of IT and security experts with the skills needed to carry out the work of containment, business resumption, and data restoration without interfering with forensics.
Progent's Background
Progent has provided remote and onsite network services throughout the United States for over two decades and has earned Microsoft's Partner certification in the Datacenter and Cloud Productivity practice areas. Progent's team of subject matter experts includes consultants who have earned high-level certifications in foundation technologies such as Cisco networking, VMware, and major Linux distros. Progent's data security experts have earned industry-recognized certifications including CISA, CISSP, CRISC, and CMMC 2.0. (Refer to Progent's certifications). Progent also offers top-tier support in financial management and ERP applications. This scope of expertise allows Progent to identify and consolidate the surviving parts of your information system after a ransomware intrusion and rebuild them rapidly into a viable system. Progent has worked with leading insurance carriers including Chubb to assist organizations recover from ransomware assaults.
Contact Progent for Ransomware Recovery Expertise in Chattanooga
For ransomware recovery expertise in the Chattanooga area, phone Progent at 800-462-8800 or go to Contact Progent.