Overview of Progent's Ransomware Forensics Analysis and Reporting Services in Chesapeake
Progent's ransomware forensics consultants can preserve the evidence of a ransomware attack and carry out a comprehensive forensics analysis without impeding activity related to operational continuity and data recovery. Your Chesapeake organization can utilize Progent's post-attack forensics report to block future ransomware assaults, assist in the cleanup of lost data, and comply with insurance and regulatory mandates.
Ransomware forensics analysis involves determining and describing the ransomware assault's storyline across the targeted network from start to finish. This history of the way a ransomware assault progressed through the network assists you to assess the impact and brings to light gaps in rules or processes that should be corrected to prevent future breaches. Forensics is commonly given a high priority by the insurance provider and is often mandated by state and industry regulations. Because forensic analysis can be time consuming, it is critical that other important activities such as business resumption are performed in parallel. Progent maintains an extensive team of IT and data security professionals with the skills required to carry out the work of containment, business continuity, and data recovery without interfering with forensic analysis.
Ransomware forensics analysis is complicated and requires close interaction with the groups focused on file restoration and, if necessary, settlement negotiation with the ransomware attacker. forensics can require the examination of all logs, registry, GPO, Active Directory (AD), DNS servers, routers, firewalls, schedulers, and basic Windows systems to check for anomalies.
Services involved with forensics investigation include:
- Disconnect but avoid shutting off all possibly impacted devices from the system. This can involve closing all RDP ports and Internet connected NAS storage, changing admin credentials and user PWs, and setting up 2FA to guard backups.
- Preserve forensically valid images of all suspect devices so the file recovery team can proceed
- Save firewall, virtual private network, and other critical logs as soon as possible
- Establish the version of ransomware used in the attack
- Inspect every machine and data store on the network including cloud-hosted storage for signs of encryption
- Inventory all encrypted devices
- Determine the type of ransomware used in the attack
- Review logs and user sessions in order to establish the time frame of the assault and to spot any potential lateral movement from the originally infected machine
- Identify the attack vectors used to perpetrate the ransomware attack
- Search for the creation of executables associated with the original encrypted files or network compromise
- Parse Outlook PST files
- Examine email attachments
- Extract URLs embedded in email messages and determine whether they are malware
- Provide comprehensive incident documentation to meet your insurance and compliance mandates
- Document recommendations to close security gaps and improve processes that lower the risk of a future ransomware exploit
Progent's Qualifications
Progent has delivered remote and onsite network services throughout the United States for more than two decades and has earned Microsoft's Partner designation in the Datacenter and Cloud Productivity competencies. Progent's roster of subject matter experts includes consultants who have earned advanced certifications in foundation technologies including Cisco networking, VMware virtualization, and popular distributions of Linux. Progent's cybersecurity experts have earned industry-recognized certifications including CISA, CISSP-ISSAP, and GIAC. (Refer to certifications earned by Progent consultants). Progent also offers top-tier support in financial and ERP applications. This broad array of expertise gives Progent the ability to salvage and consolidate the surviving pieces of your information system following a ransomware intrusion and rebuild them quickly into a viable system. Progent has collaborated with leading cyber insurance carriers including Chubb to assist businesses recover from ransomware attacks.
Contact Progent about Ransomware Forensics Investigation Expertise in Chesapeake
To learn more information about how Progent can assist your Chesapeake organization with ransomware forensics, call 1-800-462-8800 or see Contact Progent.