Progent's Ransomware Forensics Analysis and Reporting Services in Oxford
Progent's ransomware forensics consultants can save the evidence of a ransomware attack and perform a detailed forensics analysis without disrupting activity related to operational continuity and data recovery. Your Oxford business can use Progent's post-attack forensics documentation to counter subsequent ransomware assaults, assist in the cleanup of encrypted data, and comply with insurance carrier and governmental mandates.
Ransomware forensics investigation is aimed at determining and describing the ransomware attack's storyline across the network from start to finish. This history of the way a ransomware attack travelled through the network helps your IT staff to assess the impact and uncovers weaknesses in security policies or work habits that need to be corrected to avoid future break-ins. Forensic analysis is commonly assigned a top priority by the insurance provider and is typically mandated by state and industry regulations. Because forensics can be time consuming, it is critical that other key recovery processes like business resumption are pursued in parallel. Progent maintains an extensive roster of IT and data security experts with the knowledge and experience needed to perform the work of containment, business resumption, and data restoration without interfering with forensics.
Ransomware forensics is time consuming and requires close cooperation with the groups assigned to file cleanup and, if necessary, settlement negotiation with the ransomware attacker. Ransomware forensics typically require the examination of all logs, registry, GPO, Active Directory (AD), DNS, routers, firewalls, scheduled tasks, and basic Windows systems to detect anomalies.
Services involved with forensics include:
- Disconnect without shutting down all possibly impacted devices from the system. This may require closing all RDP ports and Internet connected network-attached storage, changing admin credentials and user PWs, and setting up 2FA to secure backups.
- Copy forensically valid images of all exposed devices so your data recovery group can proceed
- Preserve firewall, virtual private network, and other key logs as quickly as possible
- Identify the strain of ransomware involved in the assault
- Survey each machine and storage device on the system as well as cloud storage for signs of encryption
- Catalog all compromised devices
- Establish the kind of ransomware used in the assault
- Review logs and user sessions to determine the time frame of the ransomware attack and to identify any possible lateral movement from the first compromised machine
- Understand the attack vectors used to carry out the ransomware attack
- Search for new executables surrounding the first encrypted files or network compromise
- Parse Outlook PST files
- Analyze attachments
- Separate URLs from email messages and determine whether they are malicious
- Produce extensive incident documentation to meet your insurance carrier and compliance regulations
- Suggest recommended improvements to shore up cybersecurity vulnerabilities and improve workflows that reduce the risk of a future ransomware exploit
Progent's Qualifications
Progent has delivered online and onsite network services throughout the United States for more than 20 years and has been awarded Microsoft's Gold Partner certification in the Datacenter and Cloud Productivity competencies. Progent's roster of subject matter experts includes consultants who have been awarded advanced certifications in core technology platforms such as Cisco infrastructure, VMware virtualization, and major distributions of Linux. Progent's cybersecurity consultants have earned industry-recognized certifications such as CISM, CISSP-ISSAP, and GIAC. (See Progent's certifications). Progent also has top-tier support in financial and ERP applications. This breadth of expertise allows Progent to salvage and integrate the undamaged pieces of your IT environment after a ransomware assault and rebuild them quickly into a viable system. Progent has worked with leading insurance carriers including Chubb to assist organizations clean up after ransomware assaults.
Contact Progent about Ransomware Forensics Investigation Expertise in Oxford
To learn more information about ways Progent can assist your Oxford organization with ransomware forensics analysis, call 1-800-462-8800 or see Contact Progent.