Overview of Progent's Ransomware Forensics Investigation and Reporting in Oakland
Progent's ransomware forensics experts can preserve the system state after a ransomware attack and perform a detailed forensics investigation without slowing down the processes related to operational resumption and data recovery. Your Oakland organization can utilize Progent's post-attack forensics report to block subsequent ransomware attacks, validate the restoration of encrypted data, and comply with insurance carrier and regulatory mandates.
Ransomware forensics investigation is aimed at determining and describing the ransomware attack's progress throughout the network from start to finish. This audit trail of the way a ransomware attack progressed through the network assists your IT staff to assess the damage and uncovers shortcomings in policies or processes that should be corrected to prevent later break-ins. Forensics is commonly given a top priority by the cyber insurance carrier and is typically mandated by state and industry regulations. Since forensics can be time consuming, it is critical that other key recovery processes like business continuity are pursued in parallel. Progent has an extensive team of information technology and cybersecurity experts with the skills needed to perform activities for containment, business continuity, and data restoration without disrupting forensics.
Ransomware forensics is complex and requires close cooperation with the groups responsible for file restoration and, if necessary, payment talks with the ransomware attacker. Ransomware forensics typically require the examination of logs, registry, Group Policy Object (GPO), Active Directory, DNS, routers, firewalls, schedulers, and core Windows systems to look for changes.
Services involved with forensics include:
- Isolate without shutting off all possibly affected devices from the network. This may involve closing all Remote Desktop Protocol (RDP) ports and Internet facing network-attached storage, modifying admin credentials and user passwords, and setting up two-factor authentication to guard backups.
- Preserve forensically sound digital images of all suspect devices so your data recovery team can get started
- Preserve firewall, virtual private network, and other critical logs as quickly as possible
- Establish the kind of ransomware used in the attack
- Survey every machine and data store on the system as well as cloud storage for signs of encryption
- Catalog all encrypted devices
- Determine the type of ransomware used in the attack
- Review log activity and sessions in order to determine the time frame of the ransomware attack and to identify any possible sideways migration from the originally compromised machine
- Understand the security gaps exploited to perpetrate the ransomware attack
- Search for the creation of executables associated with the original encrypted files or network compromise
- Parse Outlook PST files
- Examine email attachments
- Separate URLs from messages and determine if they are malware
- Produce comprehensive incident reporting to meet your insurance and compliance regulations
- List recommendations to close security vulnerabilities and enforce processes that lower the exposure to a future ransomware breach
Progent's Qualifications
Progent has delivered remote and onsite IT services across the United States for over two decades and has been awarded Microsoft's Gold Partner designation in the Datacenter and Cloud Productivity competencies. Progent's roster of subject matter experts (SMEs) includes consultants who have earned high-level certifications in foundation technologies such as Cisco infrastructure, VMware virtualization, and major distributions of Linux. Progent's data security consultants have earned prestigious certifications including CISM, CISSP, and GIAC. (Refer to certifications earned by Progent consultants). Progent also offers top-tier support in financial and ERP application software. This broad array of expertise allows Progent to salvage and consolidate the surviving parts of your network after a ransomware intrusion and reconstruct them quickly into a viable system. Progent has collaborated with top insurance providers including Chubb to help businesses clean up after ransomware attacks.
Contact Progent about Ransomware Forensics Analysis Expertise in Oakland
To learn more information about ways Progent can assist your Oakland business with ransomware forensics, call 1-800-462-8800 or see Contact Progent.