Ransomware Hot Line: 800-462-8800
24x7 Remote Help from a Senior Ransomware Engineer
Ransomware requires time to steal its way through a network. For this reason, ransomware assaults are typically launched on weekends and late at night, when support staff may be slower to become aware of a breach and are less able to organize a rapid and coordinated response. The more lateral movement ransomware can make inside a victim's network, the longer it will require to restore basic operations and damaged files and the more data can be stolen and posted to the dark web.
Progent's Ransomware Hot Line is designed to guide organizations to complete the time-critical first phase in mitigating a ransomware attack by containing the malware. Progent's online ransomware experts can help businesses in the Tacoma area to identify and isolate infected servers and endpoints and protect clean assets from being penetrated.
If your system has been breached by any version of ransomware, act fast. Get help quickly by calling Progent's Ransomware Hot Line at 800-462-8800.
Progent's Ransomware Response Services Offered in Tacoma
Current variants of crypto-ransomware such as Ryuk, Sodinokibi, Netwalker, and Egregor encrypt online data and infiltrate any accessible system restores and backups. Data synchronized to the cloud can also be corrupted. For a poorly defended network, this can make system restoration nearly impossible and basically knocks the datacenter back to the beginning. Threat Actors (TAs), the hackers responsible for ransomware assault, demand a settlement payment in exchange for the decryptors needed to unlock encrypted data. Ransomware attacks also try to steal (or "exfiltrate") information and hackers require an extra settlement for not posting this data or selling it. Even if you are able to rollback your system to an acceptable point in time, exfiltration can pose a big issue according to the nature of the downloaded data.
The restoration process subsequent to ransomware incursion involves a number of distinct stages, the majority of which can proceed in parallel if the response workgroup has enough people with the necessary experience.
- Quarantine: This time-critical initial step requires blocking the sideways spread of ransomware across your network. The more time a ransomware assault is permitted to run unchecked, the longer and more costly the recovery effort. Because of this, Progent keeps a 24x7 Ransomware Hotline monitored by veteran ransomware response experts. Quarantine activities consist of isolating affected endpoints from the rest of network to block the spread, documenting the IT system, and protecting entry points.
- System continuity: This involves restoring the IT system to a minimal acceptable degree of capability with the shortest possible delay. This effort is usually at the highest level of urgency for the targets of the ransomware attack, who often perceive it to be a life-or-death issue for their company. This project also requires the broadest range of technical abilities that cover domain controllers, DHCP servers, physical and virtual servers, PCs, laptops and mobile phones, databases, productivity and line-of-business applications, network topology, and protected endpoint access. Progent's recovery team uses advanced collaboration tools to organize the multi-faceted recovery effort. Progent understands the urgency of working quickly, tirelessly, and in unison with a customer's managers and IT staff to prioritize tasks and to put essential services back online as fast as feasible.
- Data restoration: The effort required to restore data impacted by a ransomware attack varies according to the condition of the network, how many files are encrypted, and what recovery techniques are needed. Ransomware attacks can take down key databases which, if not gracefully closed, might need to be rebuilt from scratch. This can apply to DNS and AD databases. Exchange and SQL Server depend on Active Directory, and many ERP and other business-critical applications are powered by SQL Server. Often some detective work could be required to find clean data. For instance, non-encrypted Outlook Email Offline Folder Files may have survived on staff desktop computers and notebooks that were off line at the time of the ransomware assault. Progent's ProSight Data Protection Services offer Altaro VM Backup technology to defend against ransomware by leveraging Immutable Cloud Storage. This produces tamper-proof backup data that cannot be erased or modified by anyone including administrators.
- Setting up modern AV/ransomware defense: ProSight ASM incorporates SentinelOne's machine learning technology to give small and mid-sized companies the advantages of the identical anti-virus technology used by some of the world's largest enterprises including Netflix, Citi, and Salesforce. By delivering in-line malware filtering, classification, containment, restoration and analysis in a single integrated platform, Progent's ProSight Active Security Monitoring lowers total cost of ownership, streamlines administration, and expedites operational continuity. SentinelOne's next-generation endpoint protection (NGEP) built into in Progent's ProSight Active Security Monitoring was listed by Gartner Group as the industry's "most visionary Endpoint Protection Platform." Progent is a SentinelOne Partner, dealer, and integrator. Read about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware defense with SentinelOne technology.
- Negotiating a settlement with the threat actor (TA): Progent is experienced in negotiating ransom settlements with threat actors. This requires working closely with the ransomware victim and the cyber insurance provider, if there is one. Activities include determining the type of ransomware used in the attack; identifying and establishing communications the hacker persona; testing decryption capabilities; deciding on a settlement with the victim and the cyber insurance carrier; establishing a settlement amount and timeline with the TA; confirming compliance with anti-money laundering sanctions; carrying out the crypto-currency transfer to the TA; acquiring, reviewing, and using the decryption utility; troubleshooting failed files; creating a clean environment; mapping and connecting drives to match exactly their pre-encryption state; and reprovisioning physical and virtual devices and services.
- Forensics: This activity involves learning the ransomware assault's storyline across the network from beginning to end. This audit trail of the way a ransomware assault progressed within the network helps your IT staff to evaluate the damage and highlights gaps in policies or processes that need to be rectified to avoid later breaches. Forensics involves the review of all logs, registry, GPO, Active Directory, DNS servers, routers, firewalls, scheduled tasks, and basic Windows systems to detect changes. Forensics is typically assigned a high priority by the cyber insurance carrier. Because forensics can be time consuming, it is essential that other important recovery processes such as operational continuity are pursued in parallel. Progent has an extensive roster of information technology and data security experts with the skills needed to perform the work of containment, operational continuity, and data restoration without interfering with forensic analysis.
Progent's Background
Progent has delivered remote and onsite IT services throughout the United States for over 20 years and has been awarded Microsoft's Partner designation in the Datacenter and Cloud Productivity practice areas. Progent's team of subject matter experts (SMEs) includes consultants who have been awarded high-level certifications in core technologies including Cisco networking, VMware virtualization, and major Linux distros. Progent's cybersecurity consultants have earned prestigious certifications such as CISM, CISSP, GIAC, and CMMC 2.0. (Refer to certifications earned by Progent consultants). Progent also offers top-tier support in financial management and Enterprise Resource Planning software. This scope of expertise gives Progent the ability to identify and integrate the undamaged pieces of your IT environment after a ransomware intrusion and rebuild them quickly into an operational network. Progent has collaborated with leading insurance carriers like Chubb to help organizations clean up after ransomware assaults.
Contact Progent for Ransomware Recovery Consulting Services in Tacoma
For ransomware recovery consulting services in the Tacoma metro area, call Progent at 800-462-8800 or see Contact Progent.