Ransomware Hot Line: 800-462-8800
24x7 Online Help from a Top-tier Ransomware Consultant
Ransomware requires time to work its way through a target network. For this reason, ransomware assaults are commonly unleashed on weekends and at night, when support personnel may take longer to recognize a break-in and are least able to organize a rapid and coordinated defense. The more lateral movement ransomware can manage inside a target's network, the more time it takes to restore basic IT services and scrambled files and the more information can be stolen and posted to the dark web.
Progent's Ransomware Hot Line is intended to guide you to complete the time-critical first step in mitigating a ransomware attack by stopping the bleeding. Progent's online ransomware engineers can help businesses in the Grand Rapids metro area to locate and isolate breached servers and endpoints and protect clean resources from being compromised.
If your network has been penetrated by any version of ransomware, don't panic. Get immediate help by calling Progent's Ransomware Hot Line at 800-462-8800.
Progent's Ransomware Response Expertise Available in Grand Rapids
Current strains of ransomware like Ryuk, Sodinokibi, DopplePaymer, and Egregor encrypt online files and attack any available backups. Files synched to the cloud can also be impacted. For a vulnerable environment, this can make system recovery nearly impossible and basically throws the IT system back to the beginning. Threat Actors (TAs), the cybercriminals behind a ransomware assault, demand a ransom fee for the decryption tools needed to recover scrambled files. Ransomware attacks also try to steal (or "exfiltrate") information and hackers require an additional payment in exchange for not posting this data on the dark web. Even if you are able to restore your network to an acceptable point in time, exfiltration can be a big issue according to the sensitivity of the downloaded information.
The restoration process after a ransomware incursion involves a number of distinct stages, the majority of which can be performed concurrently if the response team has enough people with the required experience.
- Quarantine: This time-critical first step requires arresting the lateral spread of the attack across your network. The longer a ransomware attack is allowed to go unchecked, the longer and more expensive the recovery effort. Because of this, Progent keeps a round-the-clock Ransomware Hotline staffed by veteran ransomware recovery engineers. Quarantine activities consist of cutting off infected endpoints from the network to block the contagion, documenting the environment, and securing entry points.
- Operational continuity: This covers bringing back the network to a minimal useful level of capability with the least delay. This effort is typically the top priority for the victims of the ransomware assault, who often perceive it to be a life-or-death issue for their business. This project also requires the widest array of IT skills that cover domain controllers, DHCP servers, physical and virtual machines, PCs, notebooks and smart phones, databases, office and line-of-business apps, network architecture, and safe endpoint access management. Progent's ransomware recovery experts use advanced collaboration platforms to organize the multi-faceted restoration effort. Progent understands the urgency of working quickly, tirelessly, and in unison with a customer's managers and IT staff to prioritize tasks and to put essential resources on line again as fast as possible.
- Data restoration: The work necessary to restore data damaged by a ransomware assault depends on the state of the systems, the number of files that are affected, and what recovery techniques are needed. Ransomware attacks can take down critical databases which, if not gracefully closed, may have to be reconstructed from the beginning. This can apply to DNS and Active Directory databases. Microsoft Exchange and Microsoft SQL Server rely on Active Directory, and many financial and other business-critical platforms are powered by SQL Server. Often some detective work could be needed to find clean data. For example, non-encrypted Outlook Email Offline Folder Files may have survived on employees' PCs and laptops that were off line during the ransomware attack. Progent's ProSight Data Protection Services offer Altaro VM Backup tools to protect against ransomware via Immutable Cloud Storage. This creates tamper-proof backup data that cannot be erased or modified by any user including administrators.
- Setting up advanced antivirus/ransomware protection: Progent's ProSight ASM utilizes SentinelOne's behavioral analysis technology to offer small and medium-sized businesses the advantages of the same anti-virus tools implemented by some of the world's biggest corporations such as Netflix, Citi, and NASDAQ. By providing in-line malware blocking, classification, mitigation, restoration and analysis in one integrated platform, Progent's ProSight Active Security Monitoring cuts TCO, simplifies administration, and promotes rapid resumption of operations. SentinelOne's next-generation endpoint protection (NGEP) incorporated in Progent's ASM was ranked by Gartner Group as the industry's "most visionary Endpoint Protection Platform." Progent is a SentinelOne Partner, reseller, and integrator. Read about Progent's ProSight Active Security Monitoring endpoint protection and ransomware recovery with SentinelOne technology.
- Negotiation with the threat actor (TA): Progent has experience negotiating ransom settlements with threat actors. This requires working closely with the ransomware victim and the cyber insurance provider, if there is one. Services consist of determining the kind of ransomware involved in the assault; identifying and making contact with the hacker persona; verifying decryption capabilities; budgeting a settlement amount with the ransomware victim and the cyber insurance provider; negotiating a settlement and schedule with the hacker; checking compliance with anti-money laundering sanctions; overseeing the crypto-currency disbursement to the TA; acquiring, learning, and operating the decryptor tool; debugging failed files; building a clean environment; mapping and connecting datastores to match precisely their pre-attack condition; and restoring computers and services.
- Forensics: This activity is aimed at discovering the ransomware assault's storyline across the targeted network from start to finish. This history of how a ransomware assault progressed within the network assists your IT staff to assess the impact and uncovers weaknesses in policies or work habits that should be corrected to avoid future break-ins. Forensics involves the review of all logs, registry, GPO, AD, DNS servers, routers, firewalls, schedulers, and basic Windows systems to detect variations. Forensic analysis is commonly given a top priority by the insurance provider. Since forensics can take time, it is vital that other important recovery processes such as operational continuity are pursued in parallel. Progent maintains an extensive roster of information technology and cybersecurity experts with the knowledge and experience required to carry out activities for containment, business resumption, and data restoration without interfering with forensics.
Progent's Qualifications
Progent has delivered online and on-premises network services across the United States for more than 20 years and has been awarded Microsoft's Partner certification in the Datacenter and Cloud Productivity practice areas. Progent's roster of SMEs includes professionals who have earned high-level certifications in core technologies such as Cisco networking, VMware, and popular Linux distros. Progent's cybersecurity consultants have earned industry-recognized certifications such as CISA, CISSP-ISSAP, GIAC, and CMMC 2.0. (See Progent's certifications). Progent also offers guidance in financial management and ERP application software. This broad array of expertise allows Progent to salvage and integrate the undamaged parts of your network after a ransomware attack and rebuild them quickly into an operational network. Progent has collaborated with leading insurance carriers including Chubb to help businesses clean up after ransomware assaults.
Contact Progent for Ransomware Recovery Expertise in Grand Rapids
For ransomware system recovery expertise in the Grand Rapids area, call Progent at 800-462-8800 or see Contact Progent.