Crypto-Ransomware : Your Worst Information Technology Catastrophe
Ransomware  Remediation ProfessionalsCrypto-Ransomware has become an escalating cyber pandemic that poses an existential danger for organizations unprepared for an attack. Different versions of ransomware such as Reveton, WannaCry, Locky, SamSam and MongoLock cryptoworms have been replicating for years and continue to cause destruction. Modern versions of crypto-ransomware such as Ryuk, Maze, Sodinokibi, DopplePaymer, LockBit or Egregor, as well as frequent as yet unnamed newcomers, not only do encryption of online files but also infect any configured system restores and backups. Information synched to the cloud can also be held hostage. In a vulnerable data protection solution, it can make automatic recovery impossible and basically sets the network back to zero.

Getting back online programs and information after a ransomware outage becomes a sprint against the clock as the victim tries its best to contain the damage, cleanup the ransomware, and resume mission-critical activity. Because ransomware takes time to move laterally, penetrations are often sprung during nights and weekends, when successful attacks may take more time to notice. This compounds the difficulty of promptly assembling and coordinating a qualified mitigation team.

Progent has a variety of solutions for protecting organizations from ransomware attacks. Among these are staff training to help recognize and not fall victim to phishing attempts, ProSight Active Security Monitoring for remote monitoring and management, plus setup and configuration of the latest generation security gateways with machine learning technology from SentinelOne to detect and quarantine new cyber threats intelligently. Progent in addition can provide the services of veteran ransomware recovery consultants with the talent and perseverance to re-deploy a breached system as urgently as possible.

Progent's Ransomware Restoration Support Services
Subsequent to a ransomware invasion, even paying the ransom in cryptocurrency does not ensure that criminal gangs will provide the needed keys to unencrypt all your information. Kaspersky Labs estimated that 17% of ransomware victims never recovered their data after having sent off the ransom, resulting in more losses. The risk is also expensive. Ryuk ransoms are commonly several hundred thousand dollars. For larger organizations, the ransom can be in the millions. The fallback is to re-install the mission-critical elements of your Information Technology environment. Without the availability of full system backups, this calls for a wide range of IT skills, professional project management, and the capability to work continuously until the task is over.

For decades, Progent has provided expert Information Technology services for companies across the US and has earned Microsoft's Partnership certification in the Datacenter and Cloud Productivity competencies. Progent's group of subject matter experts (SMEs) includes consultants who have attained advanced industry certifications in important technologies such as Microsoft, Cisco, VMware, and major distributions of Linux. Progent's cyber security specialists have earned internationally-recognized industry certifications including CISA, CISSP-ISSAP, ISACA CRISC, GIAC, and CMMC 2.0. (Refer to Progent's certifications). Progent also has expertise in financial systems and ERP software solutions. This breadth of expertise provides Progent the capability to knowledgably determine necessary systems and re-organize the remaining parts of your computer network system following a ransomware event and rebuild them into a functioning network.

Progent's security team of experts deploys best of breed project management systems to orchestrate the complicated recovery process. Progent knows the urgency of working quickly and together with a customer's management and IT staff to prioritize tasks and to put key applications back online as fast as humanly possible.

Client Case Study: A Successful Ransomware Penetration Recovery
A business contacted Progent after their organization was taken over by Ryuk ransomware. Ryuk is generally considered to have been launched by North Korean state sponsored criminal gangs, suspected of using approaches leaked from America's National Security Agency. Ryuk attacks specific companies with little or no room for disruption and is among the most profitable instances of ransomware. Headline organizations include Data Resolution, a California-based info warehousing and cloud computing company, and the Chicago Tribune. Progent's client is a small manufacturer based in Chicago with around 500 workers. The Ryuk intrusion had frozen all business operations and manufacturing processes. Most of the client's backups had been directly accessible at the start of the intrusion and were damaged. The client was evaluating paying the ransom (exceeding two hundred thousand dollars) and praying for good luck, but in the end made the decision to use Progent.


"I cannot tell you enough in regards to the help Progent gave us throughout the most critical time of (our) businesses survival. We may have had to pay the hackers behind this attack if it wasn't for the confidence the Progent group provided us. That you were able to get our messaging and critical servers back on-line faster than one week was amazing. Every single staff member I worked with or messaged at Progent was amazingly focused on getting us back on-line and was working breakneck pace to bail us out."

Progent worked hand in hand the client to quickly assess and assign priority to the essential services that had to be recovered to make it possible to resume departmental functions:

  • Microsoft Active Directory
  • E-Mail
  • MRP System
To get going, Progent adhered to AV/Malware Processes penetration response best practices by stopping the spread and removing active viruses. Progent then started the task of rebuilding Microsoft AD, the heart of enterprise systems built on Microsoft Windows Server technology. Microsoft Exchange messaging will not operate without Windows AD, and the businesses' accounting and MRP software leveraged Microsoft SQL, which requires Active Directory for security authorization to the data.

Within 2 days, Progent was able to rebuild Active Directory to its pre-intrusion state. Progent then accomplished reinstallations and storage recovery of critical applications. All Exchange Server ties and attributes were intact, which accelerated the rebuild of Exchange. Progent was also able to locate local OST files (Microsoft Outlook Offline Data Files) on user desktop computers in order to recover email data. A recent offline backup of the businesses accounting software made it possible to recover these required services back servicing users. Although a large amount of work was left to recover completely from the Ryuk attack, the most important services were returned to operations rapidly:


"For the most part, the production manufacturing operation ran fairly normal throughout and we delivered all customer shipments."

During the following month key milestones in the restoration process were completed through tight cooperation between Progent consultants and the client:

  • In-house web sites were returned to operation with no loss of information.
  • The MailStore Microsoft Exchange Server with over 4 million archived emails was brought on-line and accessible to users.
  • CRM/Orders/Invoicing/Accounts Payable/Accounts Receivables (AR)/Inventory capabilities were 100% operational.
  • A new Palo Alto Networks 850 security appliance was installed and configured.
  • 90% of the user workstations were functioning as before the incident.

"Much of what occurred in the early hours is mostly a blur for me, but our team will not soon forget the urgency all of you accomplished to help get our company back. I've been working with Progent for at least 10 years, possibly more, and every time I needed help Progent has come through and delivered as promised. This situation was a stunning achievement."

Conclusion
A possible business-ending disaster was dodged due to results-oriented experts, a broad array of subject matter expertise, and tight teamwork. Although in retrospect the ransomware attack detailed here could have been shut down with modern cyber security technology solutions and recognized best practices, staff education, and appropriate security procedures for data backup and keeping systems up to date with security patches, the fact is that government-sponsored cyber criminals from China, North Korea and elsewhere are tireless and are not going away. If you do fall victim to a crypto-ransomware incident, remember that Progent's team of professionals has a proven track record in ransomware virus blocking, mitigation, and data recovery.


"So, to Darrin, Matt, Aaron, Dan, Claude, Jesse, Arnaud, Allen and Tony (and any others who were contributing), I'm grateful for letting me get rested after we made it over the initial fire. Everyone did an amazing job, and if anyone that helped is around the Chicago area, dinner is the least I can do!"

To read or download a PDF version of this ransomware incident report, please click:
Progent's Ransomware Incident Recovery Case Study Datasheet. (PDF - 282 KB)

Additional Crypto-Ransomware Protection Services Available from Progent
Progent offers businesses in Ipanema a variety of online monitoring and security assessment services to help you to reduce the threat from ransomware. These services utilize next-generation artificial intelligence capability to detect zero-day variants of crypto-ransomware that are able to evade traditional signature-based anti-virus products.

  • ProSight LAN Watch: Server and Desktop Remote Monitoring and Management
    ProSight LAN Watch is Progent's server and desktop monitoring service that uses advanced remote monitoring and management (RMM) technology to help keep your IT system operating at peak levels by tracking the state of critical assets that power your business network. When ProSight LAN Watch detects an issue, an alert is sent automatically to your specified IT staff and your Progent engineering consultant so all looming issues can be resolved before they can disrupt your network. Find out more details about ProSight LAN Watch server and desktop remote monitoring services.

  • ProSight LAN Watch with NinjaOne RMM: Unified RMM for Networks, Servers, and Workstations
    ProSight LAN Watch with NinjaOne RMM software offers a unified, cloud-driven solution for monitoring and managing your network, server, and desktop devices by providing tools for performing common tedious tasks. These can include health checking, patch management, automated remediation, endpoint setup, backup and recovery, anti-virus defense, remote access, built-in and custom scripts, resource inventory, endpoint profile reports, and troubleshooting help. If ProSight LAN Watch with NinjaOne RMM uncovers a serious incident, it sends an alert to your designated IT management staff and your Progent technical consultant so potential problems can be fixed before they interfere with your network. Learn more about ProSight LAN Watch with NinjaOne RMM server and desktop remote monitoring services.

  • ProSight WAN Watch: Infrastructure Management
    ProSight WAN Watch is a network infrastructure monitoring and management service that makes it simple and affordable for smaller organizations to map out, monitor, enhance and troubleshoot their connectivity appliances like switches, firewalls, and wireless controllers as well as servers, printers, client computers and other devices. Incorporating cutting-edge Remote Monitoring and Management (RMM) technology, WAN Watch ensures that network maps are kept updated, copies and manages the configuration information of virtually all devices on your network, monitors performance, and sends notices when potential issues are discovered. By automating tedious management processes, WAN Watch can knock hours off common tasks such as making network diagrams, expanding your network, locating appliances that require important updates, or identifying the cause of performance issues. Learn more about ProSight WAN Watch network infrastructure management services.

  • ProSight Reporting: In-depth Reporting for Ticketing and Network Monitoring Platforms
    ProSight Reporting is an expanding line of in-depth management reporting utilities created to integrate with the industry's top ticketing and remote network monitoring applications such as ConnectWise Manage, ConnectWise Automate, Customer Thermometer, Auvik, and SentinelOne. ProSight Reporting uses Microsoft Graph and utilizes color coding to surface and contextualize key issues like inconsistent support follow-up or machines with out-of-date AVs. By exposing ticketing or network health problems clearly and in near-real time, ProSight Reporting improves network value, reduces management hassle, and saves money. For more information, visit ProSight Reporting for ticketing and network monitoring platforms.

  • ProSight Data Protection Services (DPS): Backup and Disaster Recovery Services
    Progent has partnered with advanced backup technology providers to create ProSight Data Protection Services, a selection of subscription-based management offerings that provide backup-as-a-service (BaaS). ProSight DPS services manage and track your backup operations and allow transparent backup and rapid recovery of vital files, applications, images, and Hyper-V and VMware virtual machines. ProSight DPS helps you protect against data loss caused by equipment failures, natural disasters, fire, cyber attacks like ransomware, user mistakes, malicious employees, or software glitches. Managed backup services in the ProSight DPS product line include ProSight DPS Altaro VM Backup, ProSight 365 Total Backup (formerly Altaro 365 Backup), ProSight DPS ECHO Backup using Barracuda dedicated hardware, and ProSight DPS MSP360 Cloud and On-prem Backup. Your Progent expert can help you to determine which of these fully managed backup services are best suited for your network.

  • ProSight Email Guard: Inbound and Outbound Spam Filtering and Data Leakage Protection
    ProSight Email Guard is Progent's spam and virus filtering and email encryption service that incorporates the technology of leading information security companies to deliver centralized management and comprehensive security for your email traffic. The powerful architecture of Email Guard managed service integrates a Cloud Protection Layer with a local gateway device to offer complete defense against spam, viruses, Dos Attacks, Directory Harvest Attacks, and other email-borne malware. The cloud filter serves as a preliminary barricade and blocks most threats from making it to your security perimeter. This decreases your exposure to external threats and conserves system bandwidth and storage space. Email Guard's on-premises security gateway device provides a further level of inspection for incoming email. For outgoing email, the on-premises gateway offers AV and anti-spam filtering, protection against data leaks, and email encryption. The on-premises security gateway can also help Exchange Server to monitor and safeguard internal email traffic that originates and ends inside your security perimeter. For more details, visit ProSight Email Guard spam filtering and data leakage protection.

  • ProSight Duo Multi-Factor Authentication: Access Security, Endpoint Remediation, and Protected Single Sign-on
    Progent's Duo authentication managed services incorporate Cisco's Duo cloud technology to defend against password theft through the use of two-factor authentication (2FA). Duo supports one-tap identity confirmation on Apple iOS, Google Android, and other personal devices. Using 2FA, when you log into a secured online account and enter your password you are requested to confirm who you are via a unit that only you possess and that uses a separate network channel. A broad selection of out-of-band devices can be utilized as this second form of authentication including an iPhone or Android or watch, a hardware token, a landline phone, etc. You may designate several validation devices. To find out more about Duo two-factor identity authentication services, see Cisco Duo MFA two-factor authentication (2FA) services.

  • Progent's Outsourced/Shared Help Center: Support Desk Managed Services
    Progent's Call Desk services permit your information technology team to outsource Call Center services to Progent or split activity for Service Desk support transparently between your internal network support team and Progent's nationwide roster of IT support technicians, engineers and subject matter experts. Progent's Shared Service Desk provides a transparent extension of your internal network support organization. End user access to the Help Desk, delivery of support services, escalation, ticket generation and updates, performance metrics, and management of the service database are consistent regardless of whether issues are resolved by your core support organization, by Progent, or both. Read more about Progent's outsourced/co-managed Service Center services.

  • Progent Active Defense Against Ransomware: AI-based Ransomware Detection and Remediation
    Progent's Active Protection Against Ransomware is an endpoint protection managed service that utilizes cutting edge behavior analysis tools to guard endpoint devices and servers and VMs against new malware attacks such as ransomware and file-less exploits, which easily evade legacy signature-matching AV products. Progent ASM services protect local and cloud-based resources and provides a unified platform to address the complete threat lifecycle including blocking, detection, containment, remediation, and post-attack forensics. Top capabilities include single-click rollback with Windows VSS and automatic network-wide immunization against newly discovered attacks. Learn more about Progent's ransomware defense and recovery services.

  • ProSight IT Asset Management: Network Documentation Management
    ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to create, maintain, find and protect information related to your network infrastructure, procedures, applications, and services. You can quickly locate passwords or serial numbers and be alerted about upcoming expirations of SSLs ,domains or warranties. By cleaning up and organizing your network documentation, you can save as much as half of time spent searching for vital information about your network. ProSight IT Asset Management features a common repository for holding and collaborating on all documents required for managing your network infrastructure such as standard operating procedures and self-service instructions. ProSight IT Asset Management also supports advanced automation for gathering and relating IT information. Whether you're making enhancements, performing maintenance, or responding to a crisis, ProSight IT Asset Management gets you the knowledge you need when you need it. Find out more about ProSight IT Asset Management service.

  • Patch Management: Software/Firmware Update Management Services
    Progent's managed services for patch management offer organizations of all sizes a flexible and cost-effective alternative for assessing, validating, scheduling, implementing, and tracking software and firmware updates to your dynamic IT system. Besides optimizing the security and reliability of your IT environment, Progent's patch management services allow your in-house IT staff to concentrate on line-of-business initiatives and activities that derive maximum business value from your network. Learn more about Progent's software/firmware update management services.

  • ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
    With ProSight Virtual Hosting service, a small organization can have its key servers and apps hosted in a protected fault tolerant data center on a high-performance virtual host configured and maintained by Progent's IT support experts. With Progent's ProSight Virtual Hosting model, the customer owns the data, the operating system software, and the apps. Because the system is virtualized, it can be moved immediately to an alternate hardware environment without requiring a lengthy and technically risky reinstallation procedure. With ProSight Virtual Hosting, your business is not locked into one hosting service. Learn more details about ProSight Virtual Hosting services.

  • ProSight Active Security Monitoring: Endpoint Protection and Ransomware Defense
    ProSight Active Security Monitoring is an endpoint protection (EPP) service that utilizes SentinelOne's next generation behavior-based machine learning technology to defend physical and virtual endpoint devices against modern malware attacks like ransomware and email phishing, which routinely get by traditional signature-based anti-virus tools. ProSight ASM safeguards on-premises and cloud-based resources and provides a single platform to manage the entire malware attack progression including filtering, infiltration detection, mitigation, remediation, and post-attack forensics. Key features include one-click rollback with Windows Volume Shadow Copy Service (VSS) and automatic system-wide immunization against newly discovered attacks. Progent is a SentinelOne Partner, dealer, and integrator. Read more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware defense.

  • ProSight Enhanced Security Protection (ESP): Physical and Virtual Endpoint Protection and Exchange Email Filtering
    ProSight Enhanced Security Protection (ESP) managed services deliver affordable multi-layer security for physical servers and VMs, workstations, smartphones, and Microsoft Exchange. ProSight ESP uses adaptive security and advanced heuristics for round-the-clock monitoring and reacting to cyber threats from all attack vectors. ProSight ESP offers two-way firewall protection, penetration alarms, endpoint management, and web filtering via leading-edge tools packaged within a single agent accessible from a single control. Progent's data protection and virtualization experts can help you to plan and configure a ProSight ESP environment that meets your organization's specific needs and that allows you prove compliance with government and industry data security regulations. Progent will help you define and configure policies that ProSight ESP will manage, and Progent will monitor your network and react to alerts that call for immediate attention. Progent's consultants can also assist your company to install and verify a backup and restore solution such as ProSight Data Protection Services (DPS) so you can recover rapidly from a destructive cyber attack like ransomware. Find out more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint security and Microsoft Exchange filtering.
For Ipanema 24/7/365 Crypto-Ransomware Repair Help, contact Progent at 800-462-8800 or go to Contact Progent.