Ransomware Hot Line: 800-462-8800
24x7 Online Access to a Senior Ransomware Consultant
Ransomware requires time to work its way across a target network. Because of this, ransomware attacks are typically unleashed on weekends and at night, when support staff may be slower to become aware of a breach and are less able to mount a rapid and forceful defense. The more lateral movement ransomware is able to achieve within a victim's network, the more time it takes to recover core IT services and damaged files and the more information can be stolen and posted to the dark web.
Progent's Ransomware Hot Line is designed to guide you to complete the time-critical first steps in mitigating a ransomware attack by stopping the bleeding. Progent's online ransomware engineers can assist you to identify and quarantine breached servers and endpoints and guard clean assets from being penetrated.
If your system has been breached by any version of ransomware, don't panic. Get immediate help by calling Progent's 24x7 Ransomware Hot Line at 800-462-8800.
Progent's Ransomware Recovery Expertise
Modern variants of crypto-ransomware such as Ryuk, Sodinokibi, DopplePaymer, and Nephilim encrypt online files and invade any available system restores. Data synchronized to the cloud can also be corrupted. For a vulnerable network, this can make system recovery almost impossible and effectively throws the datacenter back to the beginning. So-called Threat Actors (TAs), the cybercriminals responsible for ransomware assault, demand a settlement fee in exchange for the decryption tools required to recover encrypted data. Ransomware assaults also attempt to exfiltrate information and hackers demand an additional settlement for not publishing this data on the dark web. Even if you can restore your network to an acceptable point in time, exfiltration can pose a big issue depending on the nature of the stolen information.
The recovery work after a ransomware penetration has a number of crucial stages, the majority of which can proceed concurrently if the recovery team has a sufficient number of people with the required experience.
- Containment: This time-critical initial step requires blocking the sideways spread of ransomware within your IT system. The longer a ransomware assault is allowed to run unrestricted, the longer and more costly the restoration process. Recognizing this, Progent keeps a round-the-clock Ransomware Hotline staffed by seasoned ransomware response engineers. Containment activities consist of isolating affected endpoint devices from the network to block the spread, documenting the IT system, and protecting entry points.
- Operational continuity: This covers bringing back the IT system to a minimal useful degree of functionality with the least downtime. This process is typically the highest priority for the targets of the ransomware assault, who often perceive it to be an existential issue for their company. This activity also demands the broadest array of technical skills that span domain controllers, DHCP servers, physical and virtual machines, desktops, laptops and mobile phones, databases, office and mission-critical apps, network architecture, and protected endpoint access management. Progent's ransomware recovery team uses state-of-the-art workgroup platforms to coordinate the complex recovery effort. Progent understands the urgency of working quickly, continuously, and in concert with a customer's managers and network support group to prioritize activity and to get critical resources back online as fast as feasible.
- Data recovery: The work required to restore files damaged by a ransomware assault depends on the state of the systems, the number of files that are affected, and which restore techniques are needed. Ransomware assaults can destroy key databases which, if not carefully shut down, may have to be rebuilt from the beginning. This can apply to DNS and AD databases. Microsoft Exchange and SQL Server depend on AD, and many financial and other mission-critical applications depend on SQL Server. Some detective work may be needed to locate undamaged data. For instance, non-encrypted OST files may have survived on staff desktop computers and laptops that were not connected during the attack. Progent's ProSight Data Protection Services utilize Altaro VM Backup tools to defend against ransomware attacks by leveraging Immutable Cloud Storage. This creates tamper-proof backup data that cannot be erased or modified by any user including administrators.
- Implementing modern AV/ransomware protection: Progent's ProSight Active Security Monitoring utilizes SentinelOne's machine learning technology to give small and medium-sized businesses the advantages of the identical anti-virus technology used by some of the world's biggest enterprises such as Netflix, Visa, and Salesforce. By delivering in-line malware blocking, classification, mitigation, recovery and analysis in a single integrated platform, ProSight Active Security Monitoring cuts TCO, streamlines administration, and expedites recovery. SentinelOne's next-generation endpoint protection (NGEP) incorporated in Progent's Active Security Monitoring was ranked by Gartner Group as the "most visionary Endpoint Protection Platform." Progent is a SentinelOne Partner, dealer, and integrator. Learn about Progent's ProSight Active Security Monitoring endpoint protection and ransomware recovery with SentinelOne technology.
- Negotiating a settlement with the hacker Progent has experience negotiating ransom settlements with threat actors. This requires working closely with the ransomware victim and the insurance provider, if there is one. Activities include establishing the kind of ransomware involved in the attack; identifying and making contact with the hacker persona; testing decryption tool; deciding on a settlement with the victim and the cyber insurance carrier; establishing a settlement and schedule with the TA; confirming adherence to anti-money laundering (AML) sanctions; overseeing the crypto-currency payment to the hacker; acquiring, learning, and operating the decryptor tool; troubleshooting decryption problems; building a clean environment; mapping and reconnecting datastores to reflect exactly their pre-attack condition; and recovering machines and software services.
- Forensic analysis: This activity is aimed at learning the ransomware attack's progress across the targeted network from start to finish. This audit trail of the way a ransomware assault progressed within the network helps you to evaluate the damage and highlights vulnerabilities in rules or processes that need to be rectified to prevent future break-ins. Forensics entails the examination of all logs, registry, GPO, Active Directory, DNS, routers, firewalls, schedulers, and core Windows systems to detect anomalies. Forensics is commonly given a high priority by the insurance provider. Because forensics can take time, it is vital that other important activities such as operational continuity are pursued concurrently. Progent maintains a large roster of information technology and security experts with the skills needed to perform activities for containment, operational continuity, and data restoration without interfering with forensics.
Progent's Qualifications
Progent has delivered remote and on-premises network services across the U.S. for over two decades and has been awarded Microsoft's Partner designation in the Datacenter and Cloud Productivity practice areas. Progent's team of subject matter experts includes consultants who have been awarded advanced certifications in core technologies such as Cisco networking, VMware, and major Linux distros. Progent's data security experts have earned internationally recognized certifications including CISA, CISSP, and GIAC. (Refer to Progent's certifications). Progent also has top-tier support in financial management and ERP software. This broad array of skills gives Progent the ability to salvage and consolidate the surviving parts of your network following a ransomware attack and reconstruct them rapidly into a functioning network. Progent has worked with top insurance providers including Chubb to assist organizations clean up after ransomware attacks.
Download Datasheet: Progent's Ransomware Endpoint Detection and Response (EDR) Services
To see a datasheet describing Progent's ransomware endpoint detection and response (EDR) services, click:
Progent's Progent's Ransomware Endpoint Detection and Response Services Datasheet. (PDF - 748 KB)
Contact Progent for Ransomware Cleanup Consulting
For ransomware recovery consulting, call Progent at 800-462-8800 or go to Contact Progent.