Overview of Progent's Ransomware Forensics Investigation and Reporting in Birmingham
Progent's ransomware forensics experts can save the evidence of a ransomware attack and carry out a comprehensive forensics investigation without disrupting the processes related to operational resumption and data restoration. Your Birmingham organization can utilize Progent's post-attack forensics documentation to block future ransomware assaults, assist in the restoration of encrypted data, and comply with insurance carrier and governmental reporting requirements.
Ransomware forensics involves discovering and documenting the ransomware assault's progress across the targeted network from beginning to end. This history of how a ransomware attack travelled through the network helps you to assess the impact and highlights shortcomings in rules or processes that should be corrected to avoid later break-ins. Forensics is usually given a top priority by the cyber insurance provider and is typically mandated by state and industry regulations. Since forensics can take time, it is vital that other key recovery processes such as operational continuity are performed in parallel. Progent has an extensive team of IT and cybersecurity experts with the skills required to perform the work of containment, business resumption, and data recovery without disrupting forensics.
Ransomware forensics analysis is complicated and requires close cooperation with the teams assigned to file cleanup and, if needed, payment negotiation with the ransomware threat actor. Ransomware forensics can require the review of logs, registry, GPO, Active Directory, DNS servers, routers, firewalls, scheduled tasks, and core Windows systems to check for anomalies.
Activities associated with forensics investigation include:
- Isolate but avoid shutting down all possibly suspect devices from the network. This may require closing all RDP ports and Internet connected network-attached storage, changing admin credentials and user PWs, and setting up two-factor authentication to protect your backups.
- Create forensically sound digital images of all suspect devices so your data recovery team can proceed
- Preserve firewall, VPN, and additional critical logs as soon as possible
- Determine the variety of ransomware involved in the assault
- Inspect every machine and data store on the network as well as cloud storage for signs of encryption
- Catalog all encrypted devices
- Determine the type of ransomware involved in the attack
- Review logs and sessions to establish the time frame of the assault and to spot any possible lateral migration from the first infected machine
- Understand the attack vectors used to perpetrate the ransomware assault
- Look for new executables associated with the original encrypted files or network breach
- Parse Outlook web archives
- Analyze email attachments
- Separate any URLs from email messages and check to see if they are malicious
- Provide detailed attack reporting to satisfy your insurance and compliance mandates
- Document recommendations to shore up security gaps and enforce workflows that reduce the risk of a future ransomware breach
Progent's Background
Progent has provided remote and on-premises IT services throughout the U.S. for more than two decades and has been awarded Microsoft's Partner designation in the Datacenter and Cloud Productivity practice areas. Progent's team of subject matter experts (SMEs) includes consultants who have been awarded high-level certifications in foundation technologies including Cisco networking, VMware virtualization, and popular distributions of Linux. Progent's data security experts have earned industry-recognized certifications such as CISM, CISSP, and GIAC. (Refer to Progent's certifications). Progent also offers guidance in financial and ERP software. This broad array of skills gives Progent the ability to identify and consolidate the surviving parts of your network following a ransomware attack and reconstruct them rapidly into an operational system. Progent has worked with top cyber insurance providers like Chubb to assist businesses clean up after ransomware attacks.
Contact Progent about Ransomware Forensics Investigation Expertise in Birmingham
To find out more about how Progent can help your Birmingham business with ransomware forensics investigation, call 1-800-462-8800 or see Contact Progent.