Ransomware : Your Feared IT Nightmare
Ransomware  Remediation ExpertsCrypto-Ransomware has become a too-frequent cyberplague that poses an existential threat for businesses of all sizes unprepared for an attack. Multiple generations of ransomware like the CryptoLocker, CryptoWall, Bad Rabbit, Syskey and MongoLock cryptoworms have been replicating for a long time and still inflict havoc. Modern versions of crypto-ransomware such as Ryuk, Maze, Sodinokibi, DopplePaymer, Snatch and Egregor, plus frequent unnamed newcomers, not only encrypt online data but also infect any configured system protection. Data synchronized to off-premises disaster recovery sites can also be corrupted. In a poorly designed system, this can make any restore operations useless and basically knocks the network back to square one.

Getting back services and information following a crypto-ransomware attack becomes a sprint against the clock as the victim fights to contain the damage, clear the ransomware, and restore mission-critical operations. Because ransomware requires time to replicate throughout a network, assaults are often sprung on weekends and holidays, when penetrations in many cases take longer to uncover. This compounds the difficulty of rapidly mobilizing and orchestrating a qualified mitigation team.

Progent provides a variety of support services for protecting Cambridge enterprises from ransomware attacks. Among these are user education to help recognize and avoid phishing exploits, ProSight Active Security Monitoring for endpoint detection and response (EDR) utilizing SentinelOne's behavior-based threat defense to discover and quarantine day-zero malware assaults. Progent in addition can provide the services of seasoned ransomware recovery professionals with the track record and commitment to re-deploy a compromised environment as urgently as possible.

Progent's Ransomware Recovery Help
After a crypto-ransomware attack, sending the ransom demands in cryptocurrency does not provide any assurance that cyber criminals will respond with the needed keys to unencrypt any or all of your data. Kaspersky ascertained that seventeen percent of ransomware victims never recovered their files even after having paid the ransom, resulting in additional losses. The gamble is also costly. Ryuk ransoms are commonly a few hundred thousand dollars. For larger organizations, the ransom demand can reach millions. The alternative is to piece back together the mission-critical parts of your Information Technology environment. Without access to complete information backups, this requires a wide complement of skill sets, professional team management, and the willingness to work continuously until the job is done.

For decades, Progent has offered expert Information Technology services for businesses throughout the U.S. and has earned Microsoft's Partnership certification in the Datacenter and Cloud Productivity competencies. Progent's pool of subject matter experts (SMEs) includes consultants who have attained high-level industry certifications in foundation technologies such as Microsoft, Cisco, VMware, and popular distributions of Linux. Progent's cyber security experts have earned internationally-recognized certifications including CISA, CISSP-ISSAP, ISACA CRISC, SANS GIAC, and CMMC 2.0. (Refer to Progent's certifications). Progent also has expertise with accounting and ERP application software. This breadth of expertise provides Progent the capability to knowledgably determine important systems and consolidate the remaining components of your computer network environment following a ransomware attack and rebuild them into an operational network.

Progent's recovery team deploys powerful project management systems to orchestrate the complex restoration process. Progent knows the urgency of working quickly and in concert with a client's management and Information Technology staff to assign priority to tasks and to get key applications back online as soon as possible.

Customer Case Study: A Successful Ransomware Virus Response
A business contacted Progent after their company was penetrated by the Ryuk crypto-ransomware. Ryuk is thought to have been deployed by North Korean state sponsored cybercriminals, suspected of adopting strategies leaked from the United States NSA organization. Ryuk attacks specific organizations with little room for disruption and is one of the most profitable iterations of crypto-ransomware. High publicized targets include Data Resolution, a California-based information warehousing and cloud computing company, and the Chicago Tribune. Progent's customer is a regional manufacturer located in Chicago with around 500 workers. The Ryuk penetration had disabled all essential operations and manufacturing processes. Most of the client's backups had been on-line at the time of the attack and were eventually encrypted. The client was actively seeking loans for paying the ransom demand (in excess of $200,000) and hoping for good luck, but ultimately made the decision to use Progent.


"I can't tell you enough about the help Progent gave us during the most critical time of (our) company's existence. We most likely would have paid the cyber criminals behind the attack if it wasn't for the confidence the Progent team gave us. That you were able to get our e-mail and essential applications back on-line sooner than seven days was beyond my wildest dreams. Each expert I worked with or communicated with at Progent was urgently focused on getting us operational and was working at all hours to bail us out."

Progent worked with the customer to rapidly determine and prioritize the mission critical areas that had to be addressed to make it possible to continue company functions:

  • Active Directory (AD)
  • Microsoft Exchange Server
  • Accounting/MRP
To begin, Progent followed ransomware penetration response best practices by stopping lateral movement and removing active viruses. Progent then began the steps of restoring Active Directory, the core of enterprise systems built on Microsoft Windows Server technology. Exchange email will not function without Active Directory, and the client's accounting and MRP software leveraged Microsoft SQL, which needs Active Directory for access to the data.

Within 48 hours, Progent was able to recover Windows Active Directory to its pre-attack state. Progent then assisted with rebuilding and hard drive recovery of mission critical applications. All Microsoft Exchange Server data and attributes were intact, which accelerated the rebuild of Exchange. Progent was able to locate local OST files (Outlook Offline Folder Files) on team PCs in order to recover email information. A not too old offline backup of the customer's financials/ERP systems made them able to return these required services back online for users. Although a lot of work remained to recover fully from the Ryuk virus, core systems were returned to operations rapidly:


"For the most part, the production manufacturing operation did not miss a beat and we did not miss any customer sales."

During the next couple of weeks critical milestones in the restoration project were made in tight collaboration between Progent consultants and the client:

  • Internal web sites were restored with no loss of data.
  • The MailStore Exchange Server with over four million archived messages was brought online and available for users.
  • CRM/Product Ordering/Invoices/Accounts Payable/Accounts Receivables/Inventory Control functions were 100% recovered.
  • A new Palo Alto Networks 850 security appliance was installed.
  • Ninety percent of the user desktops were fully operational.

"Much of what was accomplished in the initial days is nearly entirely a fog for me, but my team will not soon forget the urgency all of the team accomplished to help get our company back. I have trusted Progent for the past 10 years, maybe more, and each time I needed help Progent has outperformed my expectations and delivered as promised. This event was the most impressive ever."

Conclusion
A likely business extinction catastrophe was evaded through the efforts of dedicated experts, a broad spectrum of technical expertise, and close teamwork. Although upon completion of forensics the ransomware virus attack described here should have been identified and disabled with up-to-date cyber security systems and security best practices, staff training, and properly executed security procedures for data protection and applying software patches, the reality is that government-sponsored hackers from China, North Korea and elsewhere are tireless and are not going away. If you do fall victim to a ransomware incident, remember that Progent's roster of professionals has extensive experience in crypto-ransomware virus defense, mitigation, and file restoration.


"So, to Darrin, Matt, Aaron, Dan, Claude, Jesse, Arnaud, Allen, Tony and Chris (and any others that were contributing), thanks very much for making it so I could get rested after we got past the first week. Everyone did an impressive job, and if anyone is around the Chicago area, dinner is my treat!"

Download the Ransomware Cleanup Case Study Datasheet
To read or download a PDF version of this case study, please click:
Progent's Ransomware Incident Recovery Case Study Datasheet. (PDF - 282 KB)

Contact Progent for Ransomware Recovery Consulting Services in Cambridge
For ransomware recovery consulting services in the Cambridge area, call Progent at 800-462-8800 or go to Contact Progent.



An index of content::

  • 24-7 64-bit Computing Services 64-bit Migration Consultant Services
  • 24-7 Cambridge Crypto-Ransomware Preparedness Evaluation Cambridge, Cambridgeshire Cambridge Ransomware NotPetya Vulnerability Review Cambridge
  • 24x7 At Home Workers Cambridge Assistance - Help Desk Solutions Consulting Experts Cambridge At Home Workers Cambridge Consulting Experts - Call Desk Solutions Consulting Services Cambridge
  • 64-bit Server Engineer Online Help 64-bit Server

  • Support and Setup Microsoft ISA Server 2006
    Online Help Microsoft ISA Server 2006

    Secure Application Publishing with Internet Security and Acceleration Server 2006 provides greater control over intranet applications while enabling increased efficiency by making these resources accessible to authorized remote users. ISA Server 2006 can protect business applications, services, and data across all network components with stateful packet inspection and comprehensive publishing wizards. Progent's Microsoft-certified Internet Security and Acceleration Server experts can help you plan, install, set up, and maintain Internet Security and Acceleration Server 2006 on your system so that your business benefits from a highly functional and affordable balance of protection, productivity, and performance.

  • Altaro VM Backup Scheduling Online Support Services Network Consultant Altaro VM Backup Live Backup
  • At Home Workers Cambridge Guidance - Management Systems Expertise Cambridge Work at Home Employees Consulting and Support Services nearby Cambridge - Endpoint Management Systems Consulting Experts St Neots, Britain
  • Best Cambridge Dharma Ransomware Settlement Guidance Cambridgeshire Cambridge Locky Crypto-Ransomware Negotiation Expertise East of England
  • Biggest Cambridge Remote Workers Voice/Video Conferencing Technology Consulting and Support Services Cambridge Remote Work at Home Employees Guidance near Cambridge - Video Conferencing Systems Assistance Cambridge
  • Cambridge 24 Hour Cambridge At Home Workforce Backup/Recovery Systems Consultants Telecommuters Cambridge Assistance - Backup/Recovery Solutions Expertise Cambridge
  • Cambridge Dharma Ransomware Rollback Cambridge Cambridge Dharma Ransomware Mitigation Cambridge
  • Cambridge Immediate CryptoLocker Repair Support Services Cambridge Crypto Recovery Consultants Cambridgeshire, East of England
  • Cambridge Lockbit Ransomware Hot Line Ransomware Cleanup and Restore Cambridge
  • Cambridge Locky Crypto-Ransomware Forensics Cambridge Cambridge NotPetya Crypto-Ransomware Forensics Analysis Bedford
  • Cambridge Spora Ransomware Remediation Cambridge, Cambridgeshire
  • Cambridge Ransomware Mitigation Cambridge Huntingdon Cambridge MongoLock Crypto-Ransomware Mitigation
  • Cambridge Remote Workers Cloud Solutions Assistance Cambridgeshire At Home Workforce Consulting Experts near Cambridge - Cloud Technology Consulting and Support Services Cambridge
  • Cambridge Remote Workers VoIP Technology Assistance Remote Workers Cambridge Consultants - IP Voice Solutions Consulting Cambridge
  • Cambridge Remote Workforce Integration Consulting Experts Remote Workers Consulting in Cambridge - Connectivity Consultants Cambridge, Cambridgeshire

  • Remote Support Network Engineer From Home Job
    Positions Virtual Office Technology

    Progent's company culture will make you a more capable consultant by enhancing your technical skills and increasing the satisfaction of your customers. Progent delivers this promise by attracting the best professional talent for you to operate with, offering an advanced system architecture, using custom software utilities to deliver the highest quality of service, and by optimizing our operational models for attracting and keeping customers.

  • Cambridge Technician Microsoft Windows Server 2016 Network Consulting Firm Microsoft Windows Server 2019 Cambridge
  • Peterborough Cambridge Phobos Crypto-Ransomware System-Rebuild
  • Cambridge Teleworkers Integration Consulting Cambridge Cambridgeshire, East of England Work at Home Employees Consulting and Support Services near me in Cambridge - Integration Consultants
  • Cambridge, Great Britain 24/7 Cambridge Hermes Ransomware File-Recovery Cambridge Cambridge Avaddon Ransomware Removal
  • Catalyst MPLS Remote Support Catalyst Switch VSS Technology Consulting
  • Cisco Small Business IT Consultant Cambridge Cisco Professional Services Peterborough
  • Consultancy External Cybersecurity Scan Immediate Security Inventory Engineers
  • Debian Linux, Sun Solaris, UNIX Professionals Cambridge, Cambridgeshire Cambridge CentOS Linux, Sun Solaris, UNIX Troubleshooting
  • DotNET Software Programming 24 Hour Contract Programming .NET F#

  • IoT sensors patch management Specialist
    24/7/365 Patch management Consultants

    Progent's managed services for software/firmware update management offer businesses of any size a versatile and affordable alternative for assessing, validating, scheduling, applying, and tracking software and firmware updates to your virtual and physical; servers, peripherals {like printers and scanners, network infrastructure appliances such as switches and wireless APs, and Internet-of-Things (IoT) devices like alarms and robotics.

  • Emergency Cambridge MS Dynamics GP-Software Migration Help Cambridge Cambridge MS Dynamics GP (Great Plains) Reporting Support Services Bedford
  • Exchange SE Compliance Support and Setup Exchange SE Planning Professionals
  • Cambridge MongoLock Ransomware Remediation Cambridge
  • Exchange Server 2013 Computer Network Support Group East of England East of England Microsoft Exchange Computer Tech
  • Firewall Protecting Bedford Security Security Team Cambridge, UK
  • Cambridge Conti Ransomware Cleanup Cambridge
  • Immediate Computer Consulting Companies BlackBerry Exchange St Neots Peterborough Top BlackBerry BES Server Networking Companies
  • MSP360 B2 Backup Storage Consultant Services Support and Setup MSP360 Desktop Backup

  • Top Rated Hornetsecurity Altaro 365 Total Backup Technical Support
    Hornetsecurity 365 Total Backup Professionals

    Progent is a certified Hornetsecurity/Altaro partner and can design, configure, and manage a deployment of 365 Total Backup to back up and restore your Microsoft 365 mailboxes, files stored within your company's OneDrive Accounts and SharePoint Document Libraries, Teams Chats, plus files on Windows-powered laptops and desktops.

  • Microsoft Desktop Information Technology Outsource 24x7 Desktop Server Administration
  • Microsoft SQL Server 2017 Technical Support Organization SQL 2012 Network Consultant Cambridge, U.K.
  • Microsoft SharePoint Server 2013 IT Consulting Microsoft SharePoint Server 2013 Information Technology Consulting Peterborough
  • Networking Consultancy Services Cambridge Cambridge, U.K. Network Management Services

  • Apple OS X Online Consulting
    Apple OS X Computer Consulting

    Progent's experts can provide Apple macOS and OS X users a range of services including desktop support, Apple macOS and OS X consulting, Mac co-existence with Windows environments, Entourage and Exchange Server help, security services, and custom education. Progent can assist clients to migrate to macOS from OS X or other earlier editions of OS X and Progent can provide help with Apple Mac application software. Progent's specialists in Apple technology can also assist you with Apple iPhone integration and iPad management, or migrating to iCloud services. For business networks built solely on macOS or OS X or for networks incorporating a combination of Mac, Linux and Windows powered servers and workstations, Progent's Apple, Cisco, and Microsoft consultants have the background and depth to deal with the difficulty of planning, integrating and maintaining a network environment that is available, safe, efficient and able to achieve your organization's business goals.

  • Office Communications Server Release 2 Engineer Specialist Microsoft Voice over IP
  • Office Word and PDF Engineer Urgent Office Word for Android Specialist
  • On-site Technical Support Microsoft 365 Mac Integration Immediate Microsoft 365 Outlook Integration Onsite Technical Support
  • Palo Alto Networks Security Consultants Cybersecurity Consultancies Watchguard
  • ProSight Automatic Network Mapping Remote Support Services Network Services Monitoring Specialist
  • Remote Support Cisco Firepower integration Troubleshooting ASA Firepower

  • WLAN Site Survey Configuration
    Remote Troubleshooting Wireless LAN Site Survey

    Progent's Wi-Fi site survey services make it easy to plan, implement and debug a Wi-Fi network optimized for your environment, offering you a wireless solution that has the coverage, speed, capacity, Quality of Service, security, and roaming capability your business needs. Wireless survey services from Progent include remote predictive modeling for designing a Wi-Fi LAN and on-premises survey services for validating, optimizing, and troubleshooting an operational wireless network.

  • Remote Technical Support Cambridge-Coventry Cambridge, Great Britain Network Consultant
  • Remote Workers Assistance near me in Cambridge - Collaboration Solutions Assistance Peterborough Cambridge, Cambridgeshire Work from Home Employees Assistance near Cambridge - Collaboration Solutions Consulting Experts
  • Remote Workforce Cambridge Assistance - Endpoint Security Systems Assistance Cambridge, Britain Cambridge Offsite Workforce Endpoint Security Systems Consulting Cambridgeshire, UK
  • Security Group Symantec Security Emergency Symantec VelociRaptor Security Organizations

  • Cisco Firepower 1000 Series Firewalls Computer Engineer
    Cisco Firepower Configuration Technical Consultant

    Progent's certified Cisco IT security consultants provide high-level PIX Firewall and ASA Firewall consulting support covering infrastructure design, configuration, and management of Cisco firewall and Cisco security solutions. The PIX and ASA Series of Cisco firewall products delivers strong user and application policy enforcement, sophisticated attack protection, and secure connectivity services. Ranging from compact, easy-to-install desktop appliances for small and home offices to modular enterprise-class products, Cisco PIX Firewall and ASA Firewalls provide advanced protection, high throughput, and excellent reliability for IT systems of all sizes. PIX and ASA Firewalls are based on a hardened, purpose-built operating system, minimizing common OS-specific security gaps.

  • SentinelOne Malware Forensics Experts Computer Engineer Award Winning SentinelOne Endpoint Virus Immunization Consultant
  • Services Documentation IT Consultants Support Outsourcing Service Database
  • Supplemetary IT Staffing for Network Service Organizations Cambridge Cambridge Cambridge Supplemetary IT Staffing Support Services

  • ProSight Duo MFA Technical Consultant
    Identity Verification Support

    Progent's Duo managed services utilize Cisco's Duo cloud technology to defend against compromised passwords by using two-factor authentication (2FA). Duo supports single-tap identity confirmation with iOS, Google Android, and other out-of-band devices.

  • Top Consultants Microsoft Exchange 2010 Microsoft Exchange Server Network Consultants
  • Wave 2 wireless controller Technical Support 9800-40 wireless controller IT Consultant
  • Windows Security IT Consultants Cambridge Massachusetts PC Consulting Help Desk Cambridge Massachusetts

  • © 2002-2025 Progent Corporation. All rights reserved.