Overview of Progent's Ransomware Forensics Investigation and Reporting in Anchorage
Progent's ransomware forensics experts can preserve the evidence of a ransomware attack and perform a comprehensive forensics investigation without interfering with activity related to business continuity and data restoration. Your Anchorage business can use Progent's post-attack ransomware forensics documentation to block subsequent ransomware attacks, validate the restoration of lost data, and meet insurance and regulatory reporting requirements.
Ransomware forensics involves determining and documenting the ransomware assault's progress throughout the network from start to finish. This history of how a ransomware attack travelled within the network helps your IT staff to assess the damage and highlights shortcomings in policies or processes that need to be rectified to avoid future breaches. Forensic analysis is commonly given a top priority by the cyber insurance carrier and is often mandated by government and industry regulations. Because forensics can be time consuming, it is essential that other key activities such as operational continuity are performed in parallel. Progent maintains a large team of information technology and data security experts with the knowledge and experience required to perform the work of containment, operational continuity, and data restoration without interfering with forensics.
Ransomware forensics analysis is complicated and requires close cooperation with the groups focused on data cleanup and, if needed, payment talks with the ransomware threat actor. Ransomware forensics can require the examination of logs, registry, Group Policy Object, Active Directory, DNS, routers, firewalls, scheduled tasks, and core Windows systems to look for changes.
Activities associated with forensics include:
- Disconnect without shutting down all possibly impacted devices from the system. This may require closing all RDP ports and Internet connected network-attached storage, modifying admin credentials and user passwords, and implementing 2FA to secure backups.
- Capture forensically sound duplicates of all suspect devices so the file restoration team can get started
- Preserve firewall, VPN, and other key logs as soon as feasible
- Establish the kind of ransomware involved in the attack
- Inspect each computer and data store on the network as well as cloud-hosted storage for signs of encryption
- Inventory all compromised devices
- Determine the type of ransomware used in the assault
- Review logs and sessions in order to establish the timeline of the ransomware attack and to spot any possible sideways migration from the first infected system
- Identify the attack vectors exploited to perpetrate the ransomware assault
- Look for the creation of executables associated with the first encrypted files or system breach
- Parse Outlook PST files
- Examine attachments
- Extract any URLs embedded in messages and check to see if they are malicious
- Produce detailed incident documentation to satisfy your insurance carrier and compliance mandates
- Document recommendations to close cybersecurity vulnerabilities and enforce workflows that reduce the risk of a future ransomware exploit
Progent's Background
Progent has delivered remote and on-premises network services throughout the U.S. for over two decades and has earned Microsoft's Partner designation in the Datacenter and Cloud Productivity practice areas. Progent's team of subject matter experts includes consultants who have earned advanced certifications in core technologies including Cisco networking, VMware virtualization, and popular distributions of Linux. Progent's data security experts have earned industry-recognized certifications including CISM, CISSP, and GIAC. (See Progent's certifications). Progent also offers guidance in financial and Enterprise Resource Planning application software. This scope of skills allows Progent to identify and consolidate the undamaged pieces of your network after a ransomware assault and reconstruct them rapidly into a viable system. Progent has collaborated with leading cyber insurance carriers including Chubb to assist businesses recover from ransomware attacks.
Contact Progent about Ransomware Forensics Investigation Services in Anchorage
To learn more information about how Progent can help your Anchorage business with ransomware forensics, call 1-800-462-8800 or see Contact Progent.