Progent's Ransomware Forensics and Reporting in Roseville
Progent's ransomware forensics experts can preserve the evidence of a ransomware assault and carry out a comprehensive forensics analysis without slowing down activity required for business continuity and data restoration. Your Roseville organization can use Progent's forensics documentation to combat subsequent ransomware attacks, validate the recovery of lost data, and comply with insurance carrier and governmental requirements.
Ransomware forensics analysis is aimed at determining and describing the ransomware assault's storyline throughout the targeted network from start to finish. This history of how a ransomware attack travelled through the network assists you to assess the impact and uncovers vulnerabilities in rules or processes that should be corrected to prevent future breaches. Forensic analysis is typically assigned a high priority by the cyber insurance provider and is typically mandated by government and industry regulations. Because forensics can be time consuming, it is vital that other key activities like operational continuity are executed in parallel. Progent has an extensive roster of IT and data security experts with the skills required to perform activities for containment, business resumption, and data restoration without interfering with forensics.
Ransomware forensics analysis is complex and calls for intimate cooperation with the groups focused on data restoration and, if needed, settlement discussions with the ransomware adversary. forensics typically require the review of logs, registry, Group Policy Object (GPO), Active Directory (AD), DNS servers, routers, firewalls, schedulers, and basic Windows systems to look for variations.
Activities associated with forensics investigation include:
- Isolate but avoid shutting down all possibly suspect devices from the network. This can require closing all Remote Desktop Protocol (RDP) ports and Internet connected NAS storage, changing admin credentials and user passwords, and setting up 2FA to protect your backups.
- Capture forensically valid duplicates of all suspect devices so the data recovery team can get started
- Preserve firewall, virtual private network, and other key logs as quickly as feasible
- Identify the type of ransomware involved in the attack
- Survey each computer and storage device on the system including cloud-hosted storage for indications of encryption
- Inventory all compromised devices
- Establish the type of ransomware used in the attack
- Review logs and sessions in order to establish the time frame of the ransomware attack and to identify any possible sideways movement from the first infected system
- Understand the security gaps exploited to perpetrate the ransomware attack
- Search for the creation of executables associated with the original encrypted files or system compromise
- Parse Outlook PST files
- Analyze attachments
- Separate any URLs from messages and determine whether they are malicious
- Produce detailed incident documentation to satisfy your insurance and compliance requirements
- Document recommendations to close cybersecurity vulnerabilities and enforce workflows that reduce the risk of a future ransomware exploit
Progent's Background
Progent has provided remote and onsite IT services throughout the United States for over two decades and has been awarded Microsoft's Partner certification in the Datacenter and Cloud Productivity practice areas. Progent's team of SMEs includes professionals who have been awarded advanced certifications in foundation technologies including Cisco networking, VMware, and major Linux distros. Progent's cybersecurity consultants have earned internationally recognized certifications including CISM, CISSP, and GIAC. (See Progent's certifications). Progent also offers top-tier support in financial and Enterprise Resource Planning applications. This breadth of skills allows Progent to salvage and integrate the surviving pieces of your network following a ransomware intrusion and reconstruct them rapidly into an operational system. Progent has worked with leading insurance carriers like Chubb to assist organizations recover from ransomware assaults.
Contact Progent about Ransomware Forensics Investigation Services in Roseville
To find out more about how Progent can assist your Roseville organization with ransomware forensics analysis, call 1-800-462-8800 or see Contact Progent.