Crypto-Ransomware : Your Worst Information Technology Catastrophe
Ransomware  Remediation ExpertsRansomware has become a modern cyber pandemic that presents an enterprise-level danger for organizations poorly prepared for an assault. Different iterations of crypto-ransomware such as Reveton, CryptoWall, Bad Rabbit, SamSam and MongoLock cryptoworms have been replicating for years and continue to inflict harm. Modern versions of crypto-ransomware like Ryuk, Maze, Sodinokibi, Netwalker, Snatch or Nephilim, along with daily unnamed newcomers, not only do encryption of online files but also infiltrate most accessible system backups. Data synched to cloud environments can also be corrupted. In a vulnerable environment, this can render automated restore operations impossible and basically knocks the network back to zero.

Getting back online programs and data after a ransomware intrusion becomes a sprint against time as the victim tries its best to stop lateral movement, remove the virus, and resume business-critical operations. Due to the fact that crypto-ransomware requires time to spread, attacks are often launched during weekends and nights, when successful penetrations typically take longer to uncover. This compounds the difficulty of rapidly marshalling and organizing a capable response team.

Progent has a variety of services for securing businesses from ransomware events. These include team training to become familiar with and not fall victim to phishing scams, ProSight Active Security Monitoring (ASM) for remote monitoring and management, along with installation of the latest generation security solutions with artificial intelligence capabilities from SentinelOne to detect and quarantine zero-day cyber attacks automatically. Progent in addition can provide the assistance of veteran ransomware recovery engineers with the track record and commitment to rebuild a compromised network as urgently as possible.

Progent's Ransomware Restoration Support Services
After a ransomware penetration, sending the ransom in cryptocurrency does not provide any assurance that merciless criminals will provide the keys to decipher any of your data. Kaspersky Labs ascertained that 17% of ransomware victims never recovered their data after having sent off the ransom, resulting in increased losses. The risk is also costly. Ryuk ransoms are typically several hundred thousand dollars. For larger organizations, the ransom demand can be in the millions. The other path is to re-install the key elements of your IT environment. Without the availability of complete system backups, this requires a wide complement of IT skills, well-coordinated team management, and the willingness to work non-stop until the recovery project is complete.

For two decades, Progent has offered professional Information Technology services for companies throughout the US and has earned Microsoft's Partnership certification status in the Datacenter and Cloud Productivity competencies. Progent's team of subject matter experts includes professionals who have earned top certifications in leading technologies like Microsoft, Cisco, VMware, and major distributions of Linux. Progent's cyber security consultants have earned internationally-recognized industry certifications including CISM, CISSP, CRISC, SANS GIAC, and CMMC 2.0. (Refer to Progent's certifications). Progent in addition has expertise in financial management and ERP application software. This breadth of experience provides Progent the ability to rapidly determine critical systems and integrate the surviving parts of your computer network system following a ransomware event and assemble them into an operational network.

Progent's recovery team has best of breed project management applications to orchestrate the sophisticated restoration process. Progent understands the urgency of acting swiftly and in unison with a customer's management and Information Technology team members to assign priority to tasks and to get critical systems back online as soon as possible.

Business Case Study: A Successful Crypto-Ransomware Penetration Recovery
A client hired Progent after their network was brought down by Ryuk crypto-ransomware. Ryuk is thought to have been created by Northern Korean state hackers, possibly using approaches leaked from America's National Security Agency. Ryuk attacks specific businesses with little or no tolerance for operational disruption and is one of the most lucrative examples of ransomware. Headline targets include Data Resolution, a California-based data warehousing and cloud computing business, and the Chicago Tribune. Progent's client is a regional manufacturer headquartered in the Chicago metro area and has around 500 workers. The Ryuk intrusion had paralyzed all business operations and manufacturing capabilities. The majority of the client's system backups had been online at the start of the intrusion and were encrypted. The client was taking steps for paying the ransom (in excess of $200,000) and wishfully thinking for good luck, but in the end engaged Progent.


"I cannot tell you enough about the care Progent gave us during the most critical time of (our) company's existence. We most likely would have paid the hackers behind this attack except for the confidence the Progent team gave us. That you could get our e-mail system and important applications back online faster than seven days was incredible. Every single staff member I worked with or texted at Progent was laser focused on getting us operational and was working 24/7 on our behalf."

Progent worked hand in hand the client to rapidly assess and prioritize the key systems that needed to be restored in order to continue departmental functions:

  • Active Directory
  • Email
  • Financials/MRP
To get going, Progent adhered to Anti-virus incident response industry best practices by halting the spread and cleaning up infected systems. Progent then started the process of rebuilding Active Directory, the foundation of enterprise environments built on Microsoft Windows technology. Exchange messaging will not operate without AD, and the client's accounting and MRP software used Microsoft SQL, which depends on Active Directory for authentication to the data.

In less than 2 days, Progent was able to recover Windows Active Directory to its pre-intrusion state. Progent then assisted with reinstallations and hard drive recovery of essential applications. All Microsoft Exchange Server ties and attributes were intact, which facilitated the restore of Exchange. Progent was also able to collect local OST data files (Outlook Off-Line Folder Files) on various desktop computers and laptops in order to recover mail information. A recent off-line backup of the client's financials/MRP software made them able to restore these essential applications back servicing users. Although major work was left to recover fully from the Ryuk attack, essential systems were recovered rapidly:


"For the most part, the production line operation was never shut down and we did not miss any customer sales."

Throughout the next couple of weeks key milestones in the restoration process were made through close cooperation between Progent team members and the client:

  • In-house web sites were returned to operation with no loss of data.
  • The MailStore Exchange Server with over 4 million archived messages was restored to operations and available for users.
  • CRM/Customer Orders/Invoices/Accounts Payable/Accounts Receivables/Inventory Control functions were fully operational.
  • A new Palo Alto 850 firewall was brought online.
  • Ninety percent of the desktop computers were functioning as before the incident.

"A huge amount of what was accomplished in the initial days is mostly a fog for me, but I will not soon forget the care all of your team accomplished to give us our business back. I have been working together with Progent for the past ten years, maybe more, and every time Progent has come through and delivered. This situation was a Herculean accomplishment."

Conclusion
A probable company-ending disaster was evaded with hard-working experts, a wide spectrum of knowledge, and close teamwork. Although upon completion of forensics the ransomware virus attack detailed here could have been shut down with up-to-date security systems and NIST Cybersecurity Framework or ISO/IEC 27001 best practices, user and IT administrator training, and well thought out incident response procedures for information backup and applying software patches, the fact remains that state-sponsored criminal cyber gangs from Russia, North Korea and elsewhere are tireless and represent an ongoing threat. If you do get hit by a ransomware attack, remember that Progent's roster of experts has substantial experience in ransomware virus defense, removal, and file recovery.


"So, to Darrin, Matt, Aaron, Claude, Jesse, Arnaud, Allen, Tony and Chris (along with others that were involved), thanks very much for allowing me to get some sleep after we got past the most critical parts. All of you did an incredible effort, and if any of your team is in the Chicago area, dinner is my treat!"

To review or download a PDF version of this customer case study, click:
Progent's Ransomware Virus Recovery Case Study Datasheet. (PDF - 282 KB)

Additional Ransomware Protection Services Available from Progent
Progent offers companies in Lincoln a variety of online monitoring and security assessment services designed to help you to reduce your vulnerability to crypto-ransomware. These services include next-generation artificial intelligence technology to detect zero-day strains of ransomware that can get past legacy signature-based security products.

  • ProSight LAN Watch: Server and Desktop Remote Monitoring
    ProSight LAN Watch is Progent's server and desktop remote monitoring service that uses advanced remote monitoring and management (RMM) techniques to help keep your network operating at peak levels by checking the health of vital computers that drive your business network. When ProSight LAN Watch detects an issue, an alarm is transmitted immediately to your specified IT management personnel and your Progent consultant so any looming problems can be addressed before they have a chance to impact productivity. Find out more about ProSight LAN Watch server and desktop remote monitoring services.

  • ProSight LAN Watch with NinjaOne RMM: Centralized RMM for Networks, Servers, and Desktops
    ProSight LAN Watch with NinjaOne RMM software delivers a centralized, cloud-driven platform for monitoring and managing your client-server infrastructure by offering tools for streamlining common tedious tasks. These can include health checking, update management, automated repairs, endpoint setup, backup and restore, A/V defense, secure remote access, built-in and custom scripts, resource inventory, endpoint profile reporting, and troubleshooting assistance. When ProSight LAN Watch with NinjaOne RMM identifies a serious incident, it transmits an alarm to your designated IT management staff and your assigned Progent consultant so that emerging problems can be taken care of before they interfere with productivity. Find out more details about ProSight LAN Watch with NinjaOne RMM server and desktop remote monitoring services.

  • ProSight WAN Watch: Infrastructure Remote Monitoring and Management
    Progent's ProSight WAN Watch is an infrastructure monitoring and management service that makes it simple and inexpensive for smaller businesses to diagram, monitor, enhance and troubleshoot their connectivity hardware like routers and switches, firewalls, and wireless controllers as well as servers, client computers and other networked devices. Using state-of-the-art RMM technology, WAN Watch ensures that network maps are kept current, captures and displays the configuration of virtually all devices connected to your network, monitors performance, and sends alerts when problems are detected. By automating time-consuming network management activities, ProSight WAN Watch can cut hours off common chores like making network diagrams, reconfiguring your network, finding devices that require important software patches, or isolating performance problems. Learn more about ProSight WAN Watch infrastructure management consulting.

  • ProSight Reporting: Real-time Reporting for Ticketing and Network Monitoring Platforms
    ProSight Reporting is an expanding line of in-depth management reporting tools designed to integrate with the industry's leading ticketing and network monitoring applications including ConnectWise Manage, ConnectWise Automate, Customer Thermometer, Auvik, and SentinelOne. ProSight Reporting incorporates Microsoft Graph and utilizes color coding to surface and contextualize critical issues such as inconsistent support follow-through or endpoints with out-of-date AVs. By exposing ticketing or network health concerns clearly and in near-real time, ProSight Reporting enhances productivity, lowers management overhead, and saves money. For details, visit ProSight Reporting for ticketing and network monitoring applications.

  • ProSight Data Protection Services (DPS): Backup and Recovery Services
    Progent has partnered with advanced backup software providers to produce ProSight Data Protection Services (DPS), a selection of subscription-based management offerings that provide backup-as-a-service (BaaS). ProSight DPS services automate and monitor your backup operations and enable non-disruptive backup and fast restoration of critical files, applications, system images, and Hyper-V and VMware virtual machines. ProSight DPS lets you recover from data loss caused by equipment breakdown, natural calamities, fire, cyber attacks such as ransomware, user error, malicious insiders, or software glitches. Managed backup services in the ProSight Data Protection Services product family include ProSight DPS Altaro VM Backup, ProSight 365 Total Backup (formerly Altaro 365 Backup), ProSight ECHO Backup based on Barracuda dedicated storage, and ProSight MSP360 Cloud and On-prem Backup. Your Progent service representative can assist you to determine which of these fully managed backup services are best suited for your network.

  • ProSight Email Guard: Inbound and Outbound Spam Filtering and Data Leakage Protection
    ProSight Email Guard is Progent's spam and virus filtering and email encryption service that uses the technology of top information security companies to deliver web-based management and comprehensive security for your inbound and outbound email. The powerful architecture of Email Guard integrates cloud-based filtering with an on-premises gateway appliance to provide complete protection against spam, viruses, Denial of Service Attacks, DHAs, and other email-borne malware. The cloud filter serves as a first line of defense and keeps the vast majority of unwanted email from making it to your network firewall. This decreases your vulnerability to external threats and saves system bandwidth and storage space. Email Guard's on-premises gateway appliance adds a deeper layer of analysis for inbound email. For outbound email, the local security gateway offers anti-virus and anti-spam protection, DLP, and email encryption. The on-premises gateway can also help Microsoft Exchange Server to track and safeguard internal email traffic that originates and ends inside your security perimeter. For more information, visit ProSight Email Guard spam filtering and data leakage protection.

  • ProSight Duo Multi-Factor Authentication: Identity Validation, Endpoint Policy Enforcement, and Secure Single Sign-on
    Progent's Duo MFA service plans incorporate Cisco's Duo technology to protect against stolen passwords through the use of two-factor authentication. Duo supports single-tap identity verification with iOS, Google Android, and other personal devices. With 2FA, whenever you sign into a protected online account and enter your password you are requested to confirm who you are on a unit that only you have and that is accessed using a different network channel. A broad selection of devices can be utilized for this added form of authentication such as an iPhone or Android or watch, a hardware token, a landline telephone, etc. You may designate multiple validation devices. For details about ProSight Duo two-factor identity authentication services, visit Duo MFA two-factor authentication services.

  • Outsourced/Co-managed Help Center: Support Desk Managed Services
    Progent's Help Center managed services allow your IT group to outsource Help Desk services to Progent or split activity for Help Desk services transparently between your internal network support resources and Progent's nationwide pool of certified IT support technicians, engineers and subject matter experts (SMEs). Progent's Co-managed Help Desk Service provides a transparent supplement to your core network support organization. Client interaction with the Help Desk, provision of technical assistance, issue escalation, ticket generation and tracking, performance measurement, and maintenance of the support database are consistent regardless of whether issues are resolved by your internal support group, by Progent's team, or a mix of the two. Learn more about Progent's outsourced/shared Help Center services.

  • Progent Active Protection Against Ransomware: AI-based Ransomware Detection and Remediation
    Progent's Active Defense Against Ransomware is an endpoint protection managed service that incorporates cutting edge behavior-based analysis technology to guard endpoint devices and servers and VMs against modern malware attacks such as ransomware and email phishing, which easily evade traditional signature-matching AV tools. Progent Active Security Monitoring services safeguard local and cloud resources and offers a single platform to automate the entire threat lifecycle including filtering, identification, mitigation, cleanup, and post-attack forensics. Key capabilities include single-click rollback using Windows VSS and real-time network-wide immunization against new threats. Read more about Progent's ransomware protection and recovery services.

  • ProSight IT Asset Management: Network Documentation Management
    ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to capture, update, retrieve and protect information about your IT infrastructure, procedures, business apps, and services. You can quickly find passwords or IP addresses and be alerted automatically about upcoming expirations of SSLs or warranties. By updating and organizing your IT infrastructure documentation, you can eliminate as much as 50% of time spent looking for critical information about your IT network. ProSight IT Asset Management features a centralized repository for holding and collaborating on all documents related to managing your network infrastructure like recommended procedures and self-service instructions. ProSight IT Asset Management also supports advanced automation for gathering and associating IT data. Whether you're making improvements, performing regular maintenance, or reacting to a crisis, ProSight IT Asset Management gets you the information you require the instant you need it. Read more about ProSight IT Asset Management service.

  • Patch Management: Software/Firmware Update Management Services
    Progent's support services for patch management offer organizations of all sizes a flexible and cost-effective alternative for evaluating, testing, scheduling, implementing, and tracking software and firmware updates to your dynamic IT system. In addition to maximizing the security and functionality of your computer environment, Progent's patch management services free up time for your IT staff to focus on more strategic initiatives and activities that deliver maximum business value from your information network. Learn more about Progent's patch management services.

  • ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
    With ProSight Virtual Hosting service, a small organization can have its key servers and apps hosted in a protected Tier III data center on a high-performance virtual machine host set up and managed by Progent's IT support experts. With the ProSight Virtual Hosting service model, the customer owns the data, the operating system platforms, and the apps. Since the system is virtualized, it can be ported immediately to an alternate hardware solution without a time-consuming and technically risky configuration procedure. With ProSight Virtual Hosting, your business is not tied one hosting provider. Find out more about ProSight Virtual Hosting services.

  • ProSight Active Security Monitoring: Endpoint Protection and Ransomware Defense
    Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) service that utilizes SentinelOne's next generation behavior-based machine learning technology to guard physical and virtual endpoint devices against new malware assaults like ransomware and file-less exploits, which easily escape legacy signature-based anti-virus tools. ProSight ASM safeguards on-premises and cloud-based resources and offers a single platform to manage the complete malware attack lifecycle including blocking, identification, containment, remediation, and forensics. Top features include single-click rollback using Windows VSS and automatic network-wide immunization against new threats. Progent is a SentinelOne Partner, dealer, and integrator. Find out more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware recovery.

  • ProSight Enhanced Security Protection (ESP): Endpoint Security and Microsoft Exchange Email Filtering
    ProSight Enhanced Security Protection services offer affordable multi-layer protection for physical servers and VMs, desktops, mobile devices, and Exchange email. ProSight ESP utilizes adaptive security and advanced heuristics for round-the-clock monitoring and reacting to security threats from all vectors. ProSight ESP offers two-way firewall protection, penetration alarms, device management, and web filtering through leading-edge technologies packaged within a single agent managed from a single control. Progent's security and virtualization consultants can help your business to plan and implement a ProSight ESP environment that meets your organization's specific requirements and that allows you achieve and demonstrate compliance with government and industry data security regulations. Progent will help you specify and configure policies that ProSight ESP will enforce, and Progent will monitor your IT environment and react to alerts that require urgent attention. Progent's consultants can also help you to install and verify a backup and restore system such as ProSight Data Protection Services (DPS) so you can get back in business rapidly from a destructive cyber attack such as ransomware. Read more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint security and Exchange filtering.
For Lincoln 24-Hour Crypto-Ransomware Recovery Consulting, contact Progent at 800-462-8800 or go to Contact Progent.