Crypto-Ransomware : Your Worst IT Catastrophe
Ransomware  Recovery ExpertsCrypto-Ransomware has become a too-frequent cyberplague that represents an enterprise-level danger for businesses of all sizes unprepared for an assault. Versions of ransomware such as Dharma, Fusob, Locky, NotPetya and MongoLock cryptoworms have been circulating for years and still cause damage. More recent variants of ransomware like Ryuk, Maze, Sodinokibi, Netwalker, LockBit and Nephilim, as well as more unnamed newcomers, not only perform encryption of on-line information but also infiltrate most available system protection. Files synchronized to off-premises disaster recovery sites can also be ransomed. In a vulnerable system, this can make any restore operations hopeless and effectively sets the network back to square one.

Getting back on-line services and data following a ransomware event becomes a sprint against the clock as the targeted business struggles to contain the damage, remove the crypto-ransomware, and resume mission-critical operations. Because ransomware takes time to move laterally across a network, attacks are usually sprung on weekends and holidays, when attacks are likely to take longer to identify. This multiplies the difficulty of quickly marshalling and coordinating a capable response team.

Progent has an assortment of help services for securing Chicago enterprises from ransomware penetrations. These include user education to become familiar with and not fall victim to phishing attempts, ProSight Active Security Monitoring for endpoint detection and response utilizing SentinelOne's behavior-based cyberthreat protection to identify and disable zero-day malware attacks. Progent in addition can provide the services of veteran crypto-ransomware recovery professionals with the talent and perseverance to restore a compromised network as rapidly as possible.

Progent's Ransomware Restoration Support Services
Soon after a crypto-ransomware attack, even paying the ransom in cryptocurrency does not provide any assurance that cyber hackers will respond with the keys to unencrypt any or all of your data. Kaspersky Labs determined that seventeen percent of ransomware victims never restored their data even after having sent off the ransom, resulting in more losses. The gamble is also costly. Ryuk ransoms are typically a few hundred thousand dollars. For larger organizations, the ransom demand can reach millions. The fallback is to piece back together the critical parts of your Information Technology environment. Without the availability of full system backups, this calls for a wide complement of IT skills, well-coordinated project management, and the capability to work 24x7 until the task is finished.

For two decades, Progent has made available expert Information Technology services for companies throughout the United States and has earned Microsoft's Partnership certification in the Datacenter and Cloud Productivity competencies. Progent's team of subject matter experts includes consultants who have attained advanced industry certifications in foundation technologies such as Microsoft, Cisco, VMware, and popular distributions of Linux. Progent's security experts have earned internationally-recognized certifications including CISA, CISSP-ISSAP, ISACA CRISC, SANS GIAC, and CMMC 2.0. (Visit Progent's certifications). Progent also has experience with accounting and ERP application software. This breadth of expertise provides Progent the ability to efficiently ascertain critical systems and integrate the surviving parts of your Information Technology environment following a ransomware event and assemble them into an operational network.

Progent's security group has top notch project management tools to orchestrate the complicated recovery process. Progent appreciates the urgency of acting rapidly and in unison with a customer's management and IT team members to assign priority to tasks and to put critical services back on line as fast as possible.

Business Case Study: A Successful Ransomware Penetration Recovery
A business hired Progent after their network system was crashed by the Ryuk ransomware. Ryuk is generally considered to have been deployed by North Korean government sponsored criminal gangs, suspected of using technology exposed from America's NSA organization. Ryuk seeks specific businesses with limited room for operational disruption and is one of the most profitable iterations of ransomware viruses. Well Known organizations include Data Resolution, a California-based information warehousing and cloud computing company, and the Chicago Tribune. Progent's customer is a regional manufacturing business located in Chicago and has around 500 staff members. The Ryuk intrusion had frozen all essential operations and manufacturing capabilities. Most of the client's information backups had been online at the start of the attack and were destroyed. The client was pursuing financing for paying the ransom (more than $200K) and wishfully thinking for the best, but ultimately brought in Progent.


"I can't say enough in regards to the expertise Progent gave us during the most critical time of (our) company's survival. We would have paid the Hackers if it wasn't for the confidence the Progent group afforded us. That you could get our e-mail and important applications back online faster than five days was something I thought impossible. Every single staff member I interacted with or texted at Progent was absolutely committed on getting us working again and was working day and night to bail us out."

Progent worked hand in hand the customer to rapidly understand and assign priority to the critical services that had to be recovered to make it possible to resume company functions:

  • Microsoft Active Directory
  • Microsoft Exchange
  • Accounting and Manufacturing Software
To get going, Progent adhered to ransomware penetration mitigation best practices by stopping the spread and cleaning systems of viruses. Progent then initiated the task of restoring Microsoft Active Directory, the core of enterprise networks built on Microsoft technology. Exchange messaging will not function without AD, and the client's accounting and MRP system leveraged Microsoft SQL Server, which needs Active Directory for security authorization to the information.

Within 48 hours, Progent was able to re-build Windows Active Directory to its pre-penetration state. Progent then performed reinstallations and storage recovery of needed applications. All Exchange Server ties and configuration information were usable, which greatly helped the rebuild of Exchange. Progent was able to collect local OST data files (Outlook Email Offline Data Files) on various workstations in order to recover email information. A not too old off-line backup of the customer's manufacturing software made it possible to recover these vital applications back servicing users. Although a lot of work needed to be completed to recover totally from the Ryuk event, the most important systems were returned to operations quickly:


"For the most part, the production manufacturing operation survived unscathed and we made all customer sales."

During the next month critical milestones in the recovery process were accomplished in close collaboration between Progent engineers and the client:

  • Internal web applications were restored with no loss of information.
  • The MailStore Microsoft Exchange Server containing more than four million historical emails was brought on-line and available for users.
  • CRM/Orders/Invoicing/AP/Accounts Receivables/Inventory capabilities were 100 percent functional.
  • A new Palo Alto Networks 850 security appliance was deployed.
  • Ninety percent of the user workstations were being used by staff.

"Much of what happened in the early hours is mostly a fog for me, but my team will not soon forget the urgency each and every one of your team accomplished to give us our business back. I have trusted Progent for the past ten years, possibly more, and every time I needed help Progent has shined and delivered. This event was a testament to your capabilities."

Conclusion
A probable business-killing disaster was avoided through the efforts of top-tier professionals, a broad range of IT skills, and close teamwork. Although in retrospect the crypto-ransomware attack described here would have been stopped with advanced cyber security systems and recognized best practices, staff training, and well thought out security procedures for backup and keeping systems up to date with security patches, the reality remains that state-sponsored cybercriminals from Russia, North Korea and elsewhere are relentless and will continue. If you do get hit by a ransomware incident, feel confident that Progent's roster of professionals has substantial experience in ransomware virus defense, removal, and data restoration.


"So, to Darrin, Aaron, Dan, Claude, Jesse, Arnaud, Allen, Tony and Chris (and any others who were helping), I'm grateful for making it so I could get some sleep after we got over the most critical parts. Everyone did an incredible job, and if anyone that helped is around the Chicago area, a great meal is the least I can do!"

Download the Ransomware Cleanup Case Study Datasheet
To read or download a PDF version of this case study, please click:
Progent's Ryuk Virus Recovery Case Study Datasheet. (PDF - 282 KB)

Contact Progent for Ransomware Cleanup Services in Chicago
For ransomware system restoration services in the Chicago metro area, call Progent at 800-462-8800 or see Contact Progent.



An index of content::

  • At Home Workers Chicago Guidance - Cloud Solutions Consulting and Support Services Chicago South Side Teleworkers Assistance in Chicago - Cloud Solutions Guidance Chicago West Side
  • At Home Workforce Chicago Expertise - Connectivity Solutions Consulting Services Chicago, IL Glenview, IL Work from Home Employees Expertise in Chicago - Integration Expertise
  • Aurora, Illinois Remote Workforce Consulting near Chicago - Call Desk Outsourcing Expertise Work from Home Employees Consultants nearby Chicago - Call Desk Outsourcing Guidance Gary, Indiana
  • Best Cisco Computer Support Consultant Oak Park, IL Information Technology Outsourcing Cisco Chicago South Side
  • Chicago After Hours Chicago Dharma Crypto-Ransomware Mitigation
  • Chicago At Home Workers Collaboration Systems Consulting Services Chicago, IL Telecommuters Chicago Consultants - Collaboration Systems Assistance Glenview, IL
  • Chicago Crypto Remediation Elmhurst, IL, United States Emergency Chicago Crypto-Ransomware Cleanup Help Chicago Downtown
  • Chicago Crypto-Ransomware Assault Cleanup Chicago Loop, Illinois Chicago Sodinokibi Ransomware Removal Glenview, IL
  • Chicago IT Staff Augmentation Services Englewood, IL Award Winning Temporary IT Staffing Support Services Consulting Joliet, Illinois

  • Configuration Mac unified messaging
    Mac and Outlook Web App Consultants

    Exchange Servers and Macintosh workstations can co-exist efficiently. Progent's Apple and Microsoft certified experts can show you how to install Microsoft Entourage and Microsoft Exchange Server so your Mac users can work closely with teammates who use Microsoft Outlook. With Microsoft Exchange and Entourage 2008 or 2004 for Mac, Exchange and Apple Macintosh systems can coexist, enabling Mac users to receive and send messages, examine the Exchange global address list, copy addresses, sync up calendars, and invite fellow workers to meetings with your Microsoft Exchange account. Progent will verify that your Exchange Server is appropriately configured and that WebDAV and Outlook Web connectivity are enabled. Progent also offers customized onsite Entourage training.

  • Chicago Illinois Chicago Phobos Crypto-Ransomware Restoration Chicago Crypto-Ransomware Cleanup Chicago North Side

  • Urgent Linux Consulting Services
    BSD Consulting Organization

    Progent's UNIX platform support services provide small businesses and developers assistance with managing and supporting UNIX, Linux or Solaris environments that coexist with Microsoft-based networks. Progent offers your organization access to UNIX consultants, consulting professionals certified by Microsoft and Cisco, and security specialists with CISM certification. This wide array of expertise offers you a convenient single source to show you how to create and maintain a protected and reliable cross-platform network and communications infrastructure that supports UNIX and Microsoft coexistence by integrating Windows with popular versions of UNIX such as Apple macOS and OS X, Sun Solaris, IBM AIX, HP-UX (Hewlett Packard UNIX), BSD, SCO and SGI/Irix or major Linux platforms such as RedHat, SuSE, Debian GNU/Linux and Mandrake.

  • Chicago Ransomware Forensics Oak Park, IL, United States Chicago NotPetya Crypto-Ransomware Forensics Investigation Chicago Illinois, United States
  • Chicago Ryuk Crypto-Ransomware Settlement Expertsn Chicago Avaddon Crypto-Ransomware Negotiation Help Englewood, IL, United States
  • Chicago South Side Urgent Implementation Consulting Companies Exchange Server 2010 Network Support Company Exchange Server 2016 Gary, Indiana
  • Chicago Telecommuters IP Voice Systems Expertise Chicago Illinois Work at Home Employees Guidance near me in Chicago - VoIP Technology Consulting Services Chicago, IL
  • Chicagoland BlackBerry Exchange Integration Specialists BlackBerry BPS Software Consultants Joliet, Illinois
  • Cicero, IL Chicago MongoLock Crypto-Ransomware System-Rebuild Chicago Snatch Ransomware Repair Cicero, IL
  • Cicero, IL Microsoft Remote Consulting Telecommuting Job Cisco CCIE Routing & Switching Network Engineer Job Opening Joliet, Illinois

  • Consultant CISSP Certified Cybersecurity Auditor
    CISSP Certified security Systems Engineer Consultant Services

    Progent's CISSP-certified cybersecurity consultants can help businesses of any size with any facet of information system security. Progent can help create efficient cybersecurity systems that guard a small office from advanced threats or Progent can plan, configure, and manage an end-to-end security strategy for hybrid networks that accommodate onsite, remote, and mobile users accessing IT resources spread over a mix of physical sites and various clouds.

  • Cicero, IL Work from Home Employees Chicago Guidance - Conferencing Solutions Expertise Chicago, IL Telecommuters Chicago Expertise - Video Conferencing Technology Consultants
  • Cisco Access Point Security Consulting Cisco Router Solutions Provider
  • Computer Security Protect Check Point Protect
  • Chicago Lockbit Crypto-Ransomware System-Rebuild Cook County Illinois
  • Consulting Expertise for Chicago IT Service Providers Joliet, Illinois Consulting Expertise for Chicago Network Service Companies Chicago O'Hare International ORD
  • Elgin, Illinois SQL 2012 Small Business IT Outsourcing Services Chicagoland SQL Server 2012 Information Technology Outsourcing Company

  • Engineers Exchange 2010 Upgrade
    Specialist Microsoft Exchange 2010 Migration

    Progent's Microsoft-certified engineers can provide affordable online and onsite support to carry out your upgrade to Microsoft Exchange 2010, produce extensive documentation of your new messaging system, train your network support team and end users to get them ramped up quickly on Exchange 2010, and offer continuing administrative services and technical help. Progent can also assist you to migrate from Microsoft Exchange 2010 to Exchange Server 2013 or Exchange Server 2016.

  • Englewood, IL, United States Chicago Crypto-Ransomware DopplePaymer Vulnerability Testing Chicago Crypto-Ransomware Locky Susceptibility Testing Chicago South Side
  • Exchange SE Mailbox Server Online Troubleshooting Immediate Exchange SE Upgrade Outsourcing
  • Hybrid Configuration Wizard On-site Technical Support Microsoft 365 and on-premises Exchange Technology Consulting Services
  • 24x7 Chicago Locky Crypto-Ransomware Recovery Chicago West Side
  • Immediate Engineer Windows PC Simulation on Apple macOS Windows Desktop Simulation on Apple Mac Setup and Support
  • MS Dynamics GP Gold Partner near Chicago - Migration Support Services Cicero, IL Gary, Indiana Chicago Microsoft Dynamics GP-Software Migration Help
  • Manager Chicago-Cook County Chicago, Illinois Small Business Computer Consulting Companies
  • Microsoft, Cisco and Security Certified Experts Chicago-Cook County Network Consulting Organization Microsoft and Cisco Chicago, Illinois Networking Consultancy Services
  • Naperville, Illinois Work from Home Employees Chicago Guidance - Backup/Recovery Systems Consulting Experts After Hours At Home Workforce Chicago Consulting and Support Services - Backup/Recovery Solutions Consulting and Support Services Chicago, IL, United States
  • Ransomware Hot Line Elmhurst, IL Ransomware Cleanup and Recovery Chicago Loop, Illinois
  • Red Hat Linux, Sun Solaris, UNIX Integration Support Gentoo Linux, Sun Solaris, UNIX Setup and Support Elgin, Illinois
  • Chicago Lockbit Ransomware System-Rebuild Chicago West Side, United States
  • Remote Workforce Expertise nearby Chicago - Infrastructure Assistance Elmhurst, IL Chicago At Home Workforce Setup Assistance

  • Outsourcing Hyper-V 3.0 Virtual
    Specialists Microsoft Hyper-V 3.0 Server Virtualization

    Widows Server 2012 R2 Hyper-V improves server virtualization in important areas including secure multitenancy, flexible network infrastructure, cloud support, expandability and throughput, and high availability. Progent's Microsoft-certified consultants can assist your business to benefit from Hyper-V to install and manage virtual servers to cut network costs and enhance availability.

  • Security Security Audits Cicero, IL Network Consultant Security Chicago O'Hare International ORD
  • Chicago Spora Crypto-Ransomware Remediation Cicero, IL
  • SharePoint On-site Technical Support Chicago Illinois Microsoft SharePoint Server 2007 On-site Support Berwyn, IL
  • Chicago Avaddon Ransomware Mitigation Chicago Loop, Illinois
  • Shared Computer Support Help Desk Specialist Online Technical Support Co-managed Support Desk
  • Telecommuters Guidance nearby Chicago - Management Systems Consulting Experts Chicago Offsite Workforce Endpoint Management Tools Consulting Experts Naperville, Illinois
  • Teleworkers Chicago Assistance - Security Systems Expertise Chicago Downtown Chicago Work at Home Employees Network Security Systems Consulting Experts
  • Top Georgia Migration Largest New York Computer Firms
  • Windows Server 2016 Integration Company Windows Server 2012 R2 Specialists Chicagoland

  • Nephilim ransomware recovery Consultant
    Specialists Netwalker ransomware recovery

    Progent's ransomware consultants can help you to evaluate your ransomware defenses, monitor and protect your network, assist with settlement negotiations with a threat actor, and rebuild a network damaged by a ransomware cryptoworm such as Ryuk, Maze, Sodinokibi, DopplePaymer, Snatch or Nephilim.

  • Windows Server 2025 Windows Defender ATP Support and Setup Windows Server 2025 Hybrid Configuration Specialists
  • macOS and Windows integration Remote Technical Support Integration Services macOS and Windows integration

  • Windows Server 2012R2 Private Cloud Network Consultants
    Windows Server 2012 R2 Active Directory Technology Professional

    Progent's certified professionals can assist you to assess the benefits of Microsoft Windows Server 2012 R2 for your organization, develop test environments and rollout plans, optimize your infrastructure for local, multi-location, cloud-based, and partial-cloud datacenters, educate your IT support, staff, create an enterprise-wide security plan, automate network administration, assist with application development, and generate and test a DR/BC plan.


    © 2002-2025 Progent Corporation. All rights reserved.