Overview of Progent's Ransomware Forensics Investigation and Reporting in San Juan
Progent's ransomware forensics consultants can capture the system state after a ransomware attack and perform a detailed forensics investigation without interfering with activity related to operational resumption and data recovery. Your San Juan business can use Progent's post-attack forensics documentation to combat subsequent ransomware assaults, assist in the cleanup of encrypted data, and comply with insurance carrier and governmental requirements.
Ransomware forensics involves determining and describing the ransomware assault's progress throughout the targeted network from start to finish. This history of the way a ransomware attack progressed through the network assists you to evaluate the damage and highlights gaps in policies or work habits that need to be corrected to prevent later break-ins. Forensics is commonly given a high priority by the insurance carrier and is typically mandated by state and industry regulations. Because forensics can be time consuming, it is essential that other key activities such as business resumption are performed in parallel. Progent has an extensive roster of IT and security professionals with the skills needed to carry out the work of containment, operational resumption, and data restoration without interfering with forensic analysis.
Ransomware forensics is complex and calls for intimate interaction with the teams responsible for file restoration and, if necessary, payment talks with the ransomware hacker. forensics typically involve the review of all logs, registry, Group Policy Object (GPO), Active Directory (AD), DNS servers, routers, firewalls, scheduled tasks, and basic Windows systems to check for changes.
Activities involved with forensics analysis include:
- Isolate without shutting down all possibly suspect devices from the system. This may require closing all Remote Desktop Protocol (RDP) ports and Internet facing NAS storage, modifying admin credentials and user PWs, and configuring two-factor authentication to protect your backups.
- Preserve forensically valid duplicates of all suspect devices so your data restoration group can proceed
- Preserve firewall, virtual private network, and additional critical logs as soon as feasible
- Identify the kind of ransomware used in the attack
- Examine each computer and storage device on the system including cloud-hosted storage for indications of encryption
- Catalog all encrypted devices
- Determine the type of ransomware used in the attack
- Review log activity and sessions in order to determine the timeline of the assault and to identify any possible sideways migration from the first compromised machine
- Understand the attack vectors used to carry out the ransomware attack
- Look for the creation of executables surrounding the first encrypted files or network compromise
- Parse Outlook PST files
- Analyze email attachments
- Separate any URLs from email messages and check to see whether they are malicious
- Produce extensive incident reporting to satisfy your insurance carrier and compliance regulations
- Document recommendations to shore up security gaps and enforce workflows that reduce the risk of a future ransomware breach
Progent's Qualifications
Progent has delivered online and onsite network services across the United States for more than 20 years and has been awarded Microsoft's Partner designation in the Datacenter and Cloud Productivity practice areas. Progent's roster of subject matter experts includes consultants who have been awarded advanced certifications in core technology platforms such as Cisco infrastructure, VMware virtualization, and major Linux distros. Progent's data security consultants have earned internationally recognized certifications such as CISA, CISSP, and CRISC. (Refer to certifications earned by Progent consultants). Progent also offers top-tier support in financial and ERP applications. This breadth of skills allows Progent to salvage and integrate the undamaged pieces of your information system following a ransomware attack and rebuild them rapidly into an operational system. Progent has worked with leading insurance providers including Chubb to help businesses recover from ransomware attacks.
Contact Progent about Ransomware Forensics Services in San Juan
To learn more information about how Progent can assist your San Juan business with ransomware forensics investigation, call 1-800-462-8800 or see Contact Progent.