Overview of Progent's Ransomware Forensics Investigation and Reporting in San Rafael
Progent's ransomware forensics experts can capture the evidence of a ransomware attack and perform a comprehensive forensics analysis without interfering with the processes required for business resumption and data restoration. Your San Rafael business can utilize Progent's post-attack ransomware forensics report to block subsequent ransomware attacks, validate the restoration of encrypted data, and comply with insurance carrier and regulatory mandates.
Ransomware forensics investigation involves determining and documenting the ransomware assault's storyline across the network from beginning to end. This history of the way a ransomware attack travelled within the network helps you to assess the impact and uncovers vulnerabilities in policies or processes that need to be corrected to prevent future breaches. Forensic analysis is commonly given a high priority by the insurance carrier and is typically mandated by government and industry regulations. Since forensics can be time consuming, it is critical that other important activities like operational resumption are pursued in parallel. Progent has a large team of information technology and data security professionals with the knowledge and experience needed to carry out activities for containment, business continuity, and data recovery without interfering with forensics.
Ransomware forensics is arduous and calls for intimate interaction with the groups assigned to data restoration and, if needed, payment talks with the ransomware threat actor. Ransomware forensics can involve the examination of logs, registry, Group Policy Object, Active Directory (AD), DNS servers, routers, firewalls, schedulers, and core Windows systems to detect changes.
Activities associated with forensics investigation include:
- Isolate but avoid shutting down all potentially suspect devices from the system. This can require closing all RDP ports and Internet connected network-attached storage, modifying admin credentials and user PWs, and configuring two-factor authentication to protect backups.
- Copy forensically sound digital images of all exposed devices so the file restoration group can get started
- Preserve firewall, virtual private network, and other key logs as soon as possible
- Identify the type of ransomware used in the attack
- Examine every machine and data store on the network including cloud-hosted storage for signs of compromise
- Inventory all compromised devices
- Establish the kind of ransomware involved in the attack
- Study log activity and sessions in order to determine the timeline of the attack and to identify any potential lateral migration from the first infected system
- Understand the security gaps exploited to carry out the ransomware assault
- Search for the creation of executables surrounding the first encrypted files or network breach
- Parse Outlook web archives
- Analyze attachments
- Separate any URLs embedded in messages and determine if they are malware
- Produce extensive incident documentation to satisfy your insurance carrier and compliance requirements
- Suggest recommended improvements to shore up security gaps and improve processes that reduce the risk of a future ransomware exploit
Progent's Qualifications
Progent has delivered remote and onsite IT services across the U.S. for over 20 years and has been awarded Microsoft's Partner designation in the Datacenter and Cloud Productivity competencies. Progent's team of SMEs includes professionals who have been awarded high-level certifications in foundation technologies including Cisco infrastructure, VMware, and popular Linux distros. Progent's cybersecurity consultants have earned industry-recognized certifications including CISM, CISSP-ISSAP, and GIAC. (Refer to Progent's certifications). Progent also offers top-tier support in financial management and ERP software. This broad array of skills allows Progent to salvage and consolidate the surviving pieces of your information system following a ransomware intrusion and rebuild them rapidly into a functioning system. Progent has collaborated with top cyber insurance carriers including Chubb to help businesses recover from ransomware attacks.
Contact Progent about Ransomware Forensics Services in San Rafael
To learn more about how Progent can help your San Rafael organization with ransomware forensics investigation, call 1-800-462-8800 or see Contact Progent.