Handling Ransomware Flashcards
1
Q
Describe how you would handle a situation where you detect a potential ransomware attack in progress within a client’s network. What are the key steps you would take from detection to resolution?
write it down and go through each step!
A
- Rapid Incident Assessment
- Immediate Escalation and Communication
- Isolation and Containment
- Investigate and Identify the Vector
- Deploy Emergency Security Measures
- Collect and Preserve Evidence
- Activate Disaster Recovery and Business Continuity Plans
- Analyze and Understand the Ransomware
- Threat Eradication and System Restoration
- Enhance Defenses and Monitor for Re-Infection
- Post-Incident Analysis and Reporting
- Client Communication and Support
- Review and Update Policies and Procedures
2
Q
Why is it important to understand which ransomware variant was used in the attack?
A
-
Behavior Understanding
- some may simply encrypt files, while others might also exfiltrate data, spread laterally across networks, or even attempt to disable backup systems
-
Decryption Possibilities
- sometimes decryption tools are available for specific ransomware types
-
Vulnerability Exploitation
- identifying the ransomware helps in understanding which vulnerabilities were exploited and need to be patched
-
IOC (Indicator of Compromise) Identification
- identifying the type helps in effectively searching for these IOCs across the network to ensure complete eradication
-
Forensic Analysis
- knowing the ransomware type aids in forensic analysis, helping understand the attack vector, impact, and potential data breach extents
-
Informing Stakeholders
- important for both internal and external communication, especially when dealing with legal, regulatory, and public relations aspects
3
Q
A