Handling Ransomware Flashcards

1
Q

Describe how you would handle a situation where you detect a potential ransomware attack in progress within a client’s network. What are the key steps you would take from detection to resolution?

write it down and go through each step!

A
  • Rapid Incident Assessment
  • Immediate Escalation and Communication
  • Isolation and Containment
  • Investigate and Identify the Vector
  • Deploy Emergency Security Measures
  • Collect and Preserve Evidence
  • Activate Disaster Recovery and Business Continuity Plans
  • Analyze and Understand the Ransomware
  • Threat Eradication and System Restoration
  • Enhance Defenses and Monitor for Re-Infection
  • Post-Incident Analysis and Reporting
  • Client Communication and Support
  • Review and Update Policies and Procedures
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why is it important to understand which ransomware variant was used in the attack?

A
  • Behavior Understanding
    • some may simply encrypt files, while others might also exfiltrate data, spread laterally across networks, or even attempt to disable backup systems
  • Decryption Possibilities
    • sometimes decryption tools are available for specific ransomware types
  • Vulnerability Exploitation
    • identifying the ransomware helps in understanding which vulnerabilities were exploited and need to be patched
  • IOC (Indicator of Compromise) Identification
    • identifying the type helps in effectively searching for these IOCs across the network to ensure complete eradication
  • Forensic Analysis
    • knowing the ransomware type aids in forensic analysis, helping understand the attack vector, impact, and potential data breach extents
  • Informing Stakeholders
    • important for both internal and external communication, especially when dealing with legal, regulatory, and public relations aspects
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly