View Categories

What To Do After You Get Hit By Ransomware

4 min read

This guide aims to help companies who have been affected by ransomware with help from Guy Edri a security researcher and ItsMine, with specific steps, tips, and best practices when it comes to dealing with the aftermath of a ransomware attack.

What To Do After You Get Hit By Ransomware

What follows is a specific, proven step-by-step approach to get you and your organization back on your feet:

  1. Disconnect internet access
  2. Isolate the potentially infected machines
  3. Run the below flow chart – time is money, and you need to get the required data fast. If information is not available, assume the worst and move to the next level
  4. Check for backup (see that this too was not hit by the ransomware)
  5. How and where: Cloud, local, etc.
  6. Run tools like https://www.nomoreransom.org/
  7. In parallel to Step 1 start negotiations with the attacker if legal. (best practice is to hire a professional negotiator)
  8. It will not just “go away” – and you have a couple of hours before the cost will most likely double
  9. To pay or not to pay? Don’t make any decisions without consulting a professional
  10. Change your mindset: can you treat this as (expensive) penetration testing?
  11. Reinstall every device that had access to the infected device while the ransomware was active
  12. Plan how to recover the systems. If there wasn’t enough segregation in the network, now is the best time to remedy that going forward
  13. Call for IR (Incident Response) services to find the point of entry, and to close the holes that let the attacker get inside

 

After You Recover From The Attack, What Should You Do Next?

  1. Protect your managed devices – use tools like Microsoft Defender – and activate the ransomware protection on the devices (whitelist the processes that allow edits to the files).
  2. More information on this from Microsoft can be found here for Windows: https://support.microsoft.com/en-us/help/4013550/windows-protect-your-pc-from-ransomware
  3. And here for Mac: https://support.apple.com/en-il/guide/mac-help/mh40596/mac
  4. Upgrade the central logs of your security product (AV, EDR, etc) to the cloud
  5. Connect your cloud and file storages to get all access logs in order to easily investigate the changed/deleted/encrypted files from a location/user/PC etc. Keep the data for forensics for at least two years.
  6. Backup your files in the cloud/file storage – make sure you do not have leftover critical data on employee endpoints
  7. Plant SoftwareMines™ to make sure that your central file storages are protected from ransomware (even if the unmanaged device was infected)
  8. Educate employees to “close the door”. Revoke access automatically to areas they do not need access to anymore – as the ransomware uses the same access the users have
  9. Make sure all the systems have been patched to the latest security updates
  10. Harden all servers/workstations
  11. Subscribe to Threat Intelligence feeds
  12. Forward all logs from Servers, FW, AV, EDR/XDR, and other devices to a central log server like Splunk/ELK, etc. If there is enough of an InfoSec budget, consider a managed SOC service
  13. Have a proper incident response plan in place and a company on call that knows the entire infrastructure
  14. Perform a full Penetration Test/Gap Analysis once every 3-6 months

The 3 Cardinal Rules

There are three main rules to bear in mind after being hit by a ransomware attack:

  1. Don’t Panic
  2. Don’t Pay immediately
  3. Communicate openly with stakeholders

Don’t Panic:

This is what the attackers want you to do. At this sensitive time, almost as much damage can be done by doing the wrong thing, than by the attack itself. There are professionals out there who deal with these attacks all the time. Don’t panic, relax those shoulders, you’re going to get through this.

Don’t Pay Immediately:

The aim of the attackers of course is to extort money from you. Despite promises to the contrary, in many cases paying won’t mean that you get access to your data again. They will threaten, they will tease, but don’t be fooled into thinking that these people play fair.

Communicate openly with stakeholders:

Update people with what is happening. You don’t have to share all information, but it’s important to keep lines of communication open – including with stakeholders such as employees, customers, suppliers, regulators, and shareholders.