- Remove infected hosts or devices from the network in order to contain the ransomware.
- Confirm with the anti-virus software or endpoint protection provider(EDR) and collect relevant evidence. By collecting key data, it’ll help enterprises understand the type of ransomware and possible intrusion methods. Then, enterprises can try to remove the malware, block the attack chain, and patch the vulnerabilities before doing system restore and data recovery operations. .
- Update critical system passwords, particularly those for network management or system access accounts that external parties can reach. This helps prevent or reduce the risk of intruders using compromised credentials to access the system and carry out unauthorized actions.
- Immediately notify relevant customers or partners to avoid losses caused by commercial fraud emails or personal fraud incidents.
Contact us for incident response service: https://teamt5.org/en/contact-us/
*Reference: https://cba.ca/ransomware-small-business
*Picture source: Unsplash
Related Post
IR Service Resources
2022.12.06
[Incident Response] 9 Key Steps to Respond to the Ransomware Incident
ransomware, ransomware attack, incident response