Critical action checklist when faced with a Ransomware attack

For many years, the cybersecurity community has been “it’s not if you’ll be attacked, but when.” This is particularly relevant as ransomware continues to pose a significant risk to organizations. Recent attacks no longer encrypt data but focus on extracting ransom for destruction of the stolen data. These human-operated ransomware attacks often take advantage of security weaknesses such as poorly configured remote desktop protocol (RDP) or inadequate identity and access management (IAM) practices, sometimes utilizing previously compromised credentials obtained through dark web data dumps.

The impact of such attacks has increased leading some organizations out of business. Information Security leaders must ensure that adequate time, budget and effort are allocated to prepare, defend and prevent an incident, while also conducting the requisite detection, response and recovery activities.

Construct a Pre-incident Preparation Strategy

  • Assume a ransomware attack will be successful and ensure that the organization is prepared to detect, contain and recover quickly.
  • A good backup process and strategy is the primary line of defense for data recovery.
  • Educate employees about phishing and social engineering to minimize human error.
  • Implement comprehensive security hygiene measures to ensure consistent and continuous assessment of deployed security controls. Remove unnecessary administrative privileges and access to sensitive business applications to prevent account compromise.

Implement Detection and Response Measures

  • Utilize advanced tools like SIEM, NDR and EDR to detect and respond to ransomware indications.
  • Employ isolation techniques during incidents, using on-device functionality or network-based measures to limit the spread.
  • Regularly monitor for changes in backup routines or authorized alterations in system configurations to detect potential breaches.

Build Per-incident and Post-incident Response Procedures

  • Establish comprehensive incident response plans that include IT and communication strategies for internal staff and external parties.
  • Conduct regular tabletop exercises to practice both business and technical response strategies.

Develop a ransomware playbook outlining specific steps for handling ransomware incidents, from data recovery to making critical decisions like whether to pay ransoms. Engage specialist response teams and third-party negotiation services when necessary.

The tactical recovery steps will vary, depending on the organization and the extent of the ransomware, but will involve:

  • Recovery of the data from backups, including verifying the integrity of backup and understanding the data, if any, has been lost.
  • Once compromised, using EPP and EDR solutions, as part of the remediation response to remove and isolate the threat.
  • Validation of the integrity of a device before it is allowed back onto the network.
  • Updating or removing compromised credentials. Without this, the attacker will be able to gain entry again.
  • Performing a thorough root cause analysis of what happened and how to include accounting for any data that has been exfiltrated.
  • Guidance on making a “pay/no-pay” decision should also be included.
  • Should payment be a consideration, it is important to establish a governance and legal process that includes the senior leadership and the board.
Dhananjay Khanna
Dhananjay Khanna
Chief Information Security Offier
SBI Card
- Advertisement -

Disclaimer: The views expressed in this feature article are of the author. This is not meant to be an advisory to purchase or invest in products, services or solutions of a particular type or, those promoted and sold by a particular company, their legal subsidiary in India or their channel partners. No warranty or any other liability is either expressed or implied.
Reproduction or Copying in part or whole is not permitted unless approved by author.
To explore more insights from CISOs across South Asia, download your copy of the CISO Handbook today.
CISO handbook
CISO handbook – Strategic Cyber Vision, encapsulates point of views of 60+ CISOs and cybersecurity leaders across South Asia, highlighting the best practices, impact of AI and the cybersecurity landscape.
Download Now

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles

error: Content is protected !!

Sign Up for CXO Digital Pulse Newsletters

Sign Up for CXO Digital Pulse Newsletters to Download the Research Report

Sign Up for CXO Digital Pulse Newsletters to Download the Coffee Table Book

Sign Up for CXO Digital Pulse Newsletters to Download the Vision 2023 Research Report

Download 8 Key Insights for Manufacturing for 2023 Report

Sign Up for CISO Handbook 2023

Download India’s Cybersecurity Outlook 2023 Report

Unlock Exclusive Insights: Access the article

Download CIO VISION 2024 Report

Share your details to download the report

Share your details to download the CISO Handbook 2024

Fill your details to Watch