Ransomware Resources and Suggestions

General-purpose resources:

Prevention

  • Have off-line backups that are not connected to Active Directory.
  • Understand the implication of having your backup servers crypto-ransomwared.
  • Harden Active Directory.
  • Have a ransomware Incident Response Plan. Print this.
  • Have an up-to-date list of emergency contacts printed.
  • Keep up-to-date with the latest ransomware activities.
  • Actively defend against common initial access paths; see MITRE link above.
  • Deploy endpoint Advanced Persistent Threat (APT) detection tools.
  • Train your organization's users to spot phishing e-mails.
  • Keep all systems and web-browsers up-to-date.
  • Prioritize strict security architecture on all organizational projects.

Crypto OSINT

Tools to help you research past payments to ransomware gangs so you can potentially negotiate better:

Response

  • Locate a printed copy of your ransomware incident response plan.
  • Communicate to the appropriate people that an event has occurred.
  • In most companies, you will also open a bridge for the team to discuss things.
  • Don't slow down your first responders.
  • Get your legal counsel involved.
  • Identify the variant of ransomware.
  • Check to see if decryption tools exist.

Active Directory Clean-up Resources