Flowchart Ransomware-108
Flowchart Ransomware-108
Yes
Levarage Appendix A :
Monitor alerts from processes and technologies that indicates a breach has happen Use the relavant/guidance questionaire:
1. What triggered the device encryption?
Close Malware validation Levarage Appendix B :
or is currently undergoing, Refer alerts from: Finding the malware sample -
2. How did the trigger end up on the device? checklist
1.Alerts from monitoring services such as Siem and MSSP/AW Technical Guidance
2.Log files from relevant source such as network devices,applications,etc 3. Was there an end user's action at play?
Notify external
Senior stakeholders Query
leadership as per endpoints for
briefed regulatory IOC's
requirements
Eradication
and Post-
Yes Close
Containment
Activate IR steps
Team protocol
Test
the
Decrypt files in
Decryption decryption on an
Yes Yes an offline environment,
method found? isolated file, If
If successfull?
successful?
No
No
Yes
Make
Is there a need payment via
to respond to the Is Payment worth third party to get Consult BC/DR
Yes Yes No
demand/ransom? attempting? decryption key, If plans
succssful?
No
No
No