Template
Template
Playbook Template
Version 1.4 – November 8, 2019
1001 North Fairfax Street, Suite 600 ♦ Alexandria, VA 22314-1798 ♦ ph: 703.838.1810 ♦ fax: 703.683.6296
web: www.nmfta.org ♦ email: [email protected]
Table of Contents
1. Introduction ............................................................................................................ 1
2. Playbook Methodology............................................................................................ 1
3. Resilience ................................................................................................................ 2
4. Malware Defenses ................................................................................................... 3
5. MITRE ATT&CK ........................................................................................................ 6
6. Malware Indicators of Compromise (IOC)................................................................. 7
7. Emergency Network Isolation Procedures ................................................................ 8
8. Communication Templates ...................................................................................... 9
9. Playbook ............................................................................................................... 10
Detection Phase Roles, Responsibilities, and Actions ............................................................... 13
Analysis Phase Roles, Responsibilities, and Actions ................................................................. 14
Containment Phase Roles, Responsibilities, and Actions .......................................................... 16
Eradication Phase Roles, Responsibilities, and Actions ............................................................ 18
Recovery Phase Roles, Responsibilities, and Actions ................................................................ 20
Post-Incident Phase Roles, Responsibilities, and Actions ......................................................... 21
2. Playbook Methodology
The main goal of this ransomware playbook is to help organizations develop their own playbook to be
able to contain, eradicate, and recover from a malicious infection as quickly as possible. The structure
of the playbook is based on National Institute of Standards and Technology (NIST) SP 800-61 Computer
Security Event Handling Guide. This document outlines the NIST recommendations for security incident
handling policy, plans, and procedures.
According to Cybersecurity and Infrastructure Security Agency (CISA) United States Computer
Emergency Readiness Team (US CERT) the definition of a cybersecurity incident is
“
[…] the act of violating an explicit or implied security policy”. This definition relies on the existence
of a security policy that, while generally understood, varies among organizations.
1 https://www.us-cert.gov/government-users/compliance-and-reporting/incident-definition
1
3. Resilience
Resilience is an organization’s ability to prepare for, respond to and rapidly recover from an adverse
event. Resilience is a key overarching concept when defending against not only ransomware attacks
but also building a strong and robust business process model. A ransomware attack is fundamentally a
test of your organization’s resilience or, phrased differently, a test of your organizations reliance on
specific computer systems. In a medium to large organization, a single workstation being impacted by
ransomware is probably not major issue unless the workstation is the one used for payroll or cutting
checks. If, however, entire groups of workstations and laptops are affected or entire systems such as
freight logistics, warehouse operations, driver communications, pickup/delivery scanning systems, etc.
are knocked out, this can become a critical business event.
Take the time to walk through your day to day business operations and identify each and every
business process and the systems they use to evaluate the impact on your business if that system were
to be unavailable. What is the backup plan? Do you have alternate operating procedures? How do you
meet your business operation needs without that piece of equipment or computer system? For
example, if your entire server infrastructure is on a specific cloud provider, what do you do if that cloud
provider has a major outage? What if the driver tablet/scanner used to record receipt and delivery of
freight becomes unavailable? If the answer is that you don’t have any alternatives or backup plans then
you have a very fragile operation which is very susceptible to major disruption.
One of key aspects of good resilience is making preparations before an event. For ransomware this
means hardening systems and business processes in anticipation of an event. First, harden your
environment. The following section goes into more details on some of steps that you can take to
harden your environment against a ransomware attack. Then, develop the tools, documentation,
processes, and policies before an event takes place so that everyone knows who is responsible for
doing what and how to do it. This will help reduce the business impact of the event.
Resilience is a broad and rich area of study and full coverage is outside the scope of this document but
it is an area well worth exploring. The U.S. Department of Homeland Security’s Cyber Infrastructure
and Security Agency offers a free Cyber Resilience Review (CRR) here https://www.us-
cert.gov/resources/assessments. Cybersecurity firm Mitre’s Cyber Resiliency Engineering Framework can be
viewed here https://www.mitre.org/publications/technical-papers/cyber-resiliency-engineering-
framework.
Some specific lessons learned from the ransomware attack that simultaneously affected 22 Texas
municipalities can be found here. To read more about how Lubbock County, TX avoided being the 23rd
victim, see this article.
2
4. Malware Defenses
Good malware defenses help eliminate or reduce the impact of a ransomware event across the
enterprise. The starting point is good general cyber hygiene. In order to better protect and detect
malware events, risk strategy should be to implement defense in depth in accordance with Center for
Internet Security (CIS) Control benchmarks identified below as well as other industry recommendations
such as the FireEye white paper on Ransomware Protection and Containment Strategies (Appendix A)
and other best practices that are incorporated into network design, configuration, operational
procedures and security policies:
In addition to the CIS controls, there are additional steps that should be taken to help reduce risks of
ransomware and mitigate the impact.
• Network segmentation between workstations (in most cases workstations do not need to
communicate or connect to each other)
• Network segmentation between workstations and production systems
• Regular vulnerability scanning and patching
• Workstation lockdown and configuration (See FireEye report in Appendix A)
3
• Whitelist and lockdown remote workstation and server access (RDP)
• Map out and document physical network isolation mechanisms
• Maintain a dynamic and frequently updated listing of active network endpoints and ports
• Close all unnecessary network endpoint ports/services and restrict local admin rights
• End user training to learn to recognize the threat that malicious email and USB drives pose to
the enterprise
• Please see Appendix B (US Gov - Ransomware Prevention and Response for CISOs) for
additional tips and suggestions on how to improve defenses.
The strategy should also include multiple backup and backup storage methods which can be combined
to increase the probability that the impact can be minimized to the maximum extent possible. The
following are some backup and storage methods:
• Full machine snapshot backups with key data servers backed up every few hours and more
static data repositories backed up daily.
• Versioned replication of critical data backup sets between physical sites.
• Weekly rotating offline cold backup sets pulled from the online backups.
• SAN disk storage appliance snapshots including snapshots every two hours for critical server
data. These are separate from other backups and are self-contained on the SAN appliance
making them very difficult to attack and infect/destroy.
• Standardized offline base images for all workstations and servers allowing for fast wipe and
reimaging of all user workstations and servers for faster recovery times.
Cyber Kill Chain
Before an organization can defend and recover from a malware event, it is important to understand
how such attacks occur. The Cyber Kill Chain® , developed by Lockheed Martin2, is a useful construct
for analyzing the patterns of an attack and identifying key points in time where an attack can be
stopped. The earlier in the chain you are able to contain the attack the less damage will be incurred. In
general the cyber kill chain is broken down into seven steps:
Reconnaissance – Performing both active and passive information collection about the target
such as networks, architecture, layout, systems, personnel, contractors, etc. The purpose of the
reconnaissance is to find vulnerabilities and weaknesses in the defenses of the target to map
out the best attack vector.
Weaponization – Developing a weapon (Malware, exploit code, etc.) to use against an
identified vulnerability and weakness in the target.
Delivery – Delivering the weapon to the target through email, website drive-by download, or
directly accessing systems or networks.
2 https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html
4
Exploitation – Compromise the targeted system or machine using the delivered weapon and
gaining control of the device. Once a foot hold has been established the attacker may attempt
to obtain additional privileges, obtain password hashes, etc. to get enough permissions to
persist
Installation – The attacker installs web shells, back doors, or other tools to bypass security
mechanisms and obtain persistent remote access. This may also include the installation of
malware such as ransomware to be launched at some time in the future.
Command and Control – Remote access tools establish connections to outside command and
control servers which allows the attacker to perform actions on the compromised network such
as download of encryption keys before encrypting the files in a ransomware attack.
Action on Objectives – The attacker achieves their end goal such as exfiltration of sensitive
information or, in the case of a targeted ransomware attack, encrypt computers and wipe out
online backups to enable the extortion of the targeted victim. It can also include reinfection
during which the attacker activates other types of malware distributed during the initial attack
to re-infect machines and/or servers.
The event sequence for a basic ransomware attack to be successful would be as follows:
A. (Reconnaissance) The threat actor identifies a suitable target (you) and begins to collect data
about your organization, it’s IT networks, and cybersecurity vulnerabilities your organization
may be susceptible to
B. (Weaponization) The threat actor develops a piece of malware tailored to your environment.
This may be a new piece of malware or a modified version of existing malware
C. (Delivery) A “ransomware” file is delivered, this can occur via:
o Attachments of web links or files in phishing emails;
o Malicious Web pages containing embedded files; or
o Malicious manual or automatic downloads;
D. (Exploitation) Once successfully delivered, the payload is executed on the end device
E. (Installation) Once executed, the file installs malicious software (ransomware) on the machine
F. (Installation) The ransomware then generates a unique key pair to encrypt and decrypt files
G. (Command and Control) The decryption key is uploaded to a secure server in a location the
attacker knows
H. (Action or Objective) The malware executes its payload which encrypts your files and data
across the local hard disk and ANY mapped network drives or attached external storage
including USB hard drives
I. (Action or Objective) Once the files are encrypted, they are inaccessible until the proper
decryption key is presented. In certain cases even if the decryption key is obtained it may not
always work or result in recovery of the files.
Ransomware attacks are not limited to simple random file access by an unwitting end user and can be
part of a larger and more complex targeted cyber-attack. In targeted attacks, threat actors may
5
establish persistence on systems and perform reconnaissance on the network to identify and
encrypt/disable online backups and target critical servers to increase the impact of attack.
Ransomware attacks can also be used to mask other malicious activities such as business email
compromise (BEC), Personally Identifiable Information (PII) data exfiltration, data modification, wire
transfer fraud, data theft, and other criminal activity. In certain cases, such as NotPetya3, deliberately
destructive malware may masquerade as ransomware to hide the true intention of the threat actors.
In the event of a simple “click and run” attack, we can expect that the ransomware would quickly
(within seconds) attempt to do all of the following:
• Encrypt local hard disk contents
• Encrypt connected network shared drive contents (user and company file shares and storage
including anything mapped as a network drive including SharePoint, accounting systems relying
on shared file databases, etc.)
• Encrypt attached USB drives contents (USB backup drives still attached)
• Delete Windows restore points
• Disable Windows recovery
• Attempt to move laterally to infect other workstations and servers via
o vulnerabilities (e.g. the Eternal Blue 4)
o hidden administrative network shares (including domain controllers)
o USB thumb drives
o Captured or shared credentials5
In the event the attackers are resident on the network before the attack, expect them to target online
backups and as many servers and workstations as possible before executing the file encryption attack.
5. MITRE ATT&CK
The cyber kill chain does have some limitations and there are additional resources which can be used
for threat modelling. The MITRE ATT&CK6 framework goes much further, not only in defining various
steps in the process, but also provides specific examples of types of tools and tactics that are actually
being used and by whom, allowing defenders to go much further in their modelling and incident
response. The MITRE ATT&CK Enterprise Framework Matrix is available at https://attack.mitre.org/.
Additional MITRE ATT&CK resources can be found at https://attack.mitre.org/resources/. The benefit
of the MITRE ATT&CK approach as compared to the various frameworks available before is that MITRE
ATT&CK is fundamentally based on the attacker mindset and real world tools and tactics. For example,
it provides greater detailed information about the reconnaissance phase by listing a large number of
‘PRE-ATT&CK’ tactics, one of which is highlighted here:
3 https://www.wired.com/story/petya-ransomware-ukraine/
4 https://en.wikipedia.org/wiki/EternalBlue
5 Malware such as Petya used Mimekatz to try to extract credentials from compromised machines to enable lateral movement.
https://www.fireeye.com/blog/threat-research/2017/06/petya-ransomware-spreading-via-eternalblue-exploit.html
6 A foundational paper on the subject can be obtained from https://www.mitre.org/sites/default/files/publications/pr-18-0944-11-mitre-attack-
design-and-philosophy.pdf.
6
Target selection consists of an iterative
process in which an adversary determines a
target by first beginning at the strategic level
and then narrowing down operationally and
Target Selection
tactically until a specific target is chosen. A
target may be defined as an entity or object
that performs a function considered for
possible engagement or other action.
7
Additional resources can be found on the internet at Dark Reading’s at
https://www.darkreading.com/attacks-breaches/top-15-indicators-of-compromise/d/d-id/1140647
and a LinkedIn article outlining ” https://www.linkedin.com/pulse/9-great-sites-ioc-searching-ely-
kahn/. The resources available and the IOCs themselves change over time, therefore it is important to
keep up to date on the most recent and current sources for IOC. For example, based on actual attacks
in the wild, US federal agencies have recently determined that the presence of Trickbot7 and Emotet8
are good indicators that a targeted ransomware attack can be imminent.
The best early indicators of ransomware and malware can be identified by knowing your assets and
closely monitoring their behavior, performance, processes, and communication.
1) Execute a script which powers down switches and routers via PDUs
2) Execute PowerShell management scripts to shut down virtual and physical servers via server
management APIs
3) Disconnect the physical uplink connection between core switches and server switches.
4) Physically shut down core switches which connect all workstations to the network thereby
isolating all workstations from each other. (Pull the power plugs)
5) Disconnect the firewall(s) from the internet circuit. This will sever the point to point VPN
connections as well as stop any exfiltration.
6) Shutdown the specific switches and routers (pull the plug)
7) Shutdown all virtual servers and appliances including the backup system but not the monitoring
servers or security appliances required to fight the infection. Shut them down in order of
importance. For example:
a. SQL Servers
b. Exchange Servers
c. Backup Appliances
d. Application Servers
7 https://attack.mitre.org/software/S0266/
8 https://attack.mitre.org/software/S0367/
8
8. Communication Templates
Being able to quickly and effectively communicate with users and customers is essential to any incident
response scenario. It is highly recommended that pre-approved communication message templates are
created as part of any incident response planning. Being able to use pre-approved message templates
can significantly improve the effectiveness of the messaging as well as increase the speed at which the
message can be conveyed.
An example company phishing email alert from the security team to the company users can read
something like this:
Dear User:
<CompanyName> has encountered a phishing campaign seeking to trick users into /providing user
names and passwords/installing malware/installing ransomware. The phishing campaign was limited in
its scope and has been contained, however, we recommend preventative action. The email, which
resembles the wording and format below, will appear to come from an <CompanyName> employee.
[insert sample of email]
If you receive the email above, do not click on any embedded links or open attachments, instead,
delete it from your inbox. You will be advised regarding any additional required actions.
Regards,
<CompanyName> Security Office
<CompanyName> has not been impacted by the ransomware attacks reported by large companies
around the world. Our cybersecurity and IT team is aware of the threats and taking proactive measures
to protect our customer and product data.
We confirm that <CompanyName> is experiencing impact from the latest ransomware attack, along
with many other reported companies. This affects customers’ ability to access _____. We thank you for
your continued patience during this time. Our cybersecurity and IT team is taking steps to remedy the
issue as quickly as possible. <CompanyName> will provide updates as we move back to operating at
full capacity.
9
9. Playbook
Objective
This playbook has been developed to provide instructions for ransomware incident handling.
Ransomware will be detected by technical or non-technical controls implemented across the data
environment.
The business objectives for establishing such a playbook are as follows:
• Proactively manage cyber risk by being able to restore data to its last known good configuration
• Position the organization to recover as quickly as possible from a malicious ransomware attack
by identifying correct backup actions and versions (free of malware);
• Provide clear guidance and direction that will facilitate the highest degree of data integrity;
• Minimize to the greatest extent possible any disruption to business operations; and
• Preserve evidence to the extent feasible for forensic analysis
10
The following basic steps from across the phases of detection, analysis and containment should be
completed as quickly as possible to mitigate the impact of a ransomware event:
1. User reports incident
2. Get in touch with the user and collect as much information as possible:
a. Who was affected? (what individual, team, division, etc.);
b. What happened that triggered the event? (please have user be as detailed as possible)
c. Where did this occur? (people, systems, data, locations, client facing)
d. When did this happen? (timestamps and clock data)
e. Why did this happen? (what actions, precursors lead to the event); and
f. How did it happen? (ran in background, autorun, click on link or .exe)
3. Have user(s) disconnect device from network, isolate the host, and if necessary turn it off9. If
possible, collect forensic information from device before turning it off.
4. Notify all the necessary internal parties including the IT Leadership and Senior Business
Leadership
5. If the entry point (e.g. phishing email, compromised file, etc.) is identifiable and may have been
sent to more than one employee, delete all instances from servers and workstations
6. Collect the IP address, MAC addresses, and computer name of the infected system
7. Isolate physical locations and network segments using established procedure. If it is uncertain
that only one location is impacted follow procedures for both locations to safeguard system.
8. Immediately shutdown backup appliances
9. Identify, locate, and secure the latest cold offline backups and determine time gap
10. Look for alerts of indicators of compromise (IOC) that could be related
11. Look in the logs to identify similar IOCs similar across the network (lateral movement)
12. Check logs for suspicious URLs and messages
The steps above must be completed as quickly as possible. As noted they are selected from across
three of the phases of incident response: detection, analysis and containment. A more detailed list of
actions required to deal with specific ransomware events are detailed below for each relevant
stakeholder (team), and in each of the phases (detection, analysis, containment and eradication,
recovery, and post-incident) of incident response. The list of actions are not exhaustive and are only a
general representation of actions for the specific phase. Each set of actions should be reviewed and
adapted as necessary for an actual incident using a tactical mindset.
9 https://www.fbi.gov/file-repository/ransomware-prevention-and-response-for-cisos.pdf
11
In the following playbook the names of groups involved have been simplified and may not be
representational of your specific company.
End User - An employee of the organization with organization issued computer assets such as
laptops, workstations, and cell phones
IT Operations - For the purposes of this document IT Operations team is used in a general way. The
specific group names can vary depending on the size of the organization and include groups such as
help desk, IT operations staff, etc. and the tasks discussed could be split across multiple teams. In
larger organizations, this may include ticketing systems tracking end user requests.
IT Leadership – Depending on the size of the organization this could be a single person or it could
be a combination of roles such as a Chief Technology Officer, Chief Information Officer, or Chief
Information Security Officer depending on organizational structure and granted authorities.
Senior Business Leadership – This would be the business leadership group who are empowered to
make high level decisions impacting the business and communicating with the board of directors.
In small organization this could be a single individual or a full management team made up of CEO,
CFO, CIO, General Counsel, etc.
Customer Service – The group of company employees which communicated directly with
customers by operating the customer service hotline and mailboxes. In larger organizations, this
may include customer inquiry ticketing systems.
12
Detection Phase
During the ransomware incident management detection phase, teams will evaluate a potential
ransomware incident.
IT Operations
During the incident management detection phase, IT support staff will monitor calls and
emails. IT Operations staff monitors systems in accordance with established operational
policies and procedures using a task tracking system, which outlines daily, weekly, monthly,
quarterly, and annual monitoring and compliance items, to maintain a record of the activity
by recording observations and attaching supporting logs or other information.
13
Analysis Phase
During the ransomware incident management analysis phase, teams will analyze the incident to
determine the impact of the threat. Depending on the impact, a number of teams will be
involved in the remediation of the ransomware incident, and the notification of the threat will
be escalated as appropriate.
10 https://www.volatilityfoundation.org/
11 https://github.com/ufrisk/pcileech
14
IT Leadership
During the incident management analysis phase, the IT Leadership will notify and
coordinate with the relevant stakeholders and Senior Business Leadership.
15
Containment Phase
During the ransomware incident management containment phase, teams will isolate and
contain the infected device(s), servers, and storage arrays, and ensure they are not allowed
back on the network.
IT Operations
During the incident management containment phase, cybersecurity staff will document all
findings in the incident report.
16
IT Leadership
During the incident management containment phase, the IT Leadership will evaluate any
control weaknesses and make recommendations for remediation.
17
Eradication Phase
During the ransomware incident management eradication phase, teams will restore and reissue
endpoints and servers. After an incident has been contained, eradication may be necessary to
eliminate components of the incident such as deleting malware and disabling breached user
accounts as well as identifying and mitigating all vulnerabilities that were exploited. During
eradication, it is important to identify all affected hosts within the organization so that they can
be remediated. For some incidents, eradication is either not necessary or is performed during
recovery. Do not rush to get systems back online but move slowly and cautiously to ensure that
all systems are checked, proactively monitored and vetted carefully or else the risk of
reinfection is very high. Don’t forget about the firmware, e.g. bios, storage controllers,
switchers, etc.
IT Operations
During the incident management eradication phase, IT Operations staff will ensure that all
endpoints are clean and restore data and identify defense gaps in the organization.
18
IT Leadership
During the incident management eradication phase, the IT Leadership will develop any
control weakness strategies, as appropriate.
19
Recovery Phase
During the ransomware incident management recovery phase, teams will enact processes and
procedures for the recovery and full restoration of any infected endpoints or servers during the
incident. In recovery, administrators restore systems to normal operation, confirm that the
systems are functioning normally, and remediate vulnerabilities to prevent similar incidents.
IT Operations
During the incident management eradication phase, IT Operations staff will ensure that all
servers and systems are back online and restored. They will also ensure that the incident is
fully documented and findings noted.
IT Leadership
During the incident management eradication phase, the IT Leadership will evaluate any
weaknesses in security controls or policies as appropriate.
20
Post-Incident Phase
During the ransomware incident management post-incident phase, teams will perform root-
cause analysis and lessons-learned activities with various teams and stakeholders within the
organization.
IT Operations
During the incident management post-incident phase, IT Operations staff will support any
post-incident activities, as appropriate.
IT Leadership
During the incident management post-incident phase, the IT Leadership will facilitate any
post-incident activities.
21