Eradication
Remove all traces of adversary presence from the environment including malware, backdoors, persistence mechanisms, unauthorized accounts, and compromised credentials. Patch exploited vulnerabilities, revoke stolen tokens and certificates, and validate that no residual footholds remain through comprehensive sweep and verification procedures.
Remove Malware, Backdoors, and Persistence Mechanisms
P1Malware Removal
120min
View node
Mass Credential Reset and Session Invalidation
P1Credential Reset
90min
View node
Comprehensive Persistence Mechanism Sweep
P1Persistence Hunt
120min
View node
Eradication Verification Checklist
P1Eradication Verification
90min
View node
Phishing Remediation: Purge, Reset, Revoke
P1Phishing Remediation
60min
View node
Patch Exploited Vulnerabilities to Prevent Re-Compromise
P2Patch Vulnerability
60min
View node
Post-Incident Configuration Hardening
P2Config Hardening
180min
View node