🔒 Ransomware
Encryption-based extortion attack targeting files, databases, or entire systems with ransom demands for decryption keys.
33 procedures8 lifecycle stages
Triage
(4 procedures)Bound the Investigation Timeframe
Timeframe Bounding
30min
View procedure
Identify Patient Zero (First Compromised System)
Patient Zero
60min
View procedure
Analyze Ransom Note and Variant Identification
Ransom Note Analysis
45min
View procedure
Validate the Initial Access Vector
Access Validation
45min
View procedure
Containment
(4 procedures)Network Isolation of Compromised Systems
Network Isolation
30min
View procedure
Credential and Account Lockdown
Account Lockdown
45min
View procedure
Block Active Exfiltration Pathways
Block Exfiltration
30min
View procedure
Halt Ransomware Propagation
Stop Ransomware Spread
30min
View procedure
Sponsored
Preservation
(4 procedures)Volatile Memory Capture
Memory Capture
60min
View procedure
Log Preservation and Snapshot
Log Snapshot
45min
View procedure
Preserve VSS Shadow Copies and Encryption Timing Artifacts
Ransomware Preservation
90min
View procedure
Document Chain of Custody for All Collected Evidence
Chain of Custody
30min
View procedure
Collection
(4 procedures)EDR Telemetry Collection
EDR Collection
120min
View procedure
M365 Unified Audit Log Collection
M365 UAL Collection
90min
View procedure
Identify Alternative Evidence When Primary Logs Are Missing
Missing Log Fallback
60min
View procedure
Coordinate Log Collection from Third-Party Vendors
Third-Party Logs
120min
View procedure
Analysis
(5 procedures)Lateral Movement Analysis and Mapping
Lateral Movement
120min
View procedure
Map Exfiltration Channels (HTTP, DNS, Cloud Sync)
Exfil Channels
90min
View procedure
Determine Encryption Scope and Affected Systems
Encryption Scope
90min
View procedure
Analyze Evidence of Credential Dumping Techniques
Credential Dumping
90min
View procedure
Identify Data Staging and Compression Activity
Data Staging
60min
View procedure
Eradication
(5 procedures)Remove Malware, Backdoors, and Persistence Mechanisms
Malware Removal
120min
View procedure
Mass Credential Reset and Session Invalidation
Credential Reset
90min
View procedure
Comprehensive Persistence Mechanism Sweep
Persistence Hunt
120min
View procedure
Eradication Verification Checklist
Eradication Verification
90min
View procedure
Post-Incident Configuration Hardening
Config Hardening
180min
View procedure
Recovery
(4 procedures)Assess Decryption Options (Backups, Keys, Tools)
Decryption Assessment
120min
View procedure
Rebuild Compromised Systems from Known-Good Images
System Rebuild
240min
View procedure
Validate Backup Integrity Before Restoration
Backup Validation
180min
View procedure
Phased Service Restoration with Enhanced Monitoring
Service Restoration
120min
View procedure