๐Ÿ”’

Ransomware

Encryption-based extortion attack targeting files, databases, or entire systems with ransom demands for decryption keys.

33 runbook nodes8 lifecycle stages covered

Triage

(4 nodes)

Containment

(4 nodes)

Preservation

(4 nodes)

Collection

(4 nodes)

Analysis

(5 nodes)

Eradication

(5 nodes)

Recovery

(4 nodes)

Post-Incident Review

(3 nodes)