Ransomware incidents require customized response strategies that prioritize swift containment and data availability. Ransomware actors aim to encrypt as many critical systems as possible to maximize business disruption and increase the likelihood of ransom payment. Effective ransomware response demands ongoing training, testing, and adaptation to stay ahead of constantly evolving threats.
This article outlines ransomware-specific enhancements across the incident response lifecycle – empowering teams to complement foundational incident response procedures with ransomware-focused strategies. Adopting specialized procedures, customized to your environment and risk profile, strengthens resilience when responding to ransomware incidents.
The best practices in this article are organized according to guidelines set by the National Institute of Standards and Technology (NIST) Computer Security Incident Handling Guide. Cybersecurity & Infrastructure Security Agency (CISA) resources were also used to guide recommendations towards building incident response procedures to protect and respond to ransomware incidents.
This article covers Incident Response techniques specific to Ransomware. It assumes you’ve established a basic security program including centralizing security logs in a security information event management (SIEM) tool like Blumira and defining an Incident Response Plan. To learn more about developing incident response procedures, read our article: Building Effective Incident Response Procedures.
Prepare against ransomware infections by building a security program aimed towards detecting early stages of ransomware activity. Endpoint Detection and Response (EDR) tools should be implemented to monitor for unauthorized encryption events across endpoints. Network security tools must also detect and alert on C2 beaconing in traffic logs. Backups of critical assets and data should be regularly tested and maintained for reliable restoration. Consider adding ransomware scenarios to table-top exercises for Incident Response training. Involving executive leadership during these exercises may help prepare them for situations where isolating critical assets may impose cost while recovering a severe compromise. A proactive security program focused on catching ransomware threats early, before encryption and extortion occurs, is key for minimizing business disruption.
Once a ransomware incident has been detected, incident responders should review SIEM logs to determine which systems were impacted, and immediately isolate them. In the event that several systems and/or network segments were impacted, the network may need to be taken offline to prevent further infection spread.
Refer to internal incident response policy and procedures to action on the communication plan used in response to ransomware incidents. Engage the internal and external parties identified that should be informed when a ransomware incident has been identified. External parties may include third-party incident response providers, cybersecurity insurers, and/or law enforcement agencies.
Identify and isolate infected assets to prevent the spread of infection and beacon communication from the infected host to the threat actor’s command and control (C2) infrastructure. Consider disabling administrative and Server Message Block (SMB) shares, as ransomware often exploits these pathways to distribute malware across an environment.
If an intrusion is detected and malware associated with ransomware is identified but has not yet been executed, it is critical to coordinate response efforts to swiftly contain the affected endpoints. Threat actors may monitor compromised assets for signs that their activity has been detected, if incident response activity is suspected the threat actor may then attempt to quickly deploy and execute ransomware to maximize their impact.
Preserve forensic evidence for ongoing analysis that may occur after the initial containment and recovery stage. Volatile evidence should be collected first, as this evidence can be lost as memory is overwritten and when a machine is powered-off. Memory captures are the most effective way to identify C2 beacons, as modern beacons tend to run in-memory. System images of affected devices and malware artifacts should be collected for further analysis. Preserve as much evidence as possible to provide analysts with the data they need to understand the scope of the incident.
Use the alerts generated by security tools to identify indicators of compromise that can be used to scope the affected systems and networks. Cross-reference unique identifying events in these alerts with system and network logs in the SIEM to help identify impacted assets.
The following assumptions can be made to help guide log review and analysis:
When the ransomware variant has been identified, conduct research into publicly available knowledge about that variant. A common pattern seen in ransomware incidents involves initial access via dropper malware variants like Bumblebee, IcedID, QakBot, and Dridex. Initial access groups often sell access to a compromised network. Ransomware groups then purchase access to these networks, exfiltrate data, and then extort victims into paying a ransom to prevent release of the data publicly and/or to unencrypt systems.
The following questions should be documented in the incident response report:
Incident responders should utilize a SIEM to threat hunt activities. Here are a few suggestions on what to hunt for during the timeframe of the incident:
Prioritize rebuilding systems based on the criticality of the asset to the business. In the event that an incident response team decides to revert impacted systems to backups, care must be taken to examine the backup to confirm it is clean from persistence mechanisms. For severely compromised environments, rebuilding Active Directory infrastructure may be necessary.
Password resets for all affected systems and accounts should be issued and communication to affected personnel should be sent. In some cases, data may be decrypted without paying the ransom. Decryptors for certain ransomware variants may be publically available or available from law enforcement agencies. Patch system and application vulnerabilities leveraged during the intrusion.
Caution must be exercised to ensure a ransomware incident has been fully remediated. Threat actors have been known to return to compromised environments several weeks or months later exploiting lingering persistence mechanisms or systems restored from unclean backups. Detection & analysis and the containment, eradication, & recovery phases will likely intersect with one another in an ongoing iterative process.
After an incident is resolved, conducting a post-mortem review is critical for organizations to improve security going forward. The post-mortem enables assessment of what transpired, the business impact, lessons learned, and actions to bolster defenses and response. Performing thorough post-mortems in a blameless manner is key to capitalizing on incidents to bolster an organization’s overall security posture for the future.
Harden infrastructure to mitigate the techniques identified during the analysis phase. This may include keeping systems, software, and applications up-to-date, regularly testing system backups, applying least privileges permissions, and enforcing multi-factor authentication.
Blumira’s cloud threat detection and response solution alerts your team about suspicious behavior that leads to security incidents, like ransomware incidents– and provides recommendations on next steps. Get started with Blumira by trying out our free SIEM.
Blumira can also help security teams detect malicious activity to reduce the impact of security incidents. Here are a few examples of Blumira detections on techniques mentioned in this article:
Ransomware incidents are known to cause significant disruption and damage to businesses. Here is a list of additional resources that can help you prepare and respond to ransomware incidents: