Incident Response Steps: Potential Ransomware Infection


Table of Contents

This Incident Response Cheat Sheet is for performing live analysis on a system you suspect is infected with ransomware. It is important to follow through each step in sequence as you handle an incident.

Step 1: Preparation

Top

Step 2: Identification

Typical signs of Ransomeware

Ransomware Warning message

Top

Host-based identification

Top

Step 3: Containment

Top

Step 4: Eradication

Top

Step 5: Recovery

Top

Step 6: Lessons learned

A report should be written and made available discussing the following themes:

Ensure that all parties involved in the incident handling process agree to what is written in the report. If someone strongly disagrees, they should write their own report to document the incident from their point of view.

The report(s) should be reviewed by the team and potentially upper management and discussed in a meeting held within two weeks of resuming production.

Top