Book Image

Incident Response Techniques for Ransomware Attacks

Book Image

Incident Response Techniques for Ransomware Attacks

Overview of this book

Ransomware attacks have become the strongest and most persistent threat for many companies around the globe. Building an effective incident response plan to prevent a ransomware attack is crucial and may help you avoid heavy losses. Incident Response Techniques for Ransomware Attacks is designed to help you do just that. This book starts by discussing the history of ransomware, showing you how the threat landscape has changed over the years, while also covering the process of incident response in detail. You’ll then learn how to collect and produce ransomware-related cyber threat intelligence and look at threat actor tactics, techniques, and procedures. Next, the book focuses on various forensic artifacts in order to reconstruct each stage of a human-operated ransomware attack life cycle. In the concluding chapters, you’ll get to grips with various kill chains and discover a new one: the Unified Ransomware Kill Chain. By the end of this ransomware book, you’ll be equipped with the skills you need to build an incident response strategy for all ransomware attacks.
Table of Contents (17 chapters)
1
Section 1: Getting Started with a Modern Ransomware Attack
5
Section 2: Know Your Adversary: How Ransomware Gangs Operate
9
Section 3: Practical Incident Response

Collecting data sources for an external remote service abuse investigation

First of all, we need to collect the appropriate data in order to identify the initial compromise vector. In many cases, my team already has a shortlist of techniques most likely to be used, based on an observed threat actor's behaviors. Of course, in real investigations, we usually figure out the details about the initial access technique used toward the end of the analysis, as we usually start from one of the encrypted hosts and deal with the impact. But in this and the following chapters, we'll look at artifacts step by step as if we are looking at the ransomware attack life cycle from the beginning to the end. You can always do the same analysis steps in reverse order in your real investigations.

As is the case for many ransomware incidents, there are no advanced security products installed; we'll focus on approaches and artifacts available almost always.

So, analyzing external remote...