top of page

Ransomware Response Checklist


Rapid response time in isolating the infected device is critical during a malicious cyberattack. Detecting ransomware early will minimize the infection and preventing further data loss. Below are signs that ransomware has infected the system.


Identify

  • Scrambled file names or contents. Ordinarily working files aren’t opening anymore or file names/contents have been replaced with unrecognizable gibberish.

  • Ransom Note. A message appears asking for payment to unlock/decrypt your files.

  • Changed File Extensions. For example, “document.docx” changed to “document.docx.locked”.


Take Action

  1. Immediately isolate infected device by unplugging ethernet cable and disabling WIFI.

  2. If several systems or networks appear impacted, take the network offline by unplugging the power to the network equipment (switches, routers and WIFI devices).

  3. Power down the infected devices if you are unable to disconnect them from the network to avoid further spread of the ransomware infection. (Note: This could prevent retaining evidence within volatile memory. It should be carried out only if steps 1-2 are not possible.)

  4. Contact Catalyst Crew Technology to dispatch technician for onsite analysis and work to triage impacted systems for restoration and recovery.

  5. Engage with your internal and external teams and stakeholders to provide an update on the situation. Our technician will provide a plan of action.


Other key indicators of malware infection is slow system performance as malicious activity can use up CPU, disk, and network resources. Catalyst Crew Technology provides endpoint protection and health monitoring to alert and take automated actions as soon as malicious activity is detected.



Isolated backups, Network segmentation to prevent infection from spreading to critical systems, and a firewall to filter malware from the internet are foundational security controls that we provide. Contact us for more information. We'll assess your environment and provide the right solutions to increase your security posture.




Additional Information

Comments


bottom of page