The initial response to a ransomware attack is crucial for determining the damage in terms of downtime, costs, data loss and company reputation. The sooner you detect the activity associated with ransomware, the sooner you can slow its spread. From there, you can take remedial actions to significantly reduce the effects of the attack.
In this blog, we’ll outline key steps organizations should take during the first 48 hours after a ransomware infection is detected. We’ll link to a recent Progress Flowmon webinar on the topic that also discusses how national recommendations and regulatory frameworks, such as NIST and NIS2, provide guidance on cyber responses. The webinar outlines how Flowmon solutions can help with early detection and response to ransomware attacks.
Before we dive in, it’s worth emphasizing that ransomware is still a significant threat to any organization. Therefore, it’s reasonable to say that it’s not if you will suffer a ransomware attack but when.
Reported or recorded ransomware attacks each year are still running into the hundreds of millions. For infected organizations, the average recovery costs can total millions of dollars for ransom payments and operational recovery costs. Even if an organization doesn’t pay a ransom, there are still significant recovery costs.
In addition to the direct impact of data encryption, the cybercriminals behind these attacks use their illicit access to copy and steal data before triggering encryption. The 2023 Verizon Data Breach Investigations report concluded that 25% of all data breaches were part of a broader ransomware attack.
Greatly reducing ransomware infections is the ideal scenario. But in the real world, people make mistakes and bad actors exploit systems with zero-day vulnerabilities. With this in mind, it is crucial to deploy solutions capable of detecting anomalies early.
Once you detect a ransomware attack on your network, there are actions that should be taken immediately (within two hours), rapidly (within six hours) and continuously throughout the first 24 to 48 hours.
For the first 48 hours, communication between internal and external stakeholders is vital to the response. The technical response team should communicate so that everyone knows their responsibilities and what is happening. There should be designated contact points between the internal team and any external cybersecurity vendors or service providers they work with.
Additionally, this team needs to communicate with management at all organizational levels so that staff understands the situation and the projected time for a return to business-as-usual operations.
Staff should also know that they cannot discuss what is happening with anyone outside their group within the organization, and especially not with anyone external. Staff members should understand that they can escalate any questions about what’s happening to management or to the business’s PR team to handle. Reputation management is crucial to the long-term recovery process after a ransomware attack.
Here are the three most important steps your IT team needs to take within the first two hours after the detection of ransomware activity. Don’t wait two hours to do them and follow these steps as soon as possible.
After the three immediate actions outlined above, your IT team should perform the following action items within the first six hours.
After the immediate and rapid response actions, there will need to be a concerted effort over the next 24 to 48 hours to remove the infection and recover from its impact. In some severe ransomware incidents, full recovery can take longer than 48 hours. However, these first two days are crucial.
Roman Cupka, Senior Principal Solution Consultant, and Filip Cerny, Flowmon Product Marketing Manager, discussed these topics in a recent webinar. You can access it via YouTube.
The webinar also covers what an organization should do after a ransomware incident to help reduce the risks of future attacks. It also highlights how Flowmon solutions assist you with network monitoring and early detection of attacks to help reduce the damage.
We’ll cover these additional threat response-related topics in a follow-up post.
Visit the Flowmon platform page for details of the current Flowmon release and the Flowmon ADS page for information on our extensive and efficient network anomaly detection system. Contact us to talk with an expert on how Flowmon can help defend your networks from ransomware and other threats.
To learn how Flowmon can deliver actionable network insights for your organization in minutes, request a free 30-day free trial . Our support team can assist during your free trial testing. Use the contact page to start a conversation with the support team.
View all posts from Filip Cerny on the Progress blog. Connect with us about all things application development and deployment, data integration and digital business.
Let our experts teach you how to use Sitefinity's best-in-class features to deliver compelling digital experiences.
Learn MoreSubscribe to get all the news, info and tutorials you need to build better business apps and sites