Ransomware
Encryption-based extortion attack targeting files, databases, or entire systems with ransom demands for decryption keys.
Triage
4 proceduresContainment
4 proceduresP1
Network Isolation of Compromised Systems
~30 min
P1
Credential and Account Lockdown
~45 min
P1
Block Active Exfiltration Pathways
~30 min
P1
Halt Ransomware Propagation
~30 min
Sponsored
Preservation
4 proceduresCollection
4 proceduresAnalysis
5 proceduresEradication
6 proceduresP1
Remove Malware, Backdoors, and Persistence Mechanisms
~120 min
P1
Mass Credential Reset and Session Invalidation
~90 min
P1
Comprehensive Persistence Mechanism Sweep
~120 min
P1
Eradication Verification Checklist
~90 min
P1
Assume-Breach Rebuild and Identity Reset
~480 min
P2
Post-Incident Configuration Hardening
~180 min