Ransom Playbook
Ransom Playbook
Determine the members of the Cybersecurity Incident Response Team (CSIRT) and
extended CSIRT members.
Review and rehearse cyber incident response procedures including technical and
business roles and responsibilities, and escalation to major incident management
where necessary.
Ensure appropriate access to any necessary documentation and information, including
out-of-hours access, Network Architecture Diagrams, Data Flow Diagrams and etc.
Define escalation paths.
o Incidents may start as events, or as a lower impact/severity and then increase
as more information is gathered. Establishing an escalation path is critical to
success
Define Threat and Risk Indicators and Alerting patterns within the organization’s
security information and event management (SIEM) solution.
Conduct regular awareness campaigns to highlight information security risks faced by
employees
Evaluate and secure critical system backups.
o During the initial stages of any incident, evaluate and confirm that backups
are secure and not impacted by the incident.
Identification or Detection objectives
The detection phase has the following objectives:
Use all information and IoCs available to determine if the malware is associated with
further attacks.
o e. Emotet, Trickbot, and Qakbot are often involved in Ryuk ransomware
attacks.
o If further attacks are associated, gather all additional information available
on these attacks to further the investigation.
o Review affected infrastructure for indicators of compromise derived from
the malware analysis to identify any additional compromised system(s).
Containment objectives
Contain the effects of the malware on the targeted systems
Activities may include, but are not limited to:
Eradicate objectives
Eradicate the malware from the network through agreed mitigation measures;
Recovery objectives:
Recover affected systems and services back to a Business As Usual (BUA) state.
Activities may include, but are not limited to:
Details of the cyber incident identified and remediated across the network to include timings,
type and location of incident as well as the effect on users;
Activities that were undertaken by relevant resolver groups, service providers and business
stakeholders that enabled normal business operations to be resumed;
Recommendations where any aspects of people, process or technology could be improved
across the organisation to help prevent a similar cyber incident from reoccurring, as part of a
formalised lessons identified process.