What would you do if you found out your data has been encrypted by Ransomware? Should you consider paying the ransom to the bad guys? Do you have a plan in place?

Go to the profile of Scott Augenbaum
Scott Augenbaum on Oct 21, 2019 • 8 answer
• 0
This is one of the questions I get all the time as a Cybersecurity guy! So I want to see what you would do at your company if this happened to you. You find out your data has been encrypted by Ransomware. Should you consider paying the ransom to the bad guys? Do you have a plan in place?


We have been hit twice by Ransomware (that we know of) and each time were able to identify the infected machine and mitigate the extent of the encrypted files. Both times the attack started with our network file shares which would have been a bigger issue had we not caught it fairly early on in the encryption process. We have both on and offsite backups and were able to first locate the machine where the malware was installed, stop the encryption from continuing and restored the affected folders from backups within an hour or two. We were fortunate in both cases that it was caught early, otherwise recovery could have taken several hours or even a few days to get fully restored.

Go to the profile of Mike Gratz
Mike Gratz on Oct 21, 2019
• 1

At a previous company we had a user get hit by Ransomware via their personal email account on a company asset. It encrypted the primary hard drive and a shared mapped network drive. On the server it was stopped via endpoint protection software and we were able to restore the encrypted files from backup, however, this user had important files on their laptop that WERE NOT backed up. For a time, we discussed actually paying the ransom, but ultimately, did not since the work lost was easily recreated with a little extra work by the affected user.

Go to the profile of Tim Lefman
Tim Lefman on Oct 21, 2019
• 1

Great answers from the Pack. While Ransomware continues to be top threat to organizations and consumers, members are reminding everyone the essential role that a robust data backup process lends to mitigate this and many other risks. Even with current endpoint and other cyber security protections, Ransomware can still find its way into an organization. You best defense is to continue to educate your organization on the threats and have your data regularly backed up and secured where it can not be infected. And keep in mind that failure to have these and other best practices in place will negatively reflect on your IT organization and leadership.

Go to the profile of Dave Robinson
Dave Robinson on Oct 21, 2019
• 1

When I was an FBI Agent I always told folks not to pay the ransom for obvious reasons. However the calls continued everyday and there was a reoccurring trend. None of the companies had a good back up. Had a few examples where the backups didn’t work. Think about how long can a company survive without access to their information. The. Answer is not very long. This is called the pay and prey method. Not a good place.

Go to the profile of Scott Augenbaum
Scott Augenbaum on Oct 21, 2019
• 0

Sharing horror stories from the outside helps the business understand the need for both security and backup expenses. For the MOST part we make sure folks know that if you lose your local drive the IT response is going to be "who cares, let me re-image / replace for you". If you keep important data on a workstation drive there is positively no sympathy.

Go to the profile of Eric Herbert
Eric Herbert on Oct 23, 2019
• 0

In general, we recommend not paying the ransom to avoid becoming a frequent target. It is important to have a good backup & recovery strategy, with backups themselves protected.
First & foremost, our program begins with Education & Phish Testing to drive awareness at the user level. After that, having good detection (SIEM, SOC, etc.), end point protection (AV), hardened end point devices (remove as many admin rights as possible without hampering productivity), and DNS sinkhole configuration, and data center segmentation in place can help with quick identification and/or containment.
If ransomware still gets through all those traps, periodically testing your Security Incident Response & DR Recovery plans for this specific scenario will ensure you can respond rapidly.

Go to the profile of Shelly Moore
Shelly Moore on Oct 24, 2019
• 0

I was just in an excellent presentation at the Siouxland IT Symposium by Greg Rosenberg on Today's Threat Landscape in which he mentioned that one of the main drivers of companies opting to pay the ransoms is cyber security insurance! It's actually creating a vicious cycle.

Go to the profile of Sharon Gray
Sharon Gray on Oct 30, 2019
• 1

A year ago, my answer would have been yes - pay up, get business going and then ensure that challenge doesn't appear again. Today, my answer is no. We would restore the server from a snapshot stored away in isolation or rebuild server from ground up. We'd restore data from backup stored away in isolation or just face the consequence. In the last year we have put several practices in place to allow us to recover from such an attack.

Go to the profile of Chirag Shukla
Chirag Shukla on Mar 15, 2020
• 0