top of page
WhatsApp Image 2023-10-24 at 11.17.33.jpeg

Seize the Golden 24 Hours to Salvage Your Data

When You Fall Victim to Ransomware...

RKS eight steps to rescue data

Disconnect the infected computer from the network to prevent it from affecting other computers on the network.

Step 1.
Isolate the infected device.

There are various types of ransomware, and it is crucial to correctly identify the name of the ransomware to obtain the corresponding decryption tools.

Step 2.
Identify the type of ransomware

Anti-malware (decryption tools) or device reset may remove the ransomware, but these methods cannot restore the files. Without the necessary keys, file restoration is not possible.

Step 3.
Data recovery

Reef Knot Solutions can provide temporary hardware and software for rebuilding the server infrastructure in a completely virus-free and fully patched environment to prevent reinfection through the same vulnerabilities.

Step 4.
Rebuild the entire server infrastructure.

Reinstall and configure application servers, ensuring they are updated with the latest patches/versions.

This should be determined based on the company's Business Continuity Plan (BCP), clearly defining the most critical systems and data for prioritized recovery.

Step 5.
Restore application systems/servers.

Different businesses may have different regulatory requirements, and the need for notification within 24/48 hours depends on the level of leaked data. If customer data is involved, further reporting may be required according to the Personal Data (Privacy) Ordinance specific to different regions.

Step 6.
Notify regulatory agencies or affected individuals.

Digital forensics: Collect, analyze, and preserve digital evidence to outline detailed information about the incident, recover lost or stolen data, and provide a comprehensive and impartial investigation report.

Step 7.
Comprehensive post-attack reporting.

In the case of ransomware, attacks may occur again. In fact, experiencing a second attack is not uncommon for a company. If the vulnerabilities that initially allowed the attacker to access the system were unidentified, they could be exploited again. Benefit from Chengjie Technology's professional infrastructure team's recommendations to comprehensively improve/update security measures.

Step 8.
Infrastructure enhancement

Understanding the Situation After Falling Victim to Ransomware

Attackers first modify the ransomware code and then choose distribution methods such as email, SMS, or Active Directory (AD).

Attack Initiatio

Using a piece of code, the attacker establishes a communication channel to enable them to download additional malware to your system and assess their current access privileges.

Exploitation, Expansion, Understanding

At this stage, hackers typically demand a ransom for decryption or require victims to pay a fee to prevent their data from being leaked online.

Data Breach and Ransom

The attack is now executed, meaning the payload has been deployed, and files have been encrypted.

Activation and Encryption

The victim receives a message containing the ransom demand, including the amount, time limit, and consequences of non-compliance.

Ransom Demand

If you pay the ransom, your files should be decrypted. If you don't pay, you risk losing valuable customer data.

Payment and Recovery

Many types of ransomware are persistent, self-replicating, or resistant to removal in various ways. Nowadays, many ransomware organizations use advanced encryption forms that are nearly impossible to decrypt without the key. From a statistical perspective, ransomware attacks are likely to happen to anyone. Completely eliminating this risk is highly unlikely as ransomware attacks continue to evolve and become better at bypassing defenses. That's why it is crucial to have a well-thought-out Business Continuity Plan (BCP) in place to help with the response if a ransomware attack occurs.

How to Respond and What Measures to Take Immediately After an Attack?

Properly safeguarding data and keeping systems updated in day-to-day operations can help reduce potential vulnerabilities and be beneficial. Additionally, by eliminating vulnerable entry points in the system and developing a robust contingency plan, you can significantly reduce the likelihood of your organization suffering long-lasting impacts from ransomware.
 

bottom of page