Ransomware Attack Response ๐Ÿ”ด Critical

Comprehensive incident response playbook for detecting, containing, eradicating, and recovering from ransomware attacks. Covers all phases from initial alert through post-incident review. Aligns with NIST SP 800-61 and MITRE ATT&CK framework.

๐Ÿ†” CV-PLB-001
๐Ÿ“… Last updated: Jan 15, 2025
โฑ๏ธ Est. completion: 2โ€“8 hours
๐Ÿ‘ฅ Teams: SOC, IR, IT Ops, Legal
โšก
12
Total Steps
๐Ÿ“‹
4
Response Phases
โœ…
38
Success Rate (%)
๐Ÿ”„
47x
Times Executed
1
Detection & Triage
โฑ๏ธ 0โ€“15 min
1.1
Verify the ransomware alert
SOC Analyst
โ–ผ

Confirm the alert is a true positive. Check for indicators of compromise (IOCs) including file extensions, ransom notes, and unusual process behavior.

$ Get-ChildItem -Path "C:\" -Recurse -Include "*.encrypted","*.locked","*.crypt" -ErrorAction SilentlyContinue | Select-Object -First 10 FullName
$ Get-Process | Where-Object { $_.CPU -gt 80 -or $_.WorkingSet64 -gt 500MB } | Format-Table Name, Id, CPU, WorkingSet64
  • Alert received from EDR/XDR platform
  • IOCs confirmed on affected endpoint
  • Ransom note or decryption file found
  • File encryption activity verified via logs
1.2
Determine scope of infection
SOC Lead
โ–ผ

Identify all potentially affected systems across the network. Search SIEM and EDR for related IOCs, lateral movement indicators, and unusual admin activities.

$ Get-WinEvent -LogName Security | Where-Object { $_.Id -in @(4624, 4625, 4672) } | Select-Object TimeCreated, Id, Message | Format-Table -AutoSize
โ„น๏ธ

Cross-reference IOCs with threat intelligence feeds. Check for known ransomware variants: LockBit, BlackCat, Conti, REvil.

1.3
Classify severity and activate IR team
SOC Manager
โ–ผ

Based on scope assessment, classify the incident and trigger the appropriate response level.

๐Ÿšจ Escalation Matrix
L1: Single endpoint โ€” SOC Team handles
L2: Multiple endpoints / servers โ€” IR Team activated
L3: Critical systems / data at risk โ€” Executive notification required
2
Containment
โฑ๏ธ 15โ€“60 min
2.1
Isolate affected systems immediately
IR Team Lead
โ–ผ

Disconnect infected systems from the network to prevent lateral movement. Do NOT power off โ€” preserve RAM for forensic analysis.

$ # NetworkIsolate the affected hosts via EDR console # Or manually: Disable-NetAdapter -Name "Ethernet" -Confirm:$false Disable-NetAdapter -Name "Wi-Fi" -Confirm:$false
โš ๏ธ

DO NOT power off infected machines. Memory may contain encryption keys or volatile evidence. Use network isolation only.

2.2
Block attacker IOCs at perimeter
Network Security
โ–ผ

Update firewall rules, DNS sinkholes, and proxy blocklists with identified IOCs. Block C2 communication channels.

$ # Block identified C2 domains via DNS firewall Set-DnsServerZone -ZoneName "*.malicious-c2-domain.com" -ZoneFile "sinkhole.dns" # Update firewall deny rules New-NetFirewallRule -DisplayName "Block C2 IP" -Direction Outbound -RemoteAddress 185.220.101.0/24 -Action Block
2.3
Disable compromised credentials
Identity Team
โ–ผ

Identify and disable all potentially compromised accounts. Force password resets and revoke active sessions.

  • Identify compromised accounts via log analysis
  • Disable accounts in Active Directory / Identity Provider
  • Revoke all active sessions and tokens
  • Revoke service account credentials
  • Audit privileged access (admin, root, service accounts)
3
Eradication & Recovery
โฑ๏ธ 1โ€“6 hours
3.1
Forensic image and malware analysis
Forensics Team
โ–ผ

Create forensic images of affected systems before remediation. Analyze malware samples in a sandboxed environment.

$ # Capture memory dump for analysis Get-Process -Name suspicious_process | ForensicMemoryCapture -OutputPath \\[\\FORENSICS\\SHARE\\dump.dmp # Collect full forensic image dd if=/dev/sda of=/evidence/system-image.img bs=4M status=progress
3.2
Remove malware and close attack vectors
IR Team
โ–ผ

Perform thorough malware removal on all affected systems. Patch the vulnerability that was exploited as the initial access vector.

  • Run full anti-malware scan on all systems
  • Remove persistence mechanisms (registry, scheduled tasks, services)
  • Patch exploited vulnerability (e.g., CVE reference)
  • Harden configurations on affected assets
3.3
Restore from verified clean backups
IT Operations
โ–ผ

Verify backup integrity before restoration. Ensure backups are clean and taken before the point of compromise.

$ # Verify backup integrity Get-VSSBackup -Server backup-server -Verify -OutputPath ./backup-verify-log.txt # Restore from last known good backup Restore-VSSBackup -BackupId "2025-01-14T020000Z" -TargetPath "C:\" -WhatIf
โš ๏ธ

Verify backup timestamp is BEFORE the initial compromise time identified in step 1.2. Do NOT use backups that may be encrypted.

4
Post-Incident Review
โฑ๏ธ 24โ€“72 hours
4.1
Conduct lessons learned and update controls
CISO / IR Lead
โ–ผ

Document the full incident timeline, root cause analysis, and corrective actions. Update detection rules and this playbook as needed.

  • Compile incident timeline with timestamps
  • Document root cause and attack chain
  • Identify detection gaps and false negatives
  • Update SIEM detection rules and EDR policies
  • Update this playbook with lessons learned
  • Schedule follow-up security awareness training
4.2
Regulatory notification and reporting
Legal / Compliance
โ–ผ

Determine regulatory reporting obligations and timelines based on the data types affected and jurisdictions involved.

โ„น๏ธ

GDPR: 72-hour reporting window. HIPAA: 60-day reporting. CCPA/CPRA: Notification without unreasonable delay. Check industry-specific requirements.