16
Most read
18
Most read
20
Most read
[Type here] [Type here] [Type here]
Cyber Incident Response
Ransomware Playbook v2.3
[Type here] [Type here] [Type here]
Document Control
Title Ransomware Playbook
Version 2.3
Date Issued 20/01/2020
Status Draft
Document owner Scottish Government
Creator name
Creator organisation name NCC Group
Subject category Cyber Incident Response Management
Access constraints
Document Revision History
Version Date Author Summary of changes
2.3 22/01/2020 SG CRU Generic Version Created from Public Sector Playbook
[Type here] [Type here] [Type here]
Contents
1. Introduction .......................................................................................................................................................................................................4
1.1. Overview........................................................................................................................................................................................................4
1.2. Purpose.........................................................................................................................................................................................................4
1.3. Ransomware Definition.................................................................................................................................................................................4
1.4. Scope ............................................................................................................................................................................................................5
1.5. Review Cycle.................................................................................................................................................................................................5
2. Preparation Phase ............................................................................................................................................................................................6
3. Detect................................................................................................................................................................................................................8
4. Analyse............................................................................................................................................................................................................12
5. Remediation – Contain, Eradicate and Recover............................................................................................................................................15
6. Post Incident ...................................................................................................................................................................................................19
7. Annex A: Flow Diagram ..................................................................................................................................................................................21
[Type here] [Type here] [Type here]
1. Introduction
1.1. Overview
In the event of a cyber incident, it is important that the organisation is able to respond, mobilise and execute an appropriate level of response to
limit the impact on the brand, value, service delivery and the public, client and customer confidence. Although all cyber incidents are different in
their nature and technologies used, it is possible to group common cyber incident types and methodologies together. This is in order to provide
an appropriate and timely responsedepending on the cyber incident type. Incident specific playbooks provide incident managers and stakeholders
with a consistent approach to follow when remediating a cyber incident.
References are made to both a Core IT CIRT and a CIRT within this document. This is in recognition of the different size and capabilities of
organisations. Some may initially manage an incident with a small response team within IT services but where there is a confirmed compromise
this may be escalated to an extended level CIRT comprising of members of the organisation outside the IT services who will deal with agreed
categories of compromise.The Playbook as with the Cyber Incident ResponsePlan (CIRP) will require to be adjusted to reflect the organisational
make up.
Playbooks describe the activities of those directly involved in managing specific cyber incidents. However, it is important to acknowledge the
speed at which cyber incidents can escalate and become a significant business disruptor requiring both business continuity and consequence
management considerations. Early consideration should be given to engaging Business Continuity, Resilience Leads in order that the wider
issues can be effectively managed. Business Continuity and Resilience leads within the organisation must therefore be familiar with the CIRP
and Playbooks and how they link to wider Incident response and Exercising Playbooks and arrangements.
1.2. Purpose
The purpose of the Cyber Incident Response: Ransomware Playbook is to define activities that should be considered when detecting, analysing
and remediating a Ransomware incident. The playbook also identifies the key stakeholders that may be required to undertake these specific
activities.
1.3. Ransomware Definition
Ransomwareis a type of malicious software in which the data on a victim's computer is locked, typically by encryption, and payment is demanded
before the ransomed data is decrypted and access is returned to the victim. The motive for ransomware attacks is nearly always monetary, and
unlike other types of attacks, the victim is usually notified that an exploit has occurred and is given instructions on how to recover from the attack.
[Type here] [Type here] [Type here]
1.4. Scope
This document has been designed for the use of the first responders such as the Service Desk team when responding to a Cyber incident. It is
not standalone and must be used alongside the CIRP.
1.5. Review Cycle
This document is to be reviewed for continued relevancy by the Cyber Incident Response Team (CIRT) lead at least once every 12 months;
following any major cyber incidents, a change of vendor, or the acquisition of new security services.
[Type here] [Type here] [Type here]
2. Preparation Phase
Preparation Phase
Phase
objectives
The preparation phase has the following objectives:
 Prepare to respond to cyber incident in a timely and effective manner;
 Inform employees of their role in remediating a Ransomware incident including reporting mechanisms.
Activity Description Stakeholders
Prepare to
respond
Activities may include, but are not limited to:
Review and rehearse cyber incident response procedures including:-
 technical and business roles and responsibilities
 escalation to major incident management, where necessary
 Head of Information
Governance
 Head of IT
 Information Security
Manager
 Team Leader
 Service Delivery Manager
 Service Desk
Analysts/Technicians
 Legal Team
 Communications Team
 Resilience Lead
 Business Continuity Lead
Review recent cyber incidents and the outputs.
 Information Security
Manager
Review threat intelligence for threats to the organisation, brands and the sector, as well as
common patterns and newly developing risks and vulnerabilities.
 Information Security
Manager
[Type here] [Type here] [Type here]
Ensure appropriate access to any necessary documentation and information, including out-
of-hours access, for the following:
 CIRP;
 <<NetworkArchitecture Diagrams>>; ( insertLinks)
 <<Data FlowDiagrams>>.( insertLinks)
 Information Security
Manager
Identify and obtain the services of a 3rd
party Cyber Forensic provider.
 Information Security
Manager
Define Threat and Risk Indicators and Alerting pattern within the organisation’s security
information and event management (SIEM) solution.
 Information Security
Manager
Activity Description Stakeholders
Inform
employees
Activities may include, but are not limited to:
Conduct regular awareness campaigns to highlight information security risks faced by
employees, including:
 Phishing attacks and malicious emails;
 Ransomware;
 Reporting a suspected cyber incident.
 Head of IT
 Information Security
Manager
 Resilience Lead
 Business Continuity Lead
Ensure regular security training is mandated for those employees managing personal,
confidential or high risk data and systems.
 Head of IT
 Information Security
Manager
 HR
 L&D Department
 Resilience Lead
 Business Continuity Lead
[Type here] [Type here] [Type here]
3. Detect
Detection Phase
Phase objectives
The detection phase has the following objectives:
 Detect and report a breach or compromise of the confidentiality, integrity or availability of organisational data;
 Complete initial investigation of the Ransomware;
 Report the Ransomware attack or compromise data formally to the correct team as a cyber incident.
Activity Description Stakeholders
Detect and report
the incident
Activities may include, but are not limited to:
Monitor detection channels, both automatic and manual, customer and staff
channels and social media for indications of a data breach or compromise, these
can include but are not limited to:
 Automated AV alerts
 Detection from email filters
 Unusual activity on end-point devices, servers or phones
 Reports from end-users
 Information Security Manager
 Core IT CIRT
Report the cyber incident via the Service Desk. If a ticket does not exist already,
raise a ticket containing minimum information.
To report an incident, follow the process defined in the CIRP.
 Information Security Manager
 Core IT CIRT
[Type here] [Type here] [Type here]
Consider whether data loss or data breach has occurred and if so refer to data
breach playbook.
 Information Security Manager
 Information Governance Team
Classify the cyber incident, based upon available information related to the data
loss and the incident types (see CIRP).
 Information Security Manager
 Core IT CIRT
Report the cyber incident in accordance with the organisation’s CIRP.
Consider the Intelligence value to other organisations and share on the CiSP
 Information Security Manager
 Core IT CIRT
 CIRT
Whereappropriate considerreporting requirements to Information Commissioner’s
Office(ICO), relevant regulator and or Competent Authority (NISD), National Cyber
Security Centre (NCSC) and / or Police Scotland
 Information Security Manager
 Core IT CIRT
 CIRT
Activity Description Stakeholders
Initial
investigation of
the incident
Activities may include, but are not limited to:
Mobilise the CIRT to begin initial investigation of the cyber incident (see staff
contact details within CIRP).
 Information Security Manager
 Core IT CIRT

The following may also be included in
the incident response team where
appropriate for the incident:
 Service Desk Analysts
 Server Desk Technicians
 Server Team
 Mobile Device Team
[Type here] [Type here] [Type here]
Identify likelihood of widespread Ransomware infection.
 Head of IT
 Information Security Manager
 Core IT CIRT
 CIRT
Collate initial incident data including as a minimum for following;
 Type of cyber incident;
 How was the cyber incident reported;
 Where are Ransomware messages appearing;
 Identify the attack email;
 Location of detection(s), both physical and logical;
 Number of affected assets across the organisation (initial), is this increasing;
 Additional reporting relating to affected assets, including AV logs, system
event logs, and network monitoring logs;
 Preliminary business impact; and
 Any current action being undertaken.
 Head of IT
 Information Security Manager
 Core IT CIRT
 CIRT
Secure artefacts, including copies of suspected malicious software and forensic
copies of affected system(s) for future analysis.
 Information Security Manager
 Core IT CIRT
Research Threat Intelligence sources and consider Cyber Security Information
Sharing Partnership (CiSP) submission to gain further intelligence and support
mitigation by others.
 Information Security Manager
 Core IT CIRT
Review cyber incident categorisation to validate the cyber incident type as a
Ransomware attack and assess the incident priority, based upon the initial
investigation. (See CIRP for Incident Severity Matrix)
 Information Security Manager
 Core IT CIRT
Activity Description Stakeholders
Incident reporting Activities may include, but are not limited to:
[Type here] [Type here] [Type here]
Report the cyber incident in accordance with the organisation’s CIRP.
Specifically Consider the Intelligence value to other organisations and share on the
CiSP
 Information Security Manager
 CIRT
Consider whether the Incident meets the Scottish Public Sector cyber Incident
Central Notification and Co-ordination Policy as contained within the CIRP.
 Information Security Manager
 CIRT
 CIRT
 Resilience Lead
 Business Continuity Lead
Whereappropriate considerreporting requirements to Information Commissioner’s
Office(ICO), relevant regulator and or Competent Authority (NISD), National Cyber
Security Centre (NCSC) and / or Police Scotland
 Information Security Manager
 Core IT CIRT
 CIRT
Activity Description Stakeholders
Establish the
requirement for a
full forensic
investigation
Activities may include, but are not limited to:
Consider conducting a full forensic investigation, on the advice of legal counsel.
All evidence handling should be done in line with the Association of Chief Police
Officers (ACPO) Good Practice Guide for Digital Evidence.
 Information Security Manager
 Core IT CIRT
 CIRT
[Type here] [Type here] [Type here]
4. Analyse
Analysis Phase
Phase objectives
The analysis phase has the following key objectives:
 Analyse the cyber incident to uncover the scope of the attack;
 Identify and report potentially compromised data and the impact of such a compromise;
 Establish the requirement for a full forensic investigation;
 Develop a remediation plan based upon the scope and details of the cyber incident.
Activity Description Stakeholders
Analyse the
extent of the
incident
Activities may include, but are not limited to:
Engage technical staff from resolver groups.
 Service Desk Technicians
 Core IT CIRT
Classify the ransomware by submission to multiple AV vendors and determine the
family it belongs to.
 Information Security Manager
 Core IT CIRT
Scope the attack.
 Where are ransom messages appearing?
 Are there any infected network drives? Which?
 Identify the attack email or ingress point and the extent of travel.
 Information Security Manager
 Core IT CIRT
Reverse-engineer the Ransomware in a secure environment to understand its
mechanisms, and the functionality it implements.
 Information Security Manager
 Core IT CIRT
 External Security Partner
 NCSC
[Type here] [Type here] [Type here]
 Police Scotland
Execute the Ransomware in a secure environment or sandbox, segregated from
the business network, to determine its behaviour on a test system, including
created files, launched services, modified registry keys and network
communications.
 Information Security Manager
 Core IT CIRT
 External Security Partner
 NCSC
 Police Scotland
Review affected infrastructure for indicators of compromise derived from the
malware analysis to identify any additional compromised system(s).
 Information Security Manager
 Core IT CIRT
Preserve all evidence to support attribution or anticipated legal action.
 Information Security Manager
 Core IT CIRT
Examine threat intelligence feeds to determine if the ransomwareattack is bespoke
and targeted at specific accounts, infrastructure or systems.
 Information Security Manager
 Core IT CIRT
Verify all infected assets are in the process of being recalled and quarantined.
 Information Security Manager
 Core IT CIRT
 CIRT
Activity Description Stakeholders
Identify and
report potentially
compromised
data
Activities may include, but are not limited to:
Identify any data impacted by the ransomware attack, including data-in-transit.
 Information Security Manager
 Core IT CIRT
 CIRT
[Type here] [Type here] [Type here]
Engage data owners and the business to understand the business impact of the
compromised data.
 Information Security Manager
 CIRT
 Head of IT
Report the Cyber incident to the organisation’s senior stakeholders, as required.
 Information Security Manager
 CIRT
Establish the likelihood that identified data’s confidentiality, integrity or availability
was compromised.
 Information Security Manager
 Core IT CIRT
 CIRT
Consider whether reporting suspected or confirmed unauthorised access to any
personal data to the Information Commissioner’s Office (ICO) is appropriate at this
stage.
Consider reporting to incident to Police Scotland
Consider reporting requirements to relevant regulator or Competent Authority if
applicable
 Information Security Manager
 CIRT
 Data Protection Officer
 Legal Services
Update the senior stakeholders of any suspected or confirmed data breach
including the unauthorised access to personal or sensitive organisational data.
 Information Security Manager
 CIRT
 Data Protection Officer
CIRT to immediately report any suspected or confirmed data breach including any
personal/ data breach to the appropriate parties (refer to data loss/breach
playbook).
 Information Security Manager
 CIRT
 Data Protection Officer
 Legal Services`
Consider Intelligence Sharing value on CiSP
 Information Security Manager
 Resilience Lead
Activity Description Stakeholders
[Type here] [Type here] [Type here]
Develop a
remediation plan
Activities may include, but are not limited to:
Incorporate technical and business analysis to develop a prioritised remediation
plan.
 Information Security Manager
 Core IT CIRT
 CIRT
Implement a communications strategy in line with the remediation plan.
 Head of IT
 Information Security Manager
 CIRT
 Communications Team
 Resilience Lead
 Business Continuity Lead
[Type here] [Type here] [Type here]
5. Remediation – Contain, Eradicate and Recover
Remediation Phase
Phase objectives
The remediation phase has the following objectives:
 Contain the effects of the ransomware on the targeted systems;
 Eradicate the ransomware from the network through agreed mitigation measures;
 Recover affected systems and services back to a Business As Usual (BAU) state.
Activity Description Stakeholders
Containment
Contain the technical mechanisms of the ransomware attack, including:
Reduce any further malicious activity by quarantining affected systems and
removing them from the network, where possible, or applying access controls to
isolate from production networks.
 Information Security Manager
 Core IT CIRT
 CIRT
Develop protection measures derived from the results of malicious code analysis
to protect infrastructure from the malicious code and other ransomware that may
attempt to infect using the same mechanism.
 Information Security Manager
 CIRT
Define scope by searching for:
 The SHA-1 process name;
 The executable file name;
 The URL or IP address of similar connections on the network.
 Information Security Manager
 Core IT CIRT
In the case of an email attack:
 Block the sender and the message by marking it as spam;
 Information Security Manager
 Core IT CIRT
[Type here] [Type here] [Type here]
Remediation Phase
 Block the IP address identified in the email header.
In the case of a website compromise:
 Block the website at the network perimeter;
 Sinkhole the domain on internal DNS servers;
 Block the site IP address on the network firewall;
 Ensure all web browsers used within DANB have the latest patches;
 Encourage users to switch to newer browsers.
Block access to any identified Remote Access Tools (RATs) to prevent
communication with command and control servers, websites and exploited
applications.
 Information Security Manager
 Core IT CIRT
Suspend the login credentials of suspected compromised accounts.
 Information Security Manager
 Core IT CIRT
Secure copies of the malicious code, affected systems and any identified artefacts
for further investigation (engaging with forensic support if forensic copies are
required).
 Information Security Manager
 Core IT CIRT
Inform business data owner(s) and stakeholders of the progress of containment
activities.
 Information Security Manager
Remind users to move the attack email to the ‘Junk’ folder.  Information Security Manager
Activity Description Stakeholders
[Type here] [Type here] [Type here]
Remediation Phase
Eradication
Activities may include, but are not limited to:
Identify removal methods from the results of the malicious code analysis and
trusted sources (AV providers).
 Information Security Manager
 Core IT CIRT
Complete an automated or manual removal process to eradicate ransomware or
compromised executables using appropriate tools.
 Information Security Manager
 Core IT CIRT
Conduct a restoration of affected networked systems from a trusted back up.
 Information Security Manager
 Core IT CIRT
Re-install any standalone systems from a clean OS back-up before updating with
trusted data back-ups.
 Information Security Manager
 Core IT CIRT
Change any compromised account details.
 Information Security Manager
 Core IT CIRT
Continue to monitor for signatures and other indicators of compromise to prevent
the ransomware attack from re-emerging.
 Information Security Manager
 Core IT CIRT
Confirm policy compliance across the estate.
 Information Security Manager
 Core IT CIRT
 CIRT
Activity Description Stakeholders
[Type here] [Type here] [Type here]
Remediation Phase
Recover to BAU
Activities may include, but are not limited to:
Recover systems based on business impact analysis and business criticality.
 Information Security Manager
 Core IT CIRT
 CIRT
Complete Ransomware scanning of all systems, across the estate.
 Information Security Manager
 Core IT CIRT
Re-image systems.
 Information Security Manager
 Core IT CIRT
Re-set the credentials of all involved system(s) and users account details.
 Information Security Manager
 Core IT CIRT
Reintegrate previously compromised systems.
 Information Security Manager
 Core IT CIRT
Restore any corrupted or destroyed data.
 Information Security Manager
 Core IT CIRT
Restore any suspended services.
 Information Security Manager
 Core IT CIRT
Establish monitoring to detect further suspicious activity.
 Information Security Manager
 Core IT CIRT
Co-ordinate the implementation of any necessary patches or vulnerability
remediation activities.
 Information Security Manager
 Core IT CIRT
[Type here] [Type here] [Type here]
6. Post Incident
Post-Incident Activities Phase
Phase objectives
The post-incident activities phase has the following objectives:
 Complete an incident report including all incident details and activities;
 Complete the lessons identified and problem management process;
 Publish appropriate internal and external communications.
Activity Description Stakeholders
Incident reporting
Draft a post-incident report that includes the following details as a minimum:
 Details of the cause, impact and actions taken to mitigate the cyber incident,
and including timings, type and location of incident as well as the effect on
users;
 Activities undertaken by relevant resolver groups, service providers and
business stakeholders that enabled normal business operations to resume;
 Recommendations where any aspects of people, process or technology could
be improved across the organisation to help prevent a similar Cyber incident
from reoccurring, as part of a formalised lessons identified process.
 Senior Stakeholders
 Head of Information
Governance
 Head of IT
 Audit Committee
 Information Security Manager
 Resilience Lead
 Business Continuity Lead
Lessons
Identified &
Problem
Management
Complete the formal lessons identified process to feedback into future preparation
activities.
 Information Security Manager
 CIRT
Consider sharing lessons identified with the wider Scottish Public Sector.
 Information Security Manager
 CIRT
 Resilience Lead
 Business Continuity Lead
[Type here] [Type here] [Type here]
Post-Incident Activities Phase
Conduct root cause analysis to identify and remediate underlying vulnerabilities.
 Information Security Manager
 Core IT CIRT
 CIRT
Human
Resources
Review staff welfare; working hours, over time, time off in lieu (TOIL) and
expenses.
 Information Security Manager
 HR
Communications
Activities may include, but are not limited to:
Publish internal communications to inform and educate employees on ransomware
attacks and security awareness.
 Information Security Manager
 CIRT
 Communications
Publish external communications, if appropriate, in line with the communications
strategy to provide advice to customers, engage with the market, and inform press
of the cyber incident.
These communications shouldprovide key information of the cyber incident without
leaving the organisation vulnerable or inciting further ransomware attacks.
 Head of IT
 Information Security Manager
 Communications Team
[Type here] [Type here] [Type here]
Ransomware Playbook
Detect
Prepare
Analyse
Remediation
Post
Incident
Prepare
Review and
rehearse CIRP
Review recent cyber
incidents and
outputs
Review threat
intelligence feeds,
latest vulnerabilities
and risks
Ensure access to CIRP,
Data Flow Diagrams
and appropriate
documentation
Maintain awareness
with employees
through security
awareness training
Reports of
Ransomware to
Service Desk
Mobilise CIRT
Identify likelihood
of widespread
Ransomware attack
Collate initial
incident data
Escalate in
accordance with the
CIRP
Consider mobilising
forensic readiness
capability
Engage technical
staff
Classify the
Ransomware by
submission to
multiple AV vendors
Scope the attack:
 Where are the ransomware
messages appearing?
 Identify attack email and
ingress point
Reverse engineer
malware (if
possible)
Identify impacted
data and systems
Consider engaging
the DPO and
reporting to the ICO
Quarantine affected
systems
Suspend login
credentials for
compromised
accounts
Remove
ransomware from
affected systems
Conduct restoration
of affected network
systems from
trusted backup
Re-image systems
and scan for
ransomware
Restore serviced to
BAU
Draft post-incident
report
Complete formal
lessons learnt
process defined in
CIRP
Publish internal
communications to
educate employees on
ransomware attacks
Updates to cyber
incident
documentation
where required
End
7. Annex A: Flow Diagram

More Related Content

PDF
INCIDENT RESPONSE NIST IMPLEMENTATION
PDF
All about a DPIA by Andrey Prozorov 2.0, 220518.pdf
PPTX
Introduction to ITIL 4 and IT service management
PDF
Cybersecurity Roadmap Development for Executives
PPTX
Phishing Incident Response Playbook
PDF
Data Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
PPTX
Windows registry forensics
PPT
Digital Transformation Templates.ppt
INCIDENT RESPONSE NIST IMPLEMENTATION
All about a DPIA by Andrey Prozorov 2.0, 220518.pdf
Introduction to ITIL 4 and IT service management
Cybersecurity Roadmap Development for Executives
Phishing Incident Response Playbook
Data Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
Windows registry forensics
Digital Transformation Templates.ppt

What's hot (20)

PPSX
Next-Gen security operation center
PDF
Vulnerability Management
PDF
What We’ve Learned Building a Cyber Security Operation Center: du Case Study
PPTX
SOC: Use cases and are we asking the right questions?
PDF
Building a Next-Generation Security Operations Center (SOC)
PDF
Overview of the Cyber Kill Chain [TM]
PPTX
Security operation center (SOC)
PDF
Owasp top 10
PDF
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
PDF
SOC Certification Runbook Template
PDF
Building Security Operation Center
PDF
Cyber threat intelligence ppt
PDF
From SIEM to SOC: Crossing the Cybersecurity Chasm
PDF
Rothke secure360 building a security operations center (soc)
PPTX
SOAR and SIEM.pptx
PPTX
Application Security Architecture and Threat Modelling
PPTX
Security Operation Center Fundamental
PPTX
Security Operations Center (SOC) Essentials for the SME
PPTX
Roadmap to security operations excellence
PPTX
Cloud Security Architecture.pptx
Next-Gen security operation center
Vulnerability Management
What We’ve Learned Building a Cyber Security Operation Center: du Case Study
SOC: Use cases and are we asking the right questions?
Building a Next-Generation Security Operations Center (SOC)
Overview of the Cyber Kill Chain [TM]
Security operation center (SOC)
Owasp top 10
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
SOC Certification Runbook Template
Building Security Operation Center
Cyber threat intelligence ppt
From SIEM to SOC: Crossing the Cybersecurity Chasm
Rothke secure360 building a security operations center (soc)
SOAR and SIEM.pptx
Application Security Architecture and Threat Modelling
Security Operation Center Fundamental
Security Operations Center (SOC) Essentials for the SME
Roadmap to security operations excellence
Cloud Security Architecture.pptx
Ad

Similar to Cyber+incident+response+ +generic+ransomware+playbook+v2.3 (20)

DOCX
Cyber+Incident+Response+-+Generic+Denial+of+Service+Playbook+v2.3.docx
DOCX
Cyber+Capability+Toolkit+-+Cyber+Incident+Response+-+Cyber+Incident+Response+...
PPTX
Purple Gradient Illustration Cyber Security Presentation (1).pptx
PDF
What The Cyber Entails-2.pdf
PPTX
What are the key cybersecurity KPIs that businesses.pptx
PDF
PDF
Qatar Proposal
PDF
Certified Cybersecurity Compliance Professional.PREVIEW.pdf
PDF
Risk Mitigation Plan Based On Inputs Provided
PDF
Cyber-Security-Whitepaper.pdf
PDF
Cyber-Security-Whitepaper.pdf
PDF
Strategy considerations for building a security operations center
PDF
Satori Whitepaper: Threat Intelligence - a path to taming digital threats
PDF
Cybersecurity Incident Response Planning.pdf
DOCX
1. After a cyber attack, the organizational decision making and re.docx
PDF
It risk assessment
PPTX
CRISC Course Preview
PDF
What CIOs Need To Tell Their Boards About Cyber Security
DOCX
Running Head CYBER SECURITY IMPROVEMENT AREASCYBER SECURITY.docx
PDF
Risk Management
Cyber+Incident+Response+-+Generic+Denial+of+Service+Playbook+v2.3.docx
Cyber+Capability+Toolkit+-+Cyber+Incident+Response+-+Cyber+Incident+Response+...
Purple Gradient Illustration Cyber Security Presentation (1).pptx
What The Cyber Entails-2.pdf
What are the key cybersecurity KPIs that businesses.pptx
Qatar Proposal
Certified Cybersecurity Compliance Professional.PREVIEW.pdf
Risk Mitigation Plan Based On Inputs Provided
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
Strategy considerations for building a security operations center
Satori Whitepaper: Threat Intelligence - a path to taming digital threats
Cybersecurity Incident Response Planning.pdf
1. After a cyber attack, the organizational decision making and re.docx
It risk assessment
CRISC Course Preview
What CIOs Need To Tell Their Boards About Cyber Security
Running Head CYBER SECURITY IMPROVEMENT AREASCYBER SECURITY.docx
Risk Management
Ad

Recently uploaded (20)

PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
A novel scalable deep ensemble learning framework for big data classification...
PPT
What is a Computer? Input Devices /output devices
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PPT
Geologic Time for studying geology for geologist
PPTX
Benefits of Physical activity for teenagers.pptx
PPTX
The various Industrial Revolutions .pptx
PDF
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PPTX
observCloud-Native Containerability and monitoring.pptx
PDF
A review of recent deep learning applications in wood surface defect identifi...
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
Architecture types and enterprise applications.pdf
PPTX
Web Crawler for Trend Tracking Gen Z Insights.pptx
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
Hindi spoken digit analysis for native and non-native speakers
A novel scalable deep ensemble learning framework for big data classification...
What is a Computer? Input Devices /output devices
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
A contest of sentiment analysis: k-nearest neighbor versus neural network
Geologic Time for studying geology for geologist
Benefits of Physical activity for teenagers.pptx
The various Industrial Revolutions .pptx
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
observCloud-Native Containerability and monitoring.pptx
A review of recent deep learning applications in wood surface defect identifi...
WOOl fibre morphology and structure.pdf for textiles
Architecture types and enterprise applications.pdf
Web Crawler for Trend Tracking Gen Z Insights.pptx
NewMind AI Weekly Chronicles – August ’25 Week III

Cyber+incident+response+ +generic+ransomware+playbook+v2.3

  • 1. [Type here] [Type here] [Type here] Cyber Incident Response Ransomware Playbook v2.3
  • 2. [Type here] [Type here] [Type here] Document Control Title Ransomware Playbook Version 2.3 Date Issued 20/01/2020 Status Draft Document owner Scottish Government Creator name Creator organisation name NCC Group Subject category Cyber Incident Response Management Access constraints Document Revision History Version Date Author Summary of changes 2.3 22/01/2020 SG CRU Generic Version Created from Public Sector Playbook
  • 3. [Type here] [Type here] [Type here] Contents 1. Introduction .......................................................................................................................................................................................................4 1.1. Overview........................................................................................................................................................................................................4 1.2. Purpose.........................................................................................................................................................................................................4 1.3. Ransomware Definition.................................................................................................................................................................................4 1.4. Scope ............................................................................................................................................................................................................5 1.5. Review Cycle.................................................................................................................................................................................................5 2. Preparation Phase ............................................................................................................................................................................................6 3. Detect................................................................................................................................................................................................................8 4. Analyse............................................................................................................................................................................................................12 5. Remediation – Contain, Eradicate and Recover............................................................................................................................................15 6. Post Incident ...................................................................................................................................................................................................19 7. Annex A: Flow Diagram ..................................................................................................................................................................................21
  • 4. [Type here] [Type here] [Type here] 1. Introduction 1.1. Overview In the event of a cyber incident, it is important that the organisation is able to respond, mobilise and execute an appropriate level of response to limit the impact on the brand, value, service delivery and the public, client and customer confidence. Although all cyber incidents are different in their nature and technologies used, it is possible to group common cyber incident types and methodologies together. This is in order to provide an appropriate and timely responsedepending on the cyber incident type. Incident specific playbooks provide incident managers and stakeholders with a consistent approach to follow when remediating a cyber incident. References are made to both a Core IT CIRT and a CIRT within this document. This is in recognition of the different size and capabilities of organisations. Some may initially manage an incident with a small response team within IT services but where there is a confirmed compromise this may be escalated to an extended level CIRT comprising of members of the organisation outside the IT services who will deal with agreed categories of compromise.The Playbook as with the Cyber Incident ResponsePlan (CIRP) will require to be adjusted to reflect the organisational make up. Playbooks describe the activities of those directly involved in managing specific cyber incidents. However, it is important to acknowledge the speed at which cyber incidents can escalate and become a significant business disruptor requiring both business continuity and consequence management considerations. Early consideration should be given to engaging Business Continuity, Resilience Leads in order that the wider issues can be effectively managed. Business Continuity and Resilience leads within the organisation must therefore be familiar with the CIRP and Playbooks and how they link to wider Incident response and Exercising Playbooks and arrangements. 1.2. Purpose The purpose of the Cyber Incident Response: Ransomware Playbook is to define activities that should be considered when detecting, analysing and remediating a Ransomware incident. The playbook also identifies the key stakeholders that may be required to undertake these specific activities. 1.3. Ransomware Definition Ransomwareis a type of malicious software in which the data on a victim's computer is locked, typically by encryption, and payment is demanded before the ransomed data is decrypted and access is returned to the victim. The motive for ransomware attacks is nearly always monetary, and unlike other types of attacks, the victim is usually notified that an exploit has occurred and is given instructions on how to recover from the attack.
  • 5. [Type here] [Type here] [Type here] 1.4. Scope This document has been designed for the use of the first responders such as the Service Desk team when responding to a Cyber incident. It is not standalone and must be used alongside the CIRP. 1.5. Review Cycle This document is to be reviewed for continued relevancy by the Cyber Incident Response Team (CIRT) lead at least once every 12 months; following any major cyber incidents, a change of vendor, or the acquisition of new security services.
  • 6. [Type here] [Type here] [Type here] 2. Preparation Phase Preparation Phase Phase objectives The preparation phase has the following objectives:  Prepare to respond to cyber incident in a timely and effective manner;  Inform employees of their role in remediating a Ransomware incident including reporting mechanisms. Activity Description Stakeholders Prepare to respond Activities may include, but are not limited to: Review and rehearse cyber incident response procedures including:-  technical and business roles and responsibilities  escalation to major incident management, where necessary  Head of Information Governance  Head of IT  Information Security Manager  Team Leader  Service Delivery Manager  Service Desk Analysts/Technicians  Legal Team  Communications Team  Resilience Lead  Business Continuity Lead Review recent cyber incidents and the outputs.  Information Security Manager Review threat intelligence for threats to the organisation, brands and the sector, as well as common patterns and newly developing risks and vulnerabilities.  Information Security Manager
  • 7. [Type here] [Type here] [Type here] Ensure appropriate access to any necessary documentation and information, including out- of-hours access, for the following:  CIRP;  <<NetworkArchitecture Diagrams>>; ( insertLinks)  <<Data FlowDiagrams>>.( insertLinks)  Information Security Manager Identify and obtain the services of a 3rd party Cyber Forensic provider.  Information Security Manager Define Threat and Risk Indicators and Alerting pattern within the organisation’s security information and event management (SIEM) solution.  Information Security Manager Activity Description Stakeholders Inform employees Activities may include, but are not limited to: Conduct regular awareness campaigns to highlight information security risks faced by employees, including:  Phishing attacks and malicious emails;  Ransomware;  Reporting a suspected cyber incident.  Head of IT  Information Security Manager  Resilience Lead  Business Continuity Lead Ensure regular security training is mandated for those employees managing personal, confidential or high risk data and systems.  Head of IT  Information Security Manager  HR  L&D Department  Resilience Lead  Business Continuity Lead
  • 8. [Type here] [Type here] [Type here] 3. Detect Detection Phase Phase objectives The detection phase has the following objectives:  Detect and report a breach or compromise of the confidentiality, integrity or availability of organisational data;  Complete initial investigation of the Ransomware;  Report the Ransomware attack or compromise data formally to the correct team as a cyber incident. Activity Description Stakeholders Detect and report the incident Activities may include, but are not limited to: Monitor detection channels, both automatic and manual, customer and staff channels and social media for indications of a data breach or compromise, these can include but are not limited to:  Automated AV alerts  Detection from email filters  Unusual activity on end-point devices, servers or phones  Reports from end-users  Information Security Manager  Core IT CIRT Report the cyber incident via the Service Desk. If a ticket does not exist already, raise a ticket containing minimum information. To report an incident, follow the process defined in the CIRP.  Information Security Manager  Core IT CIRT
  • 9. [Type here] [Type here] [Type here] Consider whether data loss or data breach has occurred and if so refer to data breach playbook.  Information Security Manager  Information Governance Team Classify the cyber incident, based upon available information related to the data loss and the incident types (see CIRP).  Information Security Manager  Core IT CIRT Report the cyber incident in accordance with the organisation’s CIRP. Consider the Intelligence value to other organisations and share on the CiSP  Information Security Manager  Core IT CIRT  CIRT Whereappropriate considerreporting requirements to Information Commissioner’s Office(ICO), relevant regulator and or Competent Authority (NISD), National Cyber Security Centre (NCSC) and / or Police Scotland  Information Security Manager  Core IT CIRT  CIRT Activity Description Stakeholders Initial investigation of the incident Activities may include, but are not limited to: Mobilise the CIRT to begin initial investigation of the cyber incident (see staff contact details within CIRP).  Information Security Manager  Core IT CIRT  The following may also be included in the incident response team where appropriate for the incident:  Service Desk Analysts  Server Desk Technicians  Server Team  Mobile Device Team
  • 10. [Type here] [Type here] [Type here] Identify likelihood of widespread Ransomware infection.  Head of IT  Information Security Manager  Core IT CIRT  CIRT Collate initial incident data including as a minimum for following;  Type of cyber incident;  How was the cyber incident reported;  Where are Ransomware messages appearing;  Identify the attack email;  Location of detection(s), both physical and logical;  Number of affected assets across the organisation (initial), is this increasing;  Additional reporting relating to affected assets, including AV logs, system event logs, and network monitoring logs;  Preliminary business impact; and  Any current action being undertaken.  Head of IT  Information Security Manager  Core IT CIRT  CIRT Secure artefacts, including copies of suspected malicious software and forensic copies of affected system(s) for future analysis.  Information Security Manager  Core IT CIRT Research Threat Intelligence sources and consider Cyber Security Information Sharing Partnership (CiSP) submission to gain further intelligence and support mitigation by others.  Information Security Manager  Core IT CIRT Review cyber incident categorisation to validate the cyber incident type as a Ransomware attack and assess the incident priority, based upon the initial investigation. (See CIRP for Incident Severity Matrix)  Information Security Manager  Core IT CIRT Activity Description Stakeholders Incident reporting Activities may include, but are not limited to:
  • 11. [Type here] [Type here] [Type here] Report the cyber incident in accordance with the organisation’s CIRP. Specifically Consider the Intelligence value to other organisations and share on the CiSP  Information Security Manager  CIRT Consider whether the Incident meets the Scottish Public Sector cyber Incident Central Notification and Co-ordination Policy as contained within the CIRP.  Information Security Manager  CIRT  CIRT  Resilience Lead  Business Continuity Lead Whereappropriate considerreporting requirements to Information Commissioner’s Office(ICO), relevant regulator and or Competent Authority (NISD), National Cyber Security Centre (NCSC) and / or Police Scotland  Information Security Manager  Core IT CIRT  CIRT Activity Description Stakeholders Establish the requirement for a full forensic investigation Activities may include, but are not limited to: Consider conducting a full forensic investigation, on the advice of legal counsel. All evidence handling should be done in line with the Association of Chief Police Officers (ACPO) Good Practice Guide for Digital Evidence.  Information Security Manager  Core IT CIRT  CIRT
  • 12. [Type here] [Type here] [Type here] 4. Analyse Analysis Phase Phase objectives The analysis phase has the following key objectives:  Analyse the cyber incident to uncover the scope of the attack;  Identify and report potentially compromised data and the impact of such a compromise;  Establish the requirement for a full forensic investigation;  Develop a remediation plan based upon the scope and details of the cyber incident. Activity Description Stakeholders Analyse the extent of the incident Activities may include, but are not limited to: Engage technical staff from resolver groups.  Service Desk Technicians  Core IT CIRT Classify the ransomware by submission to multiple AV vendors and determine the family it belongs to.  Information Security Manager  Core IT CIRT Scope the attack.  Where are ransom messages appearing?  Are there any infected network drives? Which?  Identify the attack email or ingress point and the extent of travel.  Information Security Manager  Core IT CIRT Reverse-engineer the Ransomware in a secure environment to understand its mechanisms, and the functionality it implements.  Information Security Manager  Core IT CIRT  External Security Partner  NCSC
  • 13. [Type here] [Type here] [Type here]  Police Scotland Execute the Ransomware in a secure environment or sandbox, segregated from the business network, to determine its behaviour on a test system, including created files, launched services, modified registry keys and network communications.  Information Security Manager  Core IT CIRT  External Security Partner  NCSC  Police Scotland Review affected infrastructure for indicators of compromise derived from the malware analysis to identify any additional compromised system(s).  Information Security Manager  Core IT CIRT Preserve all evidence to support attribution or anticipated legal action.  Information Security Manager  Core IT CIRT Examine threat intelligence feeds to determine if the ransomwareattack is bespoke and targeted at specific accounts, infrastructure or systems.  Information Security Manager  Core IT CIRT Verify all infected assets are in the process of being recalled and quarantined.  Information Security Manager  Core IT CIRT  CIRT Activity Description Stakeholders Identify and report potentially compromised data Activities may include, but are not limited to: Identify any data impacted by the ransomware attack, including data-in-transit.  Information Security Manager  Core IT CIRT  CIRT
  • 14. [Type here] [Type here] [Type here] Engage data owners and the business to understand the business impact of the compromised data.  Information Security Manager  CIRT  Head of IT Report the Cyber incident to the organisation’s senior stakeholders, as required.  Information Security Manager  CIRT Establish the likelihood that identified data’s confidentiality, integrity or availability was compromised.  Information Security Manager  Core IT CIRT  CIRT Consider whether reporting suspected or confirmed unauthorised access to any personal data to the Information Commissioner’s Office (ICO) is appropriate at this stage. Consider reporting to incident to Police Scotland Consider reporting requirements to relevant regulator or Competent Authority if applicable  Information Security Manager  CIRT  Data Protection Officer  Legal Services Update the senior stakeholders of any suspected or confirmed data breach including the unauthorised access to personal or sensitive organisational data.  Information Security Manager  CIRT  Data Protection Officer CIRT to immediately report any suspected or confirmed data breach including any personal/ data breach to the appropriate parties (refer to data loss/breach playbook).  Information Security Manager  CIRT  Data Protection Officer  Legal Services` Consider Intelligence Sharing value on CiSP  Information Security Manager  Resilience Lead Activity Description Stakeholders
  • 15. [Type here] [Type here] [Type here] Develop a remediation plan Activities may include, but are not limited to: Incorporate technical and business analysis to develop a prioritised remediation plan.  Information Security Manager  Core IT CIRT  CIRT Implement a communications strategy in line with the remediation plan.  Head of IT  Information Security Manager  CIRT  Communications Team  Resilience Lead  Business Continuity Lead
  • 16. [Type here] [Type here] [Type here] 5. Remediation – Contain, Eradicate and Recover Remediation Phase Phase objectives The remediation phase has the following objectives:  Contain the effects of the ransomware on the targeted systems;  Eradicate the ransomware from the network through agreed mitigation measures;  Recover affected systems and services back to a Business As Usual (BAU) state. Activity Description Stakeholders Containment Contain the technical mechanisms of the ransomware attack, including: Reduce any further malicious activity by quarantining affected systems and removing them from the network, where possible, or applying access controls to isolate from production networks.  Information Security Manager  Core IT CIRT  CIRT Develop protection measures derived from the results of malicious code analysis to protect infrastructure from the malicious code and other ransomware that may attempt to infect using the same mechanism.  Information Security Manager  CIRT Define scope by searching for:  The SHA-1 process name;  The executable file name;  The URL or IP address of similar connections on the network.  Information Security Manager  Core IT CIRT In the case of an email attack:  Block the sender and the message by marking it as spam;  Information Security Manager  Core IT CIRT
  • 17. [Type here] [Type here] [Type here] Remediation Phase  Block the IP address identified in the email header. In the case of a website compromise:  Block the website at the network perimeter;  Sinkhole the domain on internal DNS servers;  Block the site IP address on the network firewall;  Ensure all web browsers used within DANB have the latest patches;  Encourage users to switch to newer browsers. Block access to any identified Remote Access Tools (RATs) to prevent communication with command and control servers, websites and exploited applications.  Information Security Manager  Core IT CIRT Suspend the login credentials of suspected compromised accounts.  Information Security Manager  Core IT CIRT Secure copies of the malicious code, affected systems and any identified artefacts for further investigation (engaging with forensic support if forensic copies are required).  Information Security Manager  Core IT CIRT Inform business data owner(s) and stakeholders of the progress of containment activities.  Information Security Manager Remind users to move the attack email to the ‘Junk’ folder.  Information Security Manager Activity Description Stakeholders
  • 18. [Type here] [Type here] [Type here] Remediation Phase Eradication Activities may include, but are not limited to: Identify removal methods from the results of the malicious code analysis and trusted sources (AV providers).  Information Security Manager  Core IT CIRT Complete an automated or manual removal process to eradicate ransomware or compromised executables using appropriate tools.  Information Security Manager  Core IT CIRT Conduct a restoration of affected networked systems from a trusted back up.  Information Security Manager  Core IT CIRT Re-install any standalone systems from a clean OS back-up before updating with trusted data back-ups.  Information Security Manager  Core IT CIRT Change any compromised account details.  Information Security Manager  Core IT CIRT Continue to monitor for signatures and other indicators of compromise to prevent the ransomware attack from re-emerging.  Information Security Manager  Core IT CIRT Confirm policy compliance across the estate.  Information Security Manager  Core IT CIRT  CIRT Activity Description Stakeholders
  • 19. [Type here] [Type here] [Type here] Remediation Phase Recover to BAU Activities may include, but are not limited to: Recover systems based on business impact analysis and business criticality.  Information Security Manager  Core IT CIRT  CIRT Complete Ransomware scanning of all systems, across the estate.  Information Security Manager  Core IT CIRT Re-image systems.  Information Security Manager  Core IT CIRT Re-set the credentials of all involved system(s) and users account details.  Information Security Manager  Core IT CIRT Reintegrate previously compromised systems.  Information Security Manager  Core IT CIRT Restore any corrupted or destroyed data.  Information Security Manager  Core IT CIRT Restore any suspended services.  Information Security Manager  Core IT CIRT Establish monitoring to detect further suspicious activity.  Information Security Manager  Core IT CIRT Co-ordinate the implementation of any necessary patches or vulnerability remediation activities.  Information Security Manager  Core IT CIRT
  • 20. [Type here] [Type here] [Type here] 6. Post Incident Post-Incident Activities Phase Phase objectives The post-incident activities phase has the following objectives:  Complete an incident report including all incident details and activities;  Complete the lessons identified and problem management process;  Publish appropriate internal and external communications. Activity Description Stakeholders Incident reporting Draft a post-incident report that includes the following details as a minimum:  Details of the cause, impact and actions taken to mitigate the cyber incident, and including timings, type and location of incident as well as the effect on users;  Activities undertaken by relevant resolver groups, service providers and business stakeholders that enabled normal business operations to resume;  Recommendations where any aspects of people, process or technology could be improved across the organisation to help prevent a similar Cyber incident from reoccurring, as part of a formalised lessons identified process.  Senior Stakeholders  Head of Information Governance  Head of IT  Audit Committee  Information Security Manager  Resilience Lead  Business Continuity Lead Lessons Identified & Problem Management Complete the formal lessons identified process to feedback into future preparation activities.  Information Security Manager  CIRT Consider sharing lessons identified with the wider Scottish Public Sector.  Information Security Manager  CIRT  Resilience Lead  Business Continuity Lead
  • 21. [Type here] [Type here] [Type here] Post-Incident Activities Phase Conduct root cause analysis to identify and remediate underlying vulnerabilities.  Information Security Manager  Core IT CIRT  CIRT Human Resources Review staff welfare; working hours, over time, time off in lieu (TOIL) and expenses.  Information Security Manager  HR Communications Activities may include, but are not limited to: Publish internal communications to inform and educate employees on ransomware attacks and security awareness.  Information Security Manager  CIRT  Communications Publish external communications, if appropriate, in line with the communications strategy to provide advice to customers, engage with the market, and inform press of the cyber incident. These communications shouldprovide key information of the cyber incident without leaving the organisation vulnerable or inciting further ransomware attacks.  Head of IT  Information Security Manager  Communications Team
  • 22. [Type here] [Type here] [Type here] Ransomware Playbook Detect Prepare Analyse Remediation Post Incident Prepare Review and rehearse CIRP Review recent cyber incidents and outputs Review threat intelligence feeds, latest vulnerabilities and risks Ensure access to CIRP, Data Flow Diagrams and appropriate documentation Maintain awareness with employees through security awareness training Reports of Ransomware to Service Desk Mobilise CIRT Identify likelihood of widespread Ransomware attack Collate initial incident data Escalate in accordance with the CIRP Consider mobilising forensic readiness capability Engage technical staff Classify the Ransomware by submission to multiple AV vendors Scope the attack:  Where are the ransomware messages appearing?  Identify attack email and ingress point Reverse engineer malware (if possible) Identify impacted data and systems Consider engaging the DPO and reporting to the ICO Quarantine affected systems Suspend login credentials for compromised accounts Remove ransomware from affected systems Conduct restoration of affected network systems from trusted backup Re-image systems and scan for ransomware Restore serviced to BAU Draft post-incident report Complete formal lessons learnt process defined in CIRP Publish internal communications to educate employees on ransomware attacks Updates to cyber incident documentation where required End 7. Annex A: Flow Diagram