SlideShare a Scribd company logo
RANSOMWARE PREVENTION & REMEDIATION
Don’t be the next victim
Current Ransomware Threat Environment 
Today’s ransomware campaigns are very different from what we have seen in the past. On the one hand, ransomware can be
easily obtained and used successfully by criminals that have little to no hacking skills, often referred to as Ransomware as a
Service (RaaS). On the other hand, we are seeing ransomware being used for much more than just ransoms. In some cases, we
have seen it used as a diversion; first harvesting credentials for later use, and then encrypting the drive to keep IT staff occupied
while the attacker covers their tracks and accomplishes even more nefarious objectives. And more recently, we are seeing highly
opportunistic campaigns that encrypt entire networks in an organization and delete host backups prior to encryption, leaving the
entire organization held hostage and unable to operate.
Cylance®
offers two complementary service offerings to help organizations address this evolving threat.
Proactive Prevention and Readiness
Cylance offers best practices for prevention, network architecture, internal IR workflows, vulnerability and patch management,
and assessment of both internal hosts and externally facing services that criminals are using to gain foothold.
When it comes to ransomware, prevention and preparation are the best medicine. Once execution takes place, the business cost
and business risk go up exponentially. Likewise, organizations that are well prepared for ransomware can greatly minimize the
business impact of an IT incident in general.
Cylance’s Proactive Prevention and Readiness services cater specifically to the ransomware epidemic by:
•  Leveraging the power of machine learning and artificial intelligence to allow predictive, autonomous, pre-execution prevention
•  Providing world-renowned, highly sought after, knowledgeable consultants with the expertise to facilitate remediation of a
ransomware attack
•  Imparting wisdom BEFORE the attack occurs to ensure the best preparation, preventative technologies, and workflows are
in place
The SamSam (aka Samas, or Samsa) ransomware is a new generation of ransomware that is not industry specific.
This threat:
•  Does not typically rely upon traditional spear-phishing or watering-hole attack vectors
•  Leverages vulnerable externally-facing services to move laterally and establish persistence, this is
performed manually by the bad actor
•  Can canvas and encrypt entire networks instead of just a handful of individual hosts
•  Backup systems are targeted within the network and archives deleted instead of just being
encrypted, leaving victims little to no recourse1
1- FBI FLASH MC-000070-MW distributed by the FBI to specific entities (TLP:GREEN) on March 25, 2016.
CONSULTING
Incident Response, Rapid Containment and Risk Reduction 
Not all ransomware is created equal. As soon as one variant is released, a host of ‘copy-cat’ variants emerge, and some of them
use entirely different encryption algorithms and key-exchanges, while others still, use new command and control infrastructures
or different attack vectors. In the unfortunate case an organization needs to call in IR services, it is important to demand
experienced responders armed with a structured process and custom-built tools so these types of determinations can be made
quickly in order to move to rapid containment.
The Cylance IR team has conducted hundreds of IR engagements just this last year alone. They are experts in hunting for key
indicators of compromise for current active campaigns and are able to directly leverage Cylance’s machine learning and artificial
intelligence engine for immediate containment during the IR process, all without installing any agents or tipping their hat to the
criminals behind the campaign.
The goal during any ransomware compromise is the same: reduce the risk and cost to the organization, and restore operations as
soon as possible; all while moving silently, quickly and purposefully.
Cylance Consulting is focused on immediate containment without a managed service provider commitment or agents left on
your network. We eliminate the vulnerability and prevent it from further exposure, permanently. We challenge you to find an
organization that can contain incidents faster and prevent them from occurring in the future.
Cylance’s Incident Response, Rapid Containment and Risk Reduction of ransomware compromises provides:
•  Experts in the space who have completed hundreds of IRs per year
•  Custom-developed tools to specifically address today’s advanced ransomware
•  Structured and proprietary response workflows to rapidly identify and contain the campaign
•  Ransomware analysis to determine if certain aspects are breakable in order to possibly defeat the need to pay ransom
•  Assistance in negotiating with criminal actors behind attack campaigns during late-stage attack campaigns
•  The benefits of artificial intelligence without the need to install a host-based agent, which can tip off the criminals behind
the campaign
Related Services and Products
Industrial Control Systems
• ICS Infrastructure Assessment
• ICS Compromise Assessment
• Building Automation Systems
• Incident Response Services for Control Systems
Internet of Things / Embedded
• Incident Response for IoT and Embedded Systems
• Penetration Testing for Embedded Systems
Enterprise Security Services
• Internal / External Penetration Testing
• Social Engineering
• Web Application Assessment
Training
• Custom Incident Response and Forensics Training
• ICS Security Essentials
Incident Response and Compromise Assessment
• Malware and Incident Response Retainer Services
• Incident Readiness Assessment
• Emergency Incident Response
ThreatZERO™
• ThreatZERO + Compromise Assessment
• ThreatZERO Resident Expert
Healthcare
• Clinical Information Security Program Development
• Clinical Application Security Assessments
• Medical Device Risk Assessment
• HIPAA Compliance
Contact Cylance Consulting to begin your journey to ThreatZERO™
today!
+1 (877) 97DEFEND
proservices@cylance.com
www.cylance.com
18201 Von Karman, Ste. 700 Irvine, CA 92612
©2016 Cylance Inc. Cylance® and CylancePROTECT® and all associated logos and designs are trademarks or
registered trademarks of Cylance Inc. All other registered trademarks or trademarks are property of their
respective owners.

More Related Content

PPTX
Distribution Industry: What is Ransomware and How Does it Work?
PDF
Cisa ransomware guide
PPTX
Cybersecurity
PPTX
How to Recover from a Ransomware Disaster
PPTX
Webinar: Backup vs. Ransomware - 5 Requirements for Backup Success
PPTX
10 Critical Corporate Cyber Security Risks
PPTX
Ransomware Has Evolved And So Should Your Company
PDF
Webinar: Get Ready to Detect, Respond & Recover from a Cyber Attack
Distribution Industry: What is Ransomware and How Does it Work?
Cisa ransomware guide
Cybersecurity
How to Recover from a Ransomware Disaster
Webinar: Backup vs. Ransomware - 5 Requirements for Backup Success
10 Critical Corporate Cyber Security Risks
Ransomware Has Evolved And So Should Your Company
Webinar: Get Ready to Detect, Respond & Recover from a Cyber Attack

What's hot (20)

PDF
Ransomware Response Guide IBM INCIDENT RESPONSE SERVICES
PPTX
Proatively Engaged: Questions Executives Should Ask Their Security Teams
PPTX
Recover your files from Ransomware - Ransomware Incident Response by Tictac
PDF
The Cost of Doing Nothing: A Ransomware Backup Story
PPTX
Intelligence-based computer network defence: Understanding the cyber kill cha...
PDF
Part 1: Identifying Insider Threats with Fidelis EDR Technology
PPT
Safeguard your enterprise against ransomware
PPTX
Demo how to detect ransomware with alien vault usm_gg
PPTX
Cyber Ethics: Cyber Security Services | VAPT and WAPT
PPTX
VAPT - Vulnerability Assessment & Penetration Testing
PPTX
Tictaclabs Managed Cyber Security Services
PDF
Hunting for cyber threats targeting weapon systems
PPTX
Netpluz Managed SOC - MSS Service
PPTX
Insider Threats: How to Spot Trouble Quickly with AlienVault USM
PDF
Cylance Protect-Next-Generation Antivirus-Overview
PPTX
Red Team vs. Blue Team
PPTX
Insider Threat Solution from GTRI
PDF
Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...
PDF
The Small Business Cyber Security Best Practice Guide
PDF
The State of Threat Detection 2019
Ransomware Response Guide IBM INCIDENT RESPONSE SERVICES
Proatively Engaged: Questions Executives Should Ask Their Security Teams
Recover your files from Ransomware - Ransomware Incident Response by Tictac
The Cost of Doing Nothing: A Ransomware Backup Story
Intelligence-based computer network defence: Understanding the cyber kill cha...
Part 1: Identifying Insider Threats with Fidelis EDR Technology
Safeguard your enterprise against ransomware
Demo how to detect ransomware with alien vault usm_gg
Cyber Ethics: Cyber Security Services | VAPT and WAPT
VAPT - Vulnerability Assessment & Penetration Testing
Tictaclabs Managed Cyber Security Services
Hunting for cyber threats targeting weapon systems
Netpluz Managed SOC - MSS Service
Insider Threats: How to Spot Trouble Quickly with AlienVault USM
Cylance Protect-Next-Generation Antivirus-Overview
Red Team vs. Blue Team
Insider Threat Solution from GTRI
Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...
The Small Business Cyber Security Best Practice Guide
The State of Threat Detection 2019
Ad

Similar to Cylance Ransomware-Remediation & Prevention Consulting Data-sheet (20)

PDF
Cylance_Protect_Datasheet
PPTX
Cyber Resilency VANCOUVER, BC Nov 2017
PPTX
Overview of Ransomware Solutions from Protection to Detection and Response.pptx
PDF
Ransomware and Emerging Cyber Threats: Why It's More Than Just An IT Problem ...
PDF
Threat Landscape Lessons from IoTs and Honeynets
PPTX
Security O365 Using AI-based Advanced Threat Protection
PPTX
Stranded on Infosec Island: Defending the Enterprise with Nothing but Windows...
PPTX
The State of Endpoint Security Today
PDF
Webinar NETGEAR - Come Netgear può aiutare a mitigare gli effetti del Ransomware
PDF
Cylance Information Security: Compromise Assessment Datasheet
PDF
Glasswall - How to Prevent, Detect and React to Ransomware incidents
PPTX
LIFT OFF 2017: Ransomware and IR Overview
PDF
Securing Your Digital Assets A Comprehensive Approach to Ransomware Protectio...
PPTX
Integrated cyber defense
PPTX
CynergisTek’s Ransomware Bootcamp
PPTX
Ransomware Bootcamp with CTEK and GroupSense
PDF
FBI Ransomware Report
PPTX
2022 Rea & Associates' Cybersecurity Conference
 
PPTX
Cyber Incident Response Proposed Strategies
Cylance_Protect_Datasheet
Cyber Resilency VANCOUVER, BC Nov 2017
Overview of Ransomware Solutions from Protection to Detection and Response.pptx
Ransomware and Emerging Cyber Threats: Why It's More Than Just An IT Problem ...
Threat Landscape Lessons from IoTs and Honeynets
Security O365 Using AI-based Advanced Threat Protection
Stranded on Infosec Island: Defending the Enterprise with Nothing but Windows...
The State of Endpoint Security Today
Webinar NETGEAR - Come Netgear può aiutare a mitigare gli effetti del Ransomware
Cylance Information Security: Compromise Assessment Datasheet
Glasswall - How to Prevent, Detect and React to Ransomware incidents
LIFT OFF 2017: Ransomware and IR Overview
Securing Your Digital Assets A Comprehensive Approach to Ransomware Protectio...
Integrated cyber defense
CynergisTek’s Ransomware Bootcamp
Ransomware Bootcamp with CTEK and GroupSense
FBI Ransomware Report
2022 Rea & Associates' Cybersecurity Conference
 
Cyber Incident Response Proposed Strategies
Ad

Recently uploaded (20)

PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
GamePlan Trading System Review: Professional Trader's Honest Take
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Approach and Philosophy of On baking technology
PPTX
Cloud computing and distributed systems.
PDF
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
PDF
GDG Cloud Iasi [PUBLIC] Florian Blaga - Unveiling the Evolution of Cybersecur...
PDF
Advanced Soft Computing BINUS July 2025.pdf
PDF
Modernizing your data center with Dell and AMD
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Advanced IT Governance
PDF
Electronic commerce courselecture one. Pdf
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Reach Out and Touch Someone: Haptics and Empathic Computing
Per capita expenditure prediction using model stacking based on satellite ima...
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
The Rise and Fall of 3GPP – Time for a Sabbatical?
GamePlan Trading System Review: Professional Trader's Honest Take
Understanding_Digital_Forensics_Presentation.pptx
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Mobile App Security Testing_ A Comprehensive Guide.pdf
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Approach and Philosophy of On baking technology
Cloud computing and distributed systems.
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
GDG Cloud Iasi [PUBLIC] Florian Blaga - Unveiling the Evolution of Cybersecur...
Advanced Soft Computing BINUS July 2025.pdf
Modernizing your data center with Dell and AMD
NewMind AI Monthly Chronicles - July 2025
Advanced IT Governance
Electronic commerce courselecture one. Pdf
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf

Cylance Ransomware-Remediation & Prevention Consulting Data-sheet

  • 1. RANSOMWARE PREVENTION & REMEDIATION Don’t be the next victim Current Ransomware Threat Environment  Today’s ransomware campaigns are very different from what we have seen in the past. On the one hand, ransomware can be easily obtained and used successfully by criminals that have little to no hacking skills, often referred to as Ransomware as a Service (RaaS). On the other hand, we are seeing ransomware being used for much more than just ransoms. In some cases, we have seen it used as a diversion; first harvesting credentials for later use, and then encrypting the drive to keep IT staff occupied while the attacker covers their tracks and accomplishes even more nefarious objectives. And more recently, we are seeing highly opportunistic campaigns that encrypt entire networks in an organization and delete host backups prior to encryption, leaving the entire organization held hostage and unable to operate. Cylance® offers two complementary service offerings to help organizations address this evolving threat. Proactive Prevention and Readiness Cylance offers best practices for prevention, network architecture, internal IR workflows, vulnerability and patch management, and assessment of both internal hosts and externally facing services that criminals are using to gain foothold. When it comes to ransomware, prevention and preparation are the best medicine. Once execution takes place, the business cost and business risk go up exponentially. Likewise, organizations that are well prepared for ransomware can greatly minimize the business impact of an IT incident in general. Cylance’s Proactive Prevention and Readiness services cater specifically to the ransomware epidemic by: •  Leveraging the power of machine learning and artificial intelligence to allow predictive, autonomous, pre-execution prevention •  Providing world-renowned, highly sought after, knowledgeable consultants with the expertise to facilitate remediation of a ransomware attack •  Imparting wisdom BEFORE the attack occurs to ensure the best preparation, preventative technologies, and workflows are in place The SamSam (aka Samas, or Samsa) ransomware is a new generation of ransomware that is not industry specific. This threat: •  Does not typically rely upon traditional spear-phishing or watering-hole attack vectors •  Leverages vulnerable externally-facing services to move laterally and establish persistence, this is performed manually by the bad actor •  Can canvas and encrypt entire networks instead of just a handful of individual hosts •  Backup systems are targeted within the network and archives deleted instead of just being encrypted, leaving victims little to no recourse1 1- FBI FLASH MC-000070-MW distributed by the FBI to specific entities (TLP:GREEN) on March 25, 2016. CONSULTING
  • 2. Incident Response, Rapid Containment and Risk Reduction  Not all ransomware is created equal. As soon as one variant is released, a host of ‘copy-cat’ variants emerge, and some of them use entirely different encryption algorithms and key-exchanges, while others still, use new command and control infrastructures or different attack vectors. In the unfortunate case an organization needs to call in IR services, it is important to demand experienced responders armed with a structured process and custom-built tools so these types of determinations can be made quickly in order to move to rapid containment. The Cylance IR team has conducted hundreds of IR engagements just this last year alone. They are experts in hunting for key indicators of compromise for current active campaigns and are able to directly leverage Cylance’s machine learning and artificial intelligence engine for immediate containment during the IR process, all without installing any agents or tipping their hat to the criminals behind the campaign. The goal during any ransomware compromise is the same: reduce the risk and cost to the organization, and restore operations as soon as possible; all while moving silently, quickly and purposefully. Cylance Consulting is focused on immediate containment without a managed service provider commitment or agents left on your network. We eliminate the vulnerability and prevent it from further exposure, permanently. We challenge you to find an organization that can contain incidents faster and prevent them from occurring in the future. Cylance’s Incident Response, Rapid Containment and Risk Reduction of ransomware compromises provides: •  Experts in the space who have completed hundreds of IRs per year •  Custom-developed tools to specifically address today’s advanced ransomware •  Structured and proprietary response workflows to rapidly identify and contain the campaign •  Ransomware analysis to determine if certain aspects are breakable in order to possibly defeat the need to pay ransom •  Assistance in negotiating with criminal actors behind attack campaigns during late-stage attack campaigns •  The benefits of artificial intelligence without the need to install a host-based agent, which can tip off the criminals behind the campaign Related Services and Products Industrial Control Systems • ICS Infrastructure Assessment • ICS Compromise Assessment • Building Automation Systems • Incident Response Services for Control Systems Internet of Things / Embedded • Incident Response for IoT and Embedded Systems • Penetration Testing for Embedded Systems Enterprise Security Services • Internal / External Penetration Testing • Social Engineering • Web Application Assessment Training • Custom Incident Response and Forensics Training • ICS Security Essentials Incident Response and Compromise Assessment • Malware and Incident Response Retainer Services • Incident Readiness Assessment • Emergency Incident Response ThreatZERO™ • ThreatZERO + Compromise Assessment • ThreatZERO Resident Expert Healthcare • Clinical Information Security Program Development • Clinical Application Security Assessments • Medical Device Risk Assessment • HIPAA Compliance Contact Cylance Consulting to begin your journey to ThreatZERO™ today! +1 (877) 97DEFEND proservices@cylance.com www.cylance.com 18201 Von Karman, Ste. 700 Irvine, CA 92612 ©2016 Cylance Inc. Cylance® and CylancePROTECT® and all associated logos and designs are trademarks or registered trademarks of Cylance Inc. All other registered trademarks or trademarks are property of their respective owners.