Ransomware has evolved from high-volume and “spray and pray” tactics to a more focused “stay and play” model, where operators take their time to learn the victims and their networks, and then swiftly infect hosts. Besides encrypting data, an increasing number of adversaries now exfiltrate and threaten to publish stolen data to increase ransom payments.
RANSOMWARE READINESS ASSESSMENT
The Unit 42 Ransomware Readiness Assessment focuses on preparing your people, processes and technologies to mitigate the ransomware threat. We work with you to develop control enhancements, remediation recommendations and a playbook based on the latest best practices and threat intelligence to achieve a target state of ransomware readiness, helping you to:
COMPLETE RANSOMWARE ANALYSIS
Threat actors and ransomware can dwell in networks and on endpoints for months before encrypting files. The Complete Ransomware Analysis addresses this challenge with a ransomware-focused compromise assessment. Using Unit 42 threat intelligence and advanced forensics, we'll work with you to scan endpoints in your environment, review forensic artifacts and collect endpoint telemetry to uncover evidence of malicious files or activity often associated with early stages of the ransomware lifecycle. This option includes:
Learn how you can achieve a target state of ransomware readiness in this datasheet.
Join us for a Unit 42 Briefing by VP, Unit 42 Threat Intelligence, Ryan Olson.
Learn how you can put the world-class Unit 42 Incident Response team on speed dial in this datasheet.
Based on Unit 42 research and case data, this report exposes the latest ransomware threats and provides visibility into how the threats exploited business vulnerabilities in 2020.
The ransomware threat is growing, but it can be mitigated. Find out ransomware trends and how to prevent and respond to attacks.
Get actionable insight into adversaries’ methods and operations, the latest ransomware variants, and how these threats exploited business vulnerabilities during a tumultuous 2020.
Hear about some of the most advanced ransomware attacks of 2020 and learn what steps you can take to avoid an attack.
A popular online social media site inadvertently exposed consumer data. They needed an investigation to determine what happened, the scope of exposure, and how to properly secure their servers.