Ransomware Detection Playbook
Introduction: The Need for Effective Ransomware Detection Capabilities
Table of Contents
1. Initial Detection of Ransomware Activity
Query Option 1: Identify Suspicious File Modifications
Query Option 2: Detect Unusual Encryption Activities
Query Option 3: Advanced Network Traffic Analysis
2. Persistence Mechanisms
Query Option 1: Registry Persistence Indicators
Query Option 2: Scheduled Task Creation
Query Option 3: Startup Folder Monitoring
3. Privilege Escalation Indicators
Query Option 1: Detect Abnormal Account Activity
Query Option 2: Credential Dumping Attempts
Query Option 3: Privilege Escalation via Exploits
4. Lateral Movement
Query Option 1: SMB-Based Propagation
Query Option 2: Lateral Movement via Remote Execution
Query Option 3: Advanced Detection of SSH Movement
5. Data Exfiltration Detection
Query Option 1: Large Data Transfers to External IPs
Query Option 2: Anomalous Cloud Storage Activity
Query Option 3: DNS or HTTPS Exfiltration
6. Incident Response and Containment
Query Option 1: Isolate Affected Systems
Query Option 2: Identify Indicators of Compromise (IoCs)
Query Option 3: Incident Timeline Reconstruction
7. Conclusion
Last updated