Thank you Jake for this valuable information. The hacker has email from "india" but that could be a hoax too.I have forwarded your email to the President and Controller yesterday. I will let you know what they decide.Merry Christmas,CeciCecilia M. Adams
AR/Credit & Collections
Hagadone Printing Company274 Pu’uhale RoadHonolulu, HI 96819
Off: (808) 852-6322
Fax: (808) 841-0094Email: ceci...@hagadoneprinting.comCONFIDENTIALITY NOTICE: This e-mail may contain confidential information. Do not read this e-mail if you are not the intended recipient. If you have received this transmission in error, please notify us immediately by replying to the e-mail or by telephone at (808) 847-5310 and destroy the original transmission and any attachments without reading or saving the transmission in any manner. Thank you.On Wed, Dec 21, 2016 at 3:07 PM, Jake Ross <ja...@cakesecurity.com> wrote:Ceci,I'll preface this conversation with the fact that I do not know anything specific to your case. Everything below is generalized based on my experiences. The playbook is generally the same but not every criminal follows it line by line.The objective of ransomware to spam a bunch of people with the hopes that someone will click on a link to allow them access. They gain access by exploiting a vulnerability. Vulnerabilities are fixed every day with patches we don't always get to them in a timely manner. Once they get access they encrypt files that you may need. If you pay the $100k, they will give you they key to decrypt your files.1. Determine the scope- How many machines are affected? Did other users get the same email? Did anyone else open it?2. Identify the ransomware type- Ransomware is based off of math. Good guys can reverse engineer the encrypted files and make a decryption key of their own. Upload the encrypted files to find out. If a key is available use it to get your stuff back.3. Restore from backup- If you have good backups, restore them to clean machine and call it a day.4. Report it- No one knows the real numbers of ransomware attacks because not everyone reports it. Typically its publicly traded companies that don't want to reduce shareholder confidence and see prices drop. I would encourage your company to report it. https://www.ic3.gov/media/2016/160915.aspx5. Wipe the machine- Assume the bad guys have done other things to the machine. Securely wipe the machine and reload it.6. Post Mortem- Talk about this incident and how it could have been prevented. Talk to your users and make sure everyone understands.Check out the blog post for more information. http://blog.cyberhui.org/2016/08/tech-tip-tuesday-no-more-ransom.htmlI hope this helps. Let me know if you need anything else.Good Luck,JakeOn Wed, Dec 21, 2016 at 1:51 PM, Cecilia Adams <ceci...@hagadoneprinting.com> wrote:Thanks for your advice. Please send me a list of things to do so I can pass it on to our President and Controller.CeciCecilia M. Adams
AR/Credit & Collections
Hagadone Printing Company274 Pu’uhale RoadHonolulu, HI 96819
Off: (808) 852-6322
Fax: (808) 841-0094Email: ceci...@hagadoneprinting.comCONFIDENTIALITY NOTICE: This e-mail may contain confidential information. Do not read this e-mail if you are not the intended recipient. If you have received this transmission in error, please notify us immediately by replying to the e-mail or by telephone at (808) 847-5310 and destroy the original transmission and any attachments without reading or saving the transmission in any manner. Thank you.
--
You received this message because you are subscribed to the Google Groups "xCND" group.
To unsubscribe from this group and stop receiving emails from it, send an email to xcnd+uns...@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.
To unsubscribe from this group and stop receiving emails from it, send an email to xcnd+unsubscribe@googlegroups.com.
--
You received this message because you are subscribed to the Google Groups "xCND" group.
To unsubscribe from this group and stop receiving emails from it, send an email to xcnd+unsubscribe@googlegroups.com.