Ransomware Incident Playbook¶
CRITICAL — Activate IR Team Immediately
Ransomware is a Severity 1 incident. Do not attempt solo containment. Convene the IR bridge within 15 minutes of confirmed trigger. Every minute of delay increases encryption scope.
Metadata¶
| Field | Value |
|---|---|
| Playbook ID | IR-PB-001 |
| Severity | Critical (P1) |
| RTO — Containment | < 4 hours |
| RTO — Recovery | < 72 hours |
| Owner | IR Lead |
| Escalation | CISO → Legal → Executive Sponsor |
| Last Reviewed | 2025-01-01 |
Trigger Conditions¶
Activate this playbook on any of the following:
- [ ] VSS / Volume Shadow Copy deletion detected (
vssadmin delete shadows,wmic shadowcopy delete) - [ ] Bulk file extension change alert from EDR (e.g.,
.locked,.encrypted,.[threat-actor]) - [ ] Mass file rename/write events exceeding threshold (>500 files/min on any host)
- [ ] Ransom note file detected (
README.txt,DECRYPT_FILES.html,HOW_TO_RECOVER.txt) - [ ] Backup system or agent reporting sudden disconnection
- [ ] EDR alert:
vssadmin,bcdedit /set recoveryenabled no, orwbadmin delete catalog - [ ] Network anomaly: large outbound transfer to unknown destination immediately prior
Decision Tree¶
flowchart TD
A([Ransomware Trigger Detected]) --> B{Is encryption\nactively in progress?}
B -- Yes --> C[ISOLATE affected hosts\nimmediately via EDR]
B -- No --> D{Identify patient zero\nand blast radius}
C --> E{Is a Domain Controller\naffected?}
D --> E
E -- Yes --> F[Initiate krbtgt\ndouble-reset procedure]
E -- No --> G{Is exfiltration\nconfirmed?}
F --> G
G -- Yes --> H[Notify Legal\nStart regulatory clock\nOFAC check]
G -- No --> I[Proceed to\nPhase 2 — Eradicate]
H --> I
I --> J{Backups\nintact and clean?}
J -- Yes --> K[Phase 3 — Recover\nfrom immutable backup]
J -- No --> L[Assess ransom\nnegotiation framework\nOFAC screen first]
K --> M([Post-Incident Review])
L --> M Phase 1 — Contain (0–2 Hours)¶
Do not reboot affected systems before forensic snapshots are captured.
1.1 EDR Isolation¶
CrowdStrike Falcon (CLI):
# Isolate a host by device ID
falconctl -s --cid=<CID> network-containment --action=contain --host-id=<DEVICE_ID>
# Bulk isolate by hostname list
while IFS= read -r host; do
falconctl contain --hostname "$host"
done < affected_hosts.txt
# Verify containment status
falconctl containment status --hostname <HOSTNAME>
Microsoft Defender for Endpoint (MDE) via PowerShell:
# Isolate device via MDE API (requires DeviceId)
$headers = @{ Authorization = "Bearer $token"; "Content-Type" = "application/json" }
Invoke-RestMethod -Method Post `
-Uri "https://api.securitycenter.microsoft.com/api/machines/$DeviceId/isolate" `
-Headers $headers `
-Body '{"Comment":"Ransomware IR — IR-PB-001","IsolationType":"Full"}'
1.2 Active Directory — Emergency Account Actions¶
# Disable all accounts observed in ransom execution context
$accounts = @("svc-backup","svc-admin","compromised-user")
foreach ($acct in $accounts) {
Disable-ADAccount -Identity $acct
Write-Host "[$(Get-Date -Format u)] Disabled: $acct"
}
# Force logoff active sessions for compromised accounts
$sessions = Get-ADUser -Filter {Enabled -eq $true} -Properties LastLogonDate |
Where-Object { $_.LastLogonDate -gt (Get-Date).AddHours(-4) }
# Review $sessions before mass revocation
1.3 Backup System Isolation¶
- [ ] Immediately disconnect backup agents on affected hosts from the backup network VLAN
- [ ] Set backup server to read-only mode — no new jobs accepted
- [ ] Verify immutable/air-gapped backup integrity (do not mount until Phase 3)
- [ ] Notify cloud backup provider (e.g., Veeam Cloud Connect, Azure Backup) to halt sync
1.4 Stakeholder Notifications (within 30 min)¶
| Recipient | Channel | Message |
|---|---|---|
| CISO | Phone + Signal | "P1 Ransomware confirmed — IR bridge open" |
| Legal Counsel | Phone | "Potential data exfil — regulatory clock may be running" |
| Executive Sponsor | Phone | Brief: scope, containment status, next update in 60 min |
| IT Operations | Slack/Teams | Maintenance mode on affected systems — do not reboot |
| PR / Communications | Standby — do not communicate externally |
Phase 2 — Eradicate (2–24 Hours)¶
2.1 Malware Removal¶
- [ ] Submit ransom binary, note, and dropped files to sandbox (CrowdStrike Sandbox, Any.run, VirusTotal)
- [ ] Identify ransomware family via Ransom.live, ID Ransomware (nomoreransom.org)
- [ ] Pull IOCs (hashes, C2 IPs, registry keys) and push to EDR as custom IOAs
- [ ] Run full EDR scan across all non-isolated hosts with updated IOC set
2.2 Persistence Hunting Checklist¶
- [ ] Scheduled tasks:
schtasks /query /fo LIST /v | findstr /i "ransomware-related-name" - [ ] Registry run keys:
HKCU\Software\Microsoft\Windows\CurrentVersion\Run - [ ] WMI subscriptions:
Get-WMIObject -Namespace root\subscription -Class __EventFilter - [ ] Services: look for newly created services in the 48h window prior to execution
- [ ] Startup folders:
%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup - [ ] BITS jobs:
bitsadmin /list /allusers /verbose
2.3 krbtgt Double-Reset Procedure¶
Required if ANY Domain Controller was reached by ransomware or the attacker had domain admin.
# Step 1 — Reset krbtgt password (first reset)
Import-Module ActiveDirectory
$krbtgt = Get-ADUser -Identity krbtgt
Set-ADAccountPassword -Identity krbtgt -Reset `
-NewPassword (ConvertTo-SecureString -AsPlainText (New-Guid).Guid -Force)
Write-Host "[$(Get-Date -Format u)] krbtgt first reset complete. Ticket lifetime: wait 10 hours."
# Step 2 — Wait at minimum the maximum Kerberos ticket lifetime (default 10 hours)
# Then perform second reset to invalidate any Golden Tickets minted after the first reset
Set-ADAccountPassword -Identity krbtgt -Reset `
-NewPassword (ConvertTo-SecureString -AsPlainText (New-Guid).Guid -Force)
Write-Host "[$(Get-Date -Format u)] krbtgt second reset complete."
2.4 Credential Reset Scope¶
| Account Type | Action | Priority |
|---|---|---|
| Domain Admin accounts | Immediate reset + re-enroll MFA | P1 |
| Service accounts (on affected hosts) | Reset all | P1 |
| Local admin accounts | Reset via LAPS or manual | P1 |
| All user accounts (if DC compromised) | Force password change at next logon | P2 |
| Cloud/SaaS tokens | Revoke all sessions | P1 |
Phase 3 — Recover (24–72 Hours)¶
3.1 Recovery Tier Priorities¶
Tier 1 (0–8h): Domain Controllers → DNS → DHCP → Authentication Infrastructure
Tier 2 (8–24h): Core business applications → Email → VPN
Tier 3 (24–48h): Secondary apps → File shares → Collaboration tools
Tier 4 (48–72h): Non-critical systems → Dev/test environments
3.2 Restore from Immutable Backups¶
- [ ] Verify backup hash integrity before mounting:
sha256sum backup.vbk - [ ] Restore to isolated VLAN — do not reconnect to production until clean bill of health
- [ ] Validate restored systems with EDR scan before production reconnection
- [ ] Confirm no ransomware artifacts present in restored data (check backup timestamp vs. infection time)
- [ ] Re-apply all security baselines (CIS Benchmarks, STIG) post-restore
3.3 Integrity Verification¶
# Verify critical system file hashes post-restore
find /restored_mount -type f -name "*.exe" -o -name "*.dll" | \
xargs sha256sum > post_restore_hashes.txt
# Compare against known-good baseline
diff known_good_hashes.txt post_restore_hashes.txt
Phase 4 — Post-Incident Actions¶
4.1 OFAC Sanctions Check¶
MANDATORY before any ransom payment consideration.
Paying ransom to a sanctioned entity violates U.S. Treasury OFAC regulations. Engage legal counsel immediately. Reference: OFAC Advisory on Ransomware Payments (Oct 2020, updated Nov 2021).
- [ ] Cross-reference ransomware group against OFAC SDN list (ofac.treasury.gov)
- [ ] Review CISA ransomware advisories for attribution
- [ ] Obtain legal opinion before ANY negotiation or payment
4.2 Law Enforcement Notification¶
| Agency | Contact | When |
|---|---|---|
| FBI (CISA) | ic3.gov / 1-855-292-3937 | Within 24h of confirmation |
| CISA | cisa.gov/report / 888-282-0870 | Within 24h |
| Secret Service (financial) | If payment systems affected | As applicable |
| Local FBI field office | Case agent assignment | FBI will advise |
4.3 Regulatory Notifications¶
| Regulation | Notification Trigger | Deadline | Recipient |
|---|---|---|---|
| GDPR | Personal data of EU subjects affected | 72 hours | Lead Supervisory Authority (DPA) |
| GDPR (subject) | High risk to individuals | Without undue delay | Affected data subjects |
| HIPAA | PHI affected | 60 days | HHS + individuals; media if >500 in state |
| NY SHIELD / NYDFS | NY residents' data affected | Expedient / 72h (NYDFS) | NYS AG + NYDFS |
| CA CCPA | CA residents' PI affected | Expedient | CA AG |
| SEC (public cos.) | Material cybersecurity incident | 4 business days | Form 8-K Item 1.05 |
4.4 Ransom Negotiation Decision Framework¶
Decision Gate 1: Are backups viable? → YES → Do not pay. Recover from backup.
Decision Gate 2: OFAC sanctions check → SANCTIONED GROUP → Do not pay. Legal exposure.
Decision Gate 3: Exfiltration confirmed + sensitive data → Legal + insurance review
Decision Gate 4: Business impact of non-recovery > estimated ransom → Insurance claim + legal opinion
Final: Any payment requires legal counsel sign-off + cyber insurance carrier notification
Runbook Checklist¶
Detection & Triage¶
- [ ] Incident confirmed and IR bridge opened
- [ ] Severity assigned (P1 — Critical)
- [ ] IR Lead designated and on bridge
- [ ] CISO, Legal, and Executive Sponsor notified
- [ ] Patient zero identified
Containment¶
- [ ] All affected hosts isolated via EDR
- [ ] Compromised AD accounts disabled
- [ ] Backup systems disconnected from production
- [ ] Network egress to attacker C2 blocked (firewall/proxy)
Eradicate¶
- [ ] Ransomware family identified
- [ ] IOCs pushed to EDR and SIEM
- [ ] Persistence mechanisms removed
- [ ] krbtgt double-reset completed (if DC affected)
- [ ] All compromised credentials reset
Recover¶
- [ ] Backup integrity verified
- [ ] Systems restored in tier priority order
- [ ] EDR scan passed on all restored systems
- [ ] Security baselines re-applied
Post-Incident¶
- [ ] OFAC check completed and documented
- [ ] FBI / CISA notified
- [ ] Regulatory notifications sent (log dates)
- [ ] Cyber insurance claim filed
- [ ] Post-incident review scheduled (within 2 weeks)
- [ ] Lessons learned documented and actioned
Nexus SecOps Benchmark Control Mapping¶
| Control ID | Control Name | Playbook Phase |
|---|---|---|
| Nexus SecOps-RS-01 | Ransomware Detection & Alerting | Trigger / Detection |
| Nexus SecOps-RS-02 | Endpoint Isolation Capability | Phase 1 — Contain |
| Nexus SecOps-RS-03 | Immutable Backup Verification | Phase 3 — Recover |
| Nexus SecOps-RS-04 | Credential Compromise Response | Phase 2 — Eradicate |
| Nexus SecOps-RS-05 | Regulatory Notification Procedures | Phase 4 — Post-Incident |
| Nexus SecOps-RS-06 | Ransom Payment Decision Framework | Phase 4 — Post-Incident |