Ransomware recovery
We helped a Fortune 500 manufacturing company recover from a terrifying ransomware attack and reinforce their IT security.
We helped a Fortune 500 manufacturing company recover from a terrifying ransomware attack and reinforce their IT security.
A US-based Fortune 500 manufacturing company fell victim to one of the more terrifying IT vulnerabilities facing any business: a ransomware attack that encrypted virtually all of its IT systems, from its enterprise resource planning applications down to each employee鈥檚 laptop. By waiting until the beginning of a holiday, the attackers had gained the time they needed to complete such a widespread assault. To guide its recovery, the company called 乐鱼(Leyu)体育官网.
A large manufacturing company fell victim to a ransomware attack that encrypted virtually all of its IT systems and employee laptops. It decided not to pay the ransom and instead called 乐鱼(Leyu)体育官网.
乐鱼(Leyu)体育官网 took a three-phase approach to resolving the crisis. First, get the client to a base level of 鈥渂usiness as acceptable.鈥� Next, return the client to 鈥渂usiness as usual鈥� but with a more secure and resilient cloud-based IT infrastructure. Finally, migrate the client to a fully 鈥渂usiness as transformed鈥� state taking full advantage of a cloud-first IT infrastructure.
Within days, the client鈥檚 employees were back to conducting business using paper templates and email. Within four months they were back to business as usual 鈥� but now on a more secure cloud-based IT infrastructure. 乐鱼(Leyu)体育官网 then took the client a step further by migrating its remaining systems and management tools to the cloud to enjoy significantly enhanced security protections and greater business agility.
On this episode, we explore recovering from a ransomware attack and how businesses can strengthen their IT systems to protect themselves.
Our mission, therefore, was straightforward: recover as much of the company鈥檚 data as possible, deploy replacement information systems in a resilient cloud-based infrastructure, and secure that infrastructure against future attacks.
We divided the project into three recovery phases:
To enable employees to conduct business as acceptable, our team focused first on the highest priority activities.
We provided paper templates to record transactions in a consistent and accurate manner so the information could be processed once replacement software systems were operable.
On the technology front, our first order of business was giving employees access to their data. Among other things, this meant ordering and configuring approximately 3,000 new laptops, which we were able to do by working closely with two computer manufacturers who were able to respond in a remarkably short period of time.
We also began replacing the inoperable on-premises IT infrastructure with a cloud-based version built on the Microsoft Azure cloud computing platform. Our first step was to recreate the company鈥檚 identity and access management systems to enable employees to log onto their software systems securely, which we accomplished by migrating them to the Azure Active Directory identify management platform and a Microsoft Office 365 tenant. To ensure security, we defined roles and permissions in a carefully crafted hierarchy. In the Azure administration portal, for example, which by default would give any administrator access to the entire infrastructure, we implemented multi-factor authentication and a 鈥渓anding zone鈥� designed to automate controls and enforce governance. We also required two or more simultaneous peer approvals to take any action that could compromise data or backups.
In concert with these efforts, a separate 乐鱼(Leyu)体育官网 team focused on recovering as much data as possible from the client鈥檚 encrypted systems. Working closely with our key alliance partner, Microsoft, we recovered a surprisingly large amount of data saved primarily in file shares or development systems. Luck was a factor: we discovered one server that had been taken offline for maintenance just prior to the attack and were able to use it to restore the on-premises Active Directory service. By piecing together thousands of separate threads of information from hundreds of different sources we reconstructed most of the company鈥檚 key data. We then cleaned and organized this data to prepare it for import into the replacement systems once they were configured and available.
The company faced a pressing deadline during this first phase of recovery: the filing of its 10-K annual report with the Securities and Exchange Commission.
A 10-K details a company鈥檚 business and financial condition. To avoid reporting material risks or weaknesses 鈥� potentially exposing it to further attacks 鈥� the company had to quickly implement new security controls and prove to its auditor that it could successfully manage any further cyber assaults. With only six weeks until the audit, we recommended building controls into Microsoft Azure and storing the company鈥檚 critical data there. This approach worked, and the company was able to pass its auditor鈥檚 test and issue a clean 10-K.
For the next phase of the recovery, 乐鱼(Leyu)体育官网 completed a secure restore of the company鈥檚 core software solutions, including its ERP, customer resource management, and human resources systems. They were built in the cloud and secured with Microsoft security features such as Single Sign-On, Multi-Factor Authentication, Web Firewalls, and Endpoint Detection and Response.
The final phase of the project involved helping the client migrate its remaining systems to the cloud and managing both cloud and on-premises systems.
Using capabilities embedded in the company鈥檚 Microsoft 365 E3+ license, we implemented Azure monitoring, patch management, and MicrosoftSentinel, a cloud-native security information and event manager platform. Taking advantage of Microsoft Azure ARC, a set of technologies that bring Azure security and other cloud-native services to hybrid and multicloud environments, we also extended the capabilities of these tools to the few remaining on-premises systems. We sent all data to Microsoft Defender for Cloud to detect configuration drifts.
As part of this final phase we also helped update much of the client鈥檚 network infrastructure, including replacing outdated telecom provider circuits, re-architecting the network in Azure, moving the company鈥檚 virtual private network to Azure, and relocating processing-intensive and time-sensitive activities to data centers closer to where data was being generated or used.
In addition to guiding these software implementations we helped the client rethink its IT operations, beginning with development of an IT roadmap and project portfolio. We then helped the company create a new internal cyber security team complete with a staffing model and budget. We armed this team with the tools and processes needed to conduct both penetration testing and automated security audits.
During this phase of the project we also helped our client create a more robust disaster recovery framework that included provisions for handling any future ransomware attacks. Phishing was the most likely source of the original attack, and this new framework incorporated phishing testing capabilities to help spot any places where the company鈥檚 systems may still be susceptible to human vulnerabilities.
Finally, we helped the company create an IT architecture review board to guide future development efforts and establish the next set of priorities.
As with many large organizations, our client had fueled its growth through acquisitions, swallowing as many as 60 smaller firms in recent years.
This had left it with a tangle of disparate IT systems that made the recovery effort significantly more complex. While addressing the most important of these subsidiary鈥檚 systems we designed and documented the processes we used to update them. The client鈥檚 internal team was then able to use these processes to take over the effort and safely integrate the remaining systems into the new cloud-based architecture. These same processes will act as the framework for integrating IT systems in future acquisitions.
Microsoft Azure Arc was used to manage the company鈥檚 proprietary, non-Azure systems as if they were Azure native.
Employee laptops were configured with Microsoft Office 365 E3, a suite of cloud-based productivity apps including Word, Excel, PowerPoint, Outlook and Teams.
We included people with experience and expertise in:
A key mission for the latter group: ensure the attackers would not be able to return.
Phase one 鈥� business as acceptable 鈥� was completed in less than two months. Phase two 鈥� the return to business as usual 鈥� came just two months after that. By then, all key data had been recovered and restored in the new cloud-based IT environment, and the company was able to file its 10-K annual report with the SEC on time 鈥� without reporting any significant deficiencies.
Today the client is a transformed business operating with significantly enhanced security protections and greater business agility. Its modern, cloud-first IT infrastructure leverages the full breadth of Microsoft technology to maintain operations and protect against future cyberattacks.
Unlike business-only consultancies, our more than 15,000 technology professionals have the resources, engineering experience, battle-tested tools and close alliances with leading technology providers to deliver on your vision 鈥� quickly, efficiently and reliably. And unlike technology-only firms, we have the business credentials and sector experience to help you deliver measurable business results, not just blinking lights.
Our professionals immerse themselves in your organization, applying industry knowledge, powerful solutions and innovative technology to deliver sustainable results. Whether it鈥檚 helping you lead an ESG integration, risk mitigation or digital transformation, 乐鱼(Leyu)体育官网 creates tailored data-driven solutions that help you deliver value, drive innovation and build stakeholder trust.