Back

Navigating Ransomware Attacks - Cybersecurity Video Use Case

Ransomware Recovery

The Outcome

The client’s existing Incident Response retainer with Booz Allen was critical to preventing a catastrophic event for their business. The client was able to restore their networks quickly and secure their data without having to pay the ransom demanded. Business operations were restored, and the firm’s strong reputation remained intact.  

The Situation
One Fortune 500 company faced a crippling ransomware attack and multi-million dollar demand. Threat actors had encrypted their network, creating panic throughout the entire company. Unfortunately for the threat actors, the company had an Incident Response retainer with Booz Allen.
encrypted cube showing level on encryption achieved
The Situation
encrypted cube showing level on encryption achieved
One Fortune 500 company faced a crippling ransomware attack and multi-million dollar demand. Threat actors had encrypted their network, creating panic throughout the entire company. Unfortunately for the threat actors, the company had an Incident Response retainer with Booz Allen.
The Approach
Speed matters! Our client’s pre-established incident response (IR) retainer with Booz Allen allowed a hand-picked team from our team of over 5,000 cyber experts to immediately implement a strategic plan to remediate the breach. Our experienced negotiator handled communications with the threat actor cartel, working to minimize damage by enabling the client to make informed decisions, and prolonging the negotiation while our cyber analyst applied their unparalleled tradecraft.
slides showing cyber incident response (IR) methods, including ransomware negotiations and digital forensics
The Approach
slides showing cyber incident response (IR) methods, including ransomware negotiations and digital forensics
Speed matters! Our client’s pre-established incident response (IR) retainer with Booz Allen allowed a hand-picked team from our team of over 5,000 cyber experts to immediately implement a strategic plan to remediate the breach. Our experienced negotiator handled communications with the threat actor cartel, working to minimize damage by enabling the client to make informed decisions, and prolonging the negotiation while our cyber analyst applied their unparalleled tradecraft.

Ready to Learn More?

1 - 4 of 7