Ransomware Attack & Containment Detection to Escalation: 1 Minute
Explore a real-world attack on a customer in the utilities industry. The threat actor leveraged a malicious encoded PowerShell Script (Base64) and within a minute of detection, the Âé¶¹¹û¶³ Labs team triggered an investigation.
We¡¯ll show you, step by step, how Âé¶¹¹û¶³ helped this customer both stop this attack as well as develop a roadmap for preventing future ones.

Average number of days to detect and remediate a ransomware attack

Actual time from detection to remediation in this real-world Âé¶¹¹û¶³ ransomware response
View Timeline Navigation
Wednesday, 4 May, 2022 |5:53 PM
Detection: Âé¶¹¹û¶³ Agent
Possible malicious encoded?PowerShell script (Base64) detected on an employee workstation
The suspicious obfuscated LOAD string is decoded
[LOCAL ADMIN PASSWORD] is changed by PowerShell Script
Wednesday, 4 May, 2022 | 5:54 pm
Investigation Triggered
Indicators of compromise (IoC) previously curated by?Âé¶¹¹û¶³ Labs triggers an?event of interest?
Âé¶¹¹û¶³ Platform correlates potential malicious activity with other known?IoCs
Incident escalated to Triage Team forensic dashboard with Urgent status
Wednesday, 4 May, 2022 | 5:58 PM
Investigation Escalated
Triage team identifies a Scheduled Task?created by PowerShell
PowerShell activity consistent with Gootloader, a multi-staged JavaScript package, likely dropped via SEO poisoning
Highly probable secondary payload was to be ransomware from a threat actor group?like?REvil
Wednesday, 4 May, 2022 | 6:01 PM
Endpoint Contained
Investigation concludes, resulting in endpoint containment via Âé¶¹¹û¶³ Agent based upon predefined customer instructions?
Gootloader prevented from launching secondary payload or connecting with C2 server?
Wednesday, 4 May, 2022 | 6:05 PM
Incident Ticketed
Customer notified of incident, containment, and remediations steps
Passwords reset for compromised admin?and services accounts
Customer decides to reimage infected device
Begin Post-Incident Zone
Wednesday, 4 May, 2022 | 6:06 PM
Post-Incident Security Journey
