Ransomware attacks have gained prominence in recent times, and organizations across the world have implemented policies and advisories to counter the threat.
In this exercise, you will be faced with a real ransomware attack. To successfully complete this exercise, you must construct a complete and accurate chain of events by conducting a full technical forensic investigation on the infected stations, the network and the C&C Server. During your investigation, you will encounter the challenges of responding to a ransomware event and be exposed to different prevention methods for such a threat.
Ransomware attacks have gained prominence in recent times, and organizations across the world have implemented policies and advisories to counter the threat.
In this exercise, you will be faced with a real ransomware attack. To successfully complete this exercise, you must construct a complete and accurate chain of events by conducting a full technical forensic investigation on the infected stations, the network and the C&C Server. During your investigation, you will encounter the challenges of responding to a ransomware event and be exposed to different prevention methods for such a threat.