{"id":1016,"date":"2021-03-10T10:18:28","date_gmt":"2021-03-10T16:18:28","guid":{"rendered":"https:\/\/idsinc.com\/?page_id=1016"},"modified":"2021-07-07T10:22:27","modified_gmt":"2021-07-07T16:22:27","slug":"schnelle-wiederherstellung-nach-einem-ransomware-angriff","status":"publish","type":"page","link":"https:\/\/idsinc.com\/de\/case-studies\/quick-recovery-from-ransomware-attack\/","title":{"rendered":"Schnelle Wiederherstellung nach einem Ransomware-Angriff"},"content":{"rendered":"<!--themify_builder_content-->\n<div id=\"themify_builder_content-1016\" data-postid=\"1016\" class=\"themify_builder_content themify_builder_content-1016 themify_builder tf_clear\">\n                    <div  data-lazy=\"1\" class=\"module_row themify_builder_row tb_sxix889 tb_first tf_w\">\n                        <div class=\"row_inner col_align_top tb_col_count_1 tf_box tf_rel\">\n                        <div  data-lazy=\"1\" class=\"module_column tb-column col-full tb_dvve891 first\">\n                    <!-- module image -->\n<div  class=\"module module-image tb_1zqw507 image-full-overlay   auto_fullwidth tf_mw\" data-lazy=\"1\">\n        <div class=\"image-wrap tf_rel tf_mw\">\n            <img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"512\" src=\"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/03\/iDS-Case-Study-Ransomware-1024x512.jpg\" class=\"wp-post-image wp-image-1010\" title=\"iDiscovery Solutions Case Study - Ransomware Attack\" alt=\"iDiscovery Solutions Case Study, Ransomware Attack, Case Study, iDiscovery Solutions, malware, iDS cybersecurity team\" srcset=\"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/03\/iDS-Case-Study-Ransomware-1024x512.jpg 1024w, https:\/\/idsinc.com\/wp-content\/uploads\/2021\/03\/iDS-Case-Study-Ransomware-300x150.jpg 300w, https:\/\/idsinc.com\/wp-content\/uploads\/2021\/03\/iDS-Case-Study-Ransomware-768x384.jpg 768w, https:\/\/idsinc.com\/wp-content\/uploads\/2021\/03\/iDS-Case-Study-Ransomware-16x8.jpg 16w, https:\/\/idsinc.com\/wp-content\/uploads\/2021\/03\/iDS-Case-Study-Ransomware.jpg 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/>    \n        <\/div>\n    <!-- \/image-wrap -->\n    \n        <\/div>\n<!-- \/module image -->        <\/div>\n                        <\/div>\n        <\/div>\n                        <div  data-lazy=\"1\" class=\"module_row themify_builder_row tb_z67o610 tf_w\">\n                        <div class=\"row_inner col_align_top tb_col_count_1 tf_box tf_rel\">\n                        <div  data-lazy=\"1\" class=\"module_column tb-column col-full tb_cajx611 first\">\n                    <!-- module fancy heading -->\n<div  class=\"module module-fancy-heading tb_aw59458\" data-lazy=\"1\">\n        <h1 class=\"fancy-heading\">\n    <span class=\"main-head tf_block\">\n                    HERAUSFORDERUNG            <\/span>\n\n    \n    <span class=\"sub-head tf_block tf_rel\">\n                                <\/span>\n    <\/h1>\n<\/div>\n<!-- \/module fancy heading -->\n<!-- module text -->\n<div  class=\"module module-text tb_vvfw5\" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <p><em><strong>Die Zentrale unseres Kunden wurde von Ransomware heimgesucht, die Dutzende von Computern verschl\u00fcsselte und den gesamten Betrieb lahmlegte.<\/strong><\/em><\/p>\n<p>Unser Kunde wurde von einem schw\u00e4chenden Ransomware-Angriff getroffen, bei dem Malware den Inhalt von Benutzersystemen und Unternehmensservern mit kritischen Kunden- und Firmendaten verschl\u00fcsselte.<\/p>\n<p><strong>iDS wurde beauftragt mit:<\/strong><\/p>\n<ul>\n<li>Identifizierung der Quelle und des Zeitpunkts des Angriffs<\/li>\n<li>Isolieren der Malware, Entfernen aus ihrer Umgebung und Wiederherstellen von Systemen, Anwendungen und Daten<\/li>\n<li>\u00dcberwachung von Vorg\u00e4ngen, um sicherzustellen, dass die Malware nicht erneut auftaucht<\/li>\n<\/ul>    <\/div>\n<\/div>\n<!-- \/module text --><!-- module fancy heading -->\n<div  class=\"module module-fancy-heading tb_fjro869\" data-lazy=\"1\">\n        <h1 class=\"fancy-heading\">\n    <span class=\"main-head tf_block\">\n                    L\u00f6sung            <\/span>\n\n    \n    <span class=\"sub-head tf_block tf_rel\">\n                                <\/span>\n    <\/h1>\n<\/div>\n<!-- \/module fancy heading -->\n<!-- module text -->\n<div  class=\"module module-text tb_olr8818\" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <p><em><strong>Wir haben ein Team hinzugezogen, um die Quelle des Angriffs zu identifizieren, festzustellen, wie die Malware eingedrungen ist, sie einzud\u00e4mmen und sicherzustellen, dass das Ausma\u00df des Angriffs verstanden wurde. Dann haben wir daran gearbeitet, Systeme wiederherzustellen und das Gesch\u00e4ft wieder zum Laufen zu bringen.<\/strong><\/em><\/p>\n<p>iDS wurde aufgrund unserer Beziehung zum Kunden und unserer umfassenden Erfahrung in der Unterst\u00fctzung von Kunden mit \u00e4hnlichen Problemen ausgew\u00e4hlt.<\/p>\n<p><strong>Es wurde ein Projektplan erstellt, der Folgendes beinhaltete:<\/strong><\/p>\n<ul>\n<li>\u00dcberpr\u00fcfen von Protokollen und forensischen Daten, um die Quelle und das Ausma\u00df der Kompromittierung zu ermitteln<\/li>\n<li>L\u00f6schen gef\u00e4hrdeter Systeme, Neuinstallation von Betriebssystemen und Wiederherstellung von Daten aus bekannterma\u00dfen guten Backups, an deren Erstellung wir zuvor mit der Firma gearbeitet hatten<\/li>\n<li>Zusammenarbeit mit dem Kunden zur Verbesserung der Verteidigung gegen zuk\u00fcnftige Angriffe, einschlie\u00dflich zus\u00e4tzlicher Benutzerschulungen, Netzwerk\u00fcberwachung und verbesserter Backup-Strategien<\/li>\n<\/ul>    <\/div>\n<\/div>\n<!-- \/module text --><!-- module fancy heading -->\n<div  class=\"module module-fancy-heading tb_h5vm641\" data-lazy=\"1\">\n        <h1 class=\"fancy-heading\">\n    <span class=\"main-head tf_block\">\n                    Ergebnis            <\/span>\n\n    \n    <span class=\"sub-head tf_block tf_rel\">\n                                <\/span>\n    <\/h1>\n<\/div>\n<!-- \/module fancy heading -->\n<!-- module text -->\n<div  class=\"module module-text tb_17by0\" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <p><em><strong>Das iDS-Cybersicherheitsteam f\u00fchrte eine Untersuchung durch, um die Malware zu identifizieren und zu isolieren, den Betrieb wiederherzustellen und den Verlust von mehr als $1,5 Millionen an Einnahmen pro Tag zu verhindern. Dar\u00fcber hinaus haben wir einen Bericht erstellt, der es unserem Kunden erm\u00f6glichte, unsere Dienstleistungen vollst\u00e4ndig von seiner Cybersicherheitsversicherungspolice erstattet zu bekommen.<\/strong><\/em><\/p>\n<p>Das \u00e4u\u00dferst erfahrene iDS-Cybersicherheitsteam reagierte schnell auf die Bed\u00fcrfnisse des Kunden und brachte ihn innerhalb weniger Stunden wieder zum normalen Betrieb zur\u00fcck. Wir haben sie davor bewahrt, potenzielle Einnahmen in Millionenh\u00f6he zu verlieren, haben bei der Erstattung ihrer Kosten durch die Versicherung geholfen und Ma\u00dfnahmen ergriffen, um die Wahrscheinlichkeit zu verringern, dass sie sich in Zukunft mit demselben Problem befassen m\u00fcssen.<\/p>    <\/div>\n<\/div>\n<!-- \/module text -->        <\/div>\n                        <\/div>\n        <\/div>\n        <\/div>\n<!--\/themify_builder_content-->","protected":false},"excerpt":{"rendered":"<p>Our client\u2019s headquarters office was hit with ransomware that encrypted dozens of computers, shutting all operations down. Our client was hit with a debilitating ransomware attack, with malware that encrypted the contents of both user systems and enterprise servers containing critical client and firm data. iDS was tasked with: Identifying the source and timing of [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1010,"parent":33,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"team":[],"class_list":["post-1016","page","type-page","status-publish","has-post-thumbnail","hentry","has-post-title","has-post-date","has-post-category","has-post-tag","has-post-comment","has-post-author",""],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.6 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Quick Recovery from Ransomware Attack - iDiscovery Solutions<\/title>\n<meta name=\"description\" content=\"iDS&#039;s client was hit with a ransomware attack with malware that encrypted the contents of servers containing critical client and firm data.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/idsinc.com\/de\/fallstudien\/schnelle-wiederherstellung-nach-einem-ransomware-angriff\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Quick Recovery from Ransomware Attack\" \/>\n<meta property=\"og:description\" content=\"iDS&#039;s client was hit with a ransomware attack with malware that encrypted the contents of servers containing critical client and firm data.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/idsinc.com\/de\/fallstudien\/schnelle-wiederherstellung-nach-einem-ransomware-angriff\/\" \/>\n<meta property=\"og:site_name\" content=\"iDiscovery Solutions\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472\" \/>\n<meta property=\"article:modified_time\" content=\"2021-07-07T16:22:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/03\/iDS-Case-Study-Ransomware.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/quick-recovery-from-ransomware-attack\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/quick-recovery-from-ransomware-attack\\\/\",\"name\":\"Quick Recovery from Ransomware Attack - iDiscovery Solutions\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/quick-recovery-from-ransomware-attack\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/quick-recovery-from-ransomware-attack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/iDS-Case-Study-Ransomware.jpg\",\"datePublished\":\"2021-03-10T16:18:28+00:00\",\"dateModified\":\"2021-07-07T16:22:27+00:00\",\"description\":\"iDS's client was hit with a ransomware attack with malware that encrypted the contents of servers containing critical client and firm data.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/quick-recovery-from-ransomware-attack\\\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/quick-recovery-from-ransomware-attack\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/quick-recovery-from-ransomware-attack\\\/#primaryimage\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/iDS-Case-Study-Ransomware.jpg\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/iDS-Case-Study-Ransomware.jpg\",\"width\":1200,\"height\":600,\"caption\":\"iDS's client was hit with a ransomware attack with malware that encrypted the contents of servers containing critical client and firm data.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/quick-recovery-from-ransomware-attack\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/idsinc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Case Studies\",\"item\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Quick recovery from ransomware attack\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"name\":\"iDiscovery Solutions\",\"description\":\"Use data to your advantage in the courtroom\",\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"alternateName\":\"iDS\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\",\"name\":\"iDiscovery Solutions\",\"alternateName\":\"iDS\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"width\":100,\"height\":73,\"caption\":\"iDiscovery Solutions\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/iDiscovery-Solutions-110210573904472\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/idsinc\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCarv7o1MeYfCp0eZ1IrufIw\"],\"description\":\"iDS provides consultative data solutions to corporations and law firms around the world, giving them a decisive advantage \u2013 both in and out of the courtroom. iDS\u2019s subject matter experts and data strategists specialize in finding solutions to complex data problems, ensuring data can be leveraged as an asset, not a liability.\",\"email\":\"info@idsinc.com\",\"telephone\":\"+1.800.813.4832\",\"legalName\":\"iDiscovery Solutions\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Schnelle Wiederherstellung nach einem Ransomware-Angriff \u2013 iDiscovery Solutions","description":"Der Kunde von iDS wurde von einem Ransomware-Angriff mit Schadsoftware heimgesucht, die den Inhalt von Servern verschl\u00fcsselte, die wichtige Kunden- und Firmendaten enthielten.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/idsinc.com\/de\/fallstudien\/schnelle-wiederherstellung-nach-einem-ransomware-angriff\/","og_locale":"de_DE","og_type":"article","og_title":"Quick Recovery from Ransomware Attack","og_description":"iDS's client was hit with a ransomware attack with malware that encrypted the contents of servers containing critical client and firm data.","og_url":"https:\/\/idsinc.com\/de\/fallstudien\/schnelle-wiederherstellung-nach-einem-ransomware-angriff\/","og_site_name":"iDiscovery Solutions","article_publisher":"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","article_modified_time":"2021-07-07T16:22:27+00:00","og_image":[{"width":1200,"height":600,"url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/03\/iDS-Case-Study-Ransomware.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/idsinc.com\/case-studies\/quick-recovery-from-ransomware-attack\/","url":"https:\/\/idsinc.com\/case-studies\/quick-recovery-from-ransomware-attack\/","name":"Schnelle Wiederherstellung nach einem Ransomware-Angriff \u2013 iDiscovery Solutions","isPartOf":{"@id":"https:\/\/idsinc.com\/en_gb\/#website"},"primaryImageOfPage":{"@id":"https:\/\/idsinc.com\/case-studies\/quick-recovery-from-ransomware-attack\/#primaryimage"},"image":{"@id":"https:\/\/idsinc.com\/case-studies\/quick-recovery-from-ransomware-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/03\/iDS-Case-Study-Ransomware.jpg","datePublished":"2021-03-10T16:18:28+00:00","dateModified":"2021-07-07T16:22:27+00:00","description":"Der Kunde von iDS wurde von einem Ransomware-Angriff mit Schadsoftware heimgesucht, die den Inhalt von Servern verschl\u00fcsselte, die wichtige Kunden- und Firmendaten enthielten.","breadcrumb":{"@id":"https:\/\/idsinc.com\/case-studies\/quick-recovery-from-ransomware-attack\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/idsinc.com\/case-studies\/quick-recovery-from-ransomware-attack\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/idsinc.com\/case-studies\/quick-recovery-from-ransomware-attack\/#primaryimage","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/03\/iDS-Case-Study-Ransomware.jpg","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/03\/iDS-Case-Study-Ransomware.jpg","width":1200,"height":600,"caption":"iDS's client was hit with a ransomware attack with malware that encrypted the contents of servers containing critical client and firm data."},{"@type":"BreadcrumbList","@id":"https:\/\/idsinc.com\/case-studies\/quick-recovery-from-ransomware-attack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/idsinc.com\/"},{"@type":"ListItem","position":2,"name":"Case Studies","item":"https:\/\/idsinc.com\/case-studies\/"},{"@type":"ListItem","position":3,"name":"Quick recovery from ransomware attack"}]},{"@type":"WebSite","@id":"https:\/\/idsinc.com\/en_gb\/#website","url":"https:\/\/idsinc.com\/en_gb\/","name":"iDiscovery-L\u00f6sungen","description":"Nutzen Sie Daten im Gerichtssaal zu Ihrem Vorteil","publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"alternateName":"iDS","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/idsinc.com\/en_gb\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/idsinc.com\/en_gb\/#organization","name":"iDiscovery-L\u00f6sungen","alternateName":"iDS","url":"https:\/\/idsinc.com\/en_gb\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","width":100,"height":73,"caption":"iDiscovery Solutions"},"image":{"@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","https:\/\/www.linkedin.com\/company\/idsinc","https:\/\/www.youtube.com\/channel\/UCarv7o1MeYfCp0eZ1IrufIw"],"description":"iDS bietet Unternehmen und Anwaltskanzleien weltweit beratende Datenl\u00f6sungen und verschafft ihnen damit einen entscheidenden Vorteil \u2013 sowohl vor als auch au\u00dferhalb des Gerichtssaals. Die Fachexperten und Datenstrategen von iDS sind auf die L\u00f6sung komplexer Datenprobleme spezialisiert und stellen sicher, dass Daten als Vorteil und nicht als Belastung genutzt werden.","email":"info@idsinc.com","telephone":"+1.800.813.4832","legalName":"iDiscovery Solutions"}]}},"builder_content":"\n<h1>CHALLENGE<br\/><\/h1>\n<p><em><strong>Our client\u2019s headquarters office was hit with ransomware that encrypted dozens of computers, shutting all operations down.<\/strong><\/em><\/p> <p>Our client was hit with a debilitating ransomware attack, with malware that encrypted the contents of both user systems and enterprise servers containing critical client and firm data.<\/p> <p><strong>iDS was tasked with:<\/strong><\/p> <ul> <li>Identifying the source and timing of the attack<\/li> <li>Isolating the malware, eradicating it from their environment, and restoring systems, applications, and data<\/li> <li>Monitoring operations to ensure that the malware did not resurface<\/li> <\/ul>\n<h1>Solution<br\/><\/h1>\n<p><em><strong>We brought in a team to identify the source of the attack, pinpoint how the malware got in, contain it, and ensure that the scope of the attack was understood. Then we worked to restore systems and get the business back up and running.<\/strong><\/em><\/p> <p>iDS was chosen based on our relationship with the client and our deep experience in assisting clients with similar issues.<\/p> <p><strong>A project plan was drawn up which included:<\/strong><\/p> <ul> <li>Reviewing logs and forensic data to determine the source and extent of the compromise<\/li> <li>Wiping compromised systems, reinstalling operating systems, and restoring data from known good backups that we had previously worked to create with the firm<\/li> <li>Working with the client to improve defenses against future attacks, including additional user training, network monitoring, and enhanced backup strategies<\/li> <\/ul>\n<h1>Result<br\/><\/h1>\n<p><em><strong>The iDS cybersecurity team conducted an investigation to identify and isolate the malware, restoring operations and preventing the loss of more than $1.5 million in revenue per day. In addition, we prepared a report that allowed our client to get full reimbursement for our services from their cybersecurity insurance policy.<\/strong><\/em><\/p> <p>The highly experienced iDS cybersecurity team quickly responded to the client\u2019s needs and got them back to normal operations in a matter of hours. We saved them from losing millions in potential revenue, assisted with insurance recovery for their costs, and took steps to reduce the likelihood that they would need to deal with the same issue in the future.<\/p>","_links":{"self":[{"href":"https:\/\/idsinc.com\/de\/wp-json\/wp\/v2\/pages\/1016","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/idsinc.com\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/idsinc.com\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/idsinc.com\/de\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/idsinc.com\/de\/wp-json\/wp\/v2\/comments?post=1016"}],"version-history":[{"count":0,"href":"https:\/\/idsinc.com\/de\/wp-json\/wp\/v2\/pages\/1016\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/idsinc.com\/de\/wp-json\/wp\/v2\/pages\/33"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/idsinc.com\/de\/wp-json\/wp\/v2\/media\/1010"}],"wp:attachment":[{"href":"https:\/\/idsinc.com\/de\/wp-json\/wp\/v2\/media?parent=1016"}],"wp:term":[{"taxonomy":"team","embeddable":true,"href":"https:\/\/idsinc.com\/de\/wp-json\/wp\/v2\/team?post=1016"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}