SlideShare una empresa de Scribd logo
1 de 11
Descargar para leer sin conexión
Cybersecurity
Solution for a Drug
Manufacturing
Company
A major drug manufacturing company in the
United States was targeted by ransomware.
Cyber attackers encrypted their files and
demanded a ransom to decrypt them. The
company refused to pay the ransom or accept
any solution from them.
The drug manufacturing company approached
Nuvento for a 3-4 day action plan to recover the
encrypted files in their system. They wanted us to
resolve the problem and prevent similar incidents
from happening again.
The challenge for Nuvento was to find and
remove the ransomware from their network.
To investigate the situation and identify a
viable solution, we deployed our Threat
Hunting team, Vulnerability Assessment
team, Cybersecurity team, and IT
Infrastructure Support team.
The Challenge
We cleansed the entire network, removed the
ransomware, and safeguarded their data
from further cybersecurity breaches.
Following were the measures taken:
Our Solution
Install Antivirus Protection
Threat Hunting
Vulnerability Assessment
We discovered that some systems had anti-
virus software that was outdated, while
others had no antivirus protection at all.
The first line of defence against the cyber-
attack was to install standard antivirus
software on all systems. As a result, we
used standard antivirus software to protect
each and every system
Install Antivirus
Protection;
For threat hunting, Nuvento installed the threat
detection software Infocyte.
We discovered some suspicious logs while running
Infocyte. Our team notified the company
about the infected systems, quarantined them,
cleaned them, and reconnected them to their
network.
Threat Hunting;
We conducted vulnerability assessments using
Tenable, a leading vulnerability management
solution. Unsupported systems, open ports, out-
of-date software, plugins, and web browsers
were among the vulnerabilities discovered.
Vulnerability
Assessment;
Based on the vulnerability
assessments, Nuvento made the
following recommendations:
Upgrade their systems to the latest Windows
versions
Change their Windows user accounts and
service accounts permissions
Upgrade firewall
Use third-party service providers to protect
from DDoS attacks
Continue using InfoCyte to get malware alerts
in their network
Contact our team.
When you contact our technology leaders, they
will evaluate your specific business case and
share a proof of concept with cost estimates,
technology and developer effort requirements,
and a timeline for the process.
www.nuvento.com
Drug Company Ransomware Recovery in 3 Days

Más contenido relacionado

Similar a Drug Company Ransomware Recovery in 3 Days

ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationabhijit chintamani
 
Antivirus programs and Security Teams in E-Commerce by Ilakia
Antivirus programs and Security Teams in E-Commerce by IlakiaAntivirus programs and Security Teams in E-Commerce by Ilakia
Antivirus programs and Security Teams in E-Commerce by IlakiaILAKIA
 
Unveiling the Shadows: A Comprehensive Guide to Malware Analysis for Ensuring...
Unveiling the Shadows: A Comprehensive Guide to Malware Analysis for Ensuring...Unveiling the Shadows: A Comprehensive Guide to Malware Analysis for Ensuring...
Unveiling the Shadows: A Comprehensive Guide to Malware Analysis for Ensuring...cyberprosocial
 
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?TechSoup
 
How to Audit
How to AuditHow to Audit
How to Auditayousif
 
Software Supply Chain Attacks (June 2021)
Software Supply Chain Attacks (June 2021)Software Supply Chain Attacks (June 2021)
Software Supply Chain Attacks (June 2021)TzahiArabov
 
IRJET- Zombie - Venomous File: Analysis using Legitimate Signature for Securi...
IRJET- Zombie - Venomous File: Analysis using Legitimate Signature for Securi...IRJET- Zombie - Venomous File: Analysis using Legitimate Signature for Securi...
IRJET- Zombie - Venomous File: Analysis using Legitimate Signature for Securi...IRJET Journal
 
Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.Ricardo Resnik
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesAlireza Ghahrood
 
How do Antivirus Programs work step-by-step.pdf
How do Antivirus Programs work step-by-step.pdfHow do Antivirus Programs work step-by-step.pdf
How do Antivirus Programs work step-by-step.pdfBlogger
 
Discuss reaction strategies to handle Malware-SolutionMalware- Malware.docx
Discuss reaction strategies to handle Malware-SolutionMalware- Malware.docxDiscuss reaction strategies to handle Malware-SolutionMalware- Malware.docx
Discuss reaction strategies to handle Malware-SolutionMalware- Malware.docxrtodd615
 
Identifying, Monitoring, and Reporting Malware
Identifying, Monitoring, and Reporting MalwareIdentifying, Monitoring, and Reporting Malware
Identifying, Monitoring, and Reporting MalwareTeodoro Cipresso
 
Securing data flow to and from organizations
Securing data flow to and from organizationsSecuring data flow to and from organizations
Securing data flow to and from organizationsOPSWAT
 
The Modern Malware Review March 2013
The Modern Malware Review March 2013The Modern Malware Review March 2013
The Modern Malware Review March 2013- Mark - Fullbright
 
Colby_Sawyer_white_paper final 2
Colby_Sawyer_white_paper final 2Colby_Sawyer_white_paper final 2
Colby_Sawyer_white_paper final 2Scott Brown
 
Tech Throwdown: Secure Containerization vs Whitelisting
Tech Throwdown: Secure Containerization vs WhitelistingTech Throwdown: Secure Containerization vs Whitelisting
Tech Throwdown: Secure Containerization vs WhitelistingInvincea, Inc.
 

Similar a Drug Company Ransomware Recovery in 3 Days (20)

ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
 
Antivirus programs and Security Teams in E-Commerce by Ilakia
Antivirus programs and Security Teams in E-Commerce by IlakiaAntivirus programs and Security Teams in E-Commerce by Ilakia
Antivirus programs and Security Teams in E-Commerce by Ilakia
 
Unveiling the Shadows: A Comprehensive Guide to Malware Analysis for Ensuring...
Unveiling the Shadows: A Comprehensive Guide to Malware Analysis for Ensuring...Unveiling the Shadows: A Comprehensive Guide to Malware Analysis for Ensuring...
Unveiling the Shadows: A Comprehensive Guide to Malware Analysis for Ensuring...
 
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
 
How to Audit
How to AuditHow to Audit
How to Audit
 
Software Supply Chain Attacks (June 2021)
Software Supply Chain Attacks (June 2021)Software Supply Chain Attacks (June 2021)
Software Supply Chain Attacks (June 2021)
 
The Various Classes of Antivirus!
The Various Classes of Antivirus!The Various Classes of Antivirus!
The Various Classes of Antivirus!
 
IRJET- Zombie - Venomous File: Analysis using Legitimate Signature for Securi...
IRJET- Zombie - Venomous File: Analysis using Legitimate Signature for Securi...IRJET- Zombie - Venomous File: Analysis using Legitimate Signature for Securi...
IRJET- Zombie - Venomous File: Analysis using Legitimate Signature for Securi...
 
Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.
 
The modern-malware-review-march-2013
The modern-malware-review-march-2013 The modern-malware-review-march-2013
The modern-malware-review-march-2013
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antiviruses
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus software
 
How do Antivirus Programs work step-by-step.pdf
How do Antivirus Programs work step-by-step.pdfHow do Antivirus Programs work step-by-step.pdf
How do Antivirus Programs work step-by-step.pdf
 
Discuss reaction strategies to handle Malware-SolutionMalware- Malware.docx
Discuss reaction strategies to handle Malware-SolutionMalware- Malware.docxDiscuss reaction strategies to handle Malware-SolutionMalware- Malware.docx
Discuss reaction strategies to handle Malware-SolutionMalware- Malware.docx
 
Identifying, Monitoring, and Reporting Malware
Identifying, Monitoring, and Reporting MalwareIdentifying, Monitoring, and Reporting Malware
Identifying, Monitoring, and Reporting Malware
 
Securing data flow to and from organizations
Securing data flow to and from organizationsSecuring data flow to and from organizations
Securing data flow to and from organizations
 
The Modern Malware Review March 2013
The Modern Malware Review March 2013The Modern Malware Review March 2013
The Modern Malware Review March 2013
 
Colby_Sawyer_white_paper final 2
Colby_Sawyer_white_paper final 2Colby_Sawyer_white_paper final 2
Colby_Sawyer_white_paper final 2
 
Tech Throwdown: Secure Containerization vs Whitelisting
Tech Throwdown: Secure Containerization vs WhitelistingTech Throwdown: Secure Containerization vs Whitelisting
Tech Throwdown: Secure Containerization vs Whitelisting
 
After the Breach
After the BreachAfter the Breach
After the Breach
 

Más de Nuvento Systems Pvt Ltd

Snowflakes to Databricks Migration Guide - Nuvento
Snowflakes to Databricks Migration Guide - NuventoSnowflakes to Databricks Migration Guide - Nuvento
Snowflakes to Databricks Migration Guide - NuventoNuvento Systems Pvt Ltd
 
Strategies for Successful Application and Data Migration to the Cloud
Strategies for Successful Application and Data Migration to the CloudStrategies for Successful Application and Data Migration to the Cloud
Strategies for Successful Application and Data Migration to the CloudNuvento Systems Pvt Ltd
 
Trends in Cloud Computing Services | Nuvento USA
Trends in Cloud Computing Services | Nuvento USATrends in Cloud Computing Services | Nuvento USA
Trends in Cloud Computing Services | Nuvento USANuvento Systems Pvt Ltd
 
Essential Factors for a Successful Azure Migration Journey | Nuvento USA
Essential Factors for a Successful Azure Migration Journey | Nuvento USAEssential Factors for a Successful Azure Migration Journey | Nuvento USA
Essential Factors for a Successful Azure Migration Journey | Nuvento USANuvento Systems Pvt Ltd
 
Planning a Successful Azure Cloud Migration: A Strategic Approach - Nuvento
Planning a Successful Azure Cloud Migration: A Strategic Approach - NuventoPlanning a Successful Azure Cloud Migration: A Strategic Approach - Nuvento
Planning a Successful Azure Cloud Migration: A Strategic Approach - NuventoNuvento Systems Pvt Ltd
 
Azure Security Best Practises for Enterprises
Azure Security Best Practises for EnterprisesAzure Security Best Practises for Enterprises
Azure Security Best Practises for EnterprisesNuvento Systems Pvt Ltd
 
7 Advantages of Migrating to Microsoft Azure
7 Advantages of Migrating to Microsoft Azure7 Advantages of Migrating to Microsoft Azure
7 Advantages of Migrating to Microsoft AzureNuvento Systems Pvt Ltd
 
Roles and responsibilities of a dedicated development team.pdf
Roles and responsibilities of a dedicated development team.pdfRoles and responsibilities of a dedicated development team.pdf
Roles and responsibilities of a dedicated development team.pdfNuvento Systems Pvt Ltd
 
Mobile application development case study
Mobile application development case studyMobile application development case study
Mobile application development case studyNuvento Systems Pvt Ltd
 
Main characteristics of a great dedicated development team
Main characteristics of a great dedicated development teamMain characteristics of a great dedicated development team
Main characteristics of a great dedicated development teamNuvento Systems Pvt Ltd
 
Things IT Leaders Must Consider About Cloud Managed Services
Things IT Leaders Must Consider About Cloud Managed Services Things IT Leaders Must Consider About Cloud Managed Services
Things IT Leaders Must Consider About Cloud Managed Services Nuvento Systems Pvt Ltd
 
Digital Transformation in Sports & Entertainment Industry Case Study (1).pdf
Digital Transformation in Sports & Entertainment Industry Case Study (1).pdfDigital Transformation in Sports & Entertainment Industry Case Study (1).pdf
Digital Transformation in Sports & Entertainment Industry Case Study (1).pdfNuvento Systems Pvt Ltd
 
Multi-specialist hybrid healthcare application case study
Multi-specialist hybrid healthcare application case studyMulti-specialist hybrid healthcare application case study
Multi-specialist hybrid healthcare application case studyNuvento Systems Pvt Ltd
 

Más de Nuvento Systems Pvt Ltd (20)

Snowflakes to Databricks Migration Guide - Nuvento
Snowflakes to Databricks Migration Guide - NuventoSnowflakes to Databricks Migration Guide - Nuvento
Snowflakes to Databricks Migration Guide - Nuvento
 
Cloud Readiness Assessment | Nuvento
Cloud Readiness Assessment | NuventoCloud Readiness Assessment | Nuvento
Cloud Readiness Assessment | Nuvento
 
Strategies for Successful Application and Data Migration to the Cloud
Strategies for Successful Application and Data Migration to the CloudStrategies for Successful Application and Data Migration to the Cloud
Strategies for Successful Application and Data Migration to the Cloud
 
Trends in Cloud Computing Services | Nuvento USA
Trends in Cloud Computing Services | Nuvento USATrends in Cloud Computing Services | Nuvento USA
Trends in Cloud Computing Services | Nuvento USA
 
Essential Factors for a Successful Azure Migration Journey | Nuvento USA
Essential Factors for a Successful Azure Migration Journey | Nuvento USAEssential Factors for a Successful Azure Migration Journey | Nuvento USA
Essential Factors for a Successful Azure Migration Journey | Nuvento USA
 
Planning a Successful Azure Cloud Migration: A Strategic Approach - Nuvento
Planning a Successful Azure Cloud Migration: A Strategic Approach - NuventoPlanning a Successful Azure Cloud Migration: A Strategic Approach - Nuvento
Planning a Successful Azure Cloud Migration: A Strategic Approach - Nuvento
 
Azure Security Best Practises for Enterprises
Azure Security Best Practises for EnterprisesAzure Security Best Practises for Enterprises
Azure Security Best Practises for Enterprises
 
Benefits of Switching to AWS
Benefits of Switching to AWSBenefits of Switching to AWS
Benefits of Switching to AWS
 
7 Advantages of Migrating to Microsoft Azure
7 Advantages of Migrating to Microsoft Azure7 Advantages of Migrating to Microsoft Azure
7 Advantages of Migrating to Microsoft Azure
 
How to Plan for Cloud Modernization
How to Plan for Cloud ModernizationHow to Plan for Cloud Modernization
How to Plan for Cloud Modernization
 
Roles and responsibilities of a dedicated development team.pdf
Roles and responsibilities of a dedicated development team.pdfRoles and responsibilities of a dedicated development team.pdf
Roles and responsibilities of a dedicated development team.pdf
 
Azure-based hybrid application
Azure-based hybrid applicationAzure-based hybrid application
Azure-based hybrid application
 
Cloud managed services.pdf
Cloud managed services.pdfCloud managed services.pdf
Cloud managed services.pdf
 
Cloud-based student EHR Solution.pdf
Cloud-based student EHR Solution.pdfCloud-based student EHR Solution.pdf
Cloud-based student EHR Solution.pdf
 
Mobile application development case study
Mobile application development case studyMobile application development case study
Mobile application development case study
 
Main characteristics of a great dedicated development team
Main characteristics of a great dedicated development teamMain characteristics of a great dedicated development team
Main characteristics of a great dedicated development team
 
What is a dedicated team model
What is a dedicated team modelWhat is a dedicated team model
What is a dedicated team model
 
Things IT Leaders Must Consider About Cloud Managed Services
Things IT Leaders Must Consider About Cloud Managed Services Things IT Leaders Must Consider About Cloud Managed Services
Things IT Leaders Must Consider About Cloud Managed Services
 
Digital Transformation in Sports & Entertainment Industry Case Study (1).pdf
Digital Transformation in Sports & Entertainment Industry Case Study (1).pdfDigital Transformation in Sports & Entertainment Industry Case Study (1).pdf
Digital Transformation in Sports & Entertainment Industry Case Study (1).pdf
 
Multi-specialist hybrid healthcare application case study
Multi-specialist hybrid healthcare application case studyMulti-specialist hybrid healthcare application case study
Multi-specialist hybrid healthcare application case study
 

Último

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 

Último (20)

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 

Drug Company Ransomware Recovery in 3 Days

  • 1. Cybersecurity Solution for a Drug Manufacturing Company
  • 2. A major drug manufacturing company in the United States was targeted by ransomware. Cyber attackers encrypted their files and demanded a ransom to decrypt them. The company refused to pay the ransom or accept any solution from them.
  • 3. The drug manufacturing company approached Nuvento for a 3-4 day action plan to recover the encrypted files in their system. They wanted us to resolve the problem and prevent similar incidents from happening again.
  • 4. The challenge for Nuvento was to find and remove the ransomware from their network. To investigate the situation and identify a viable solution, we deployed our Threat Hunting team, Vulnerability Assessment team, Cybersecurity team, and IT Infrastructure Support team. The Challenge
  • 5. We cleansed the entire network, removed the ransomware, and safeguarded their data from further cybersecurity breaches. Following were the measures taken: Our Solution Install Antivirus Protection Threat Hunting Vulnerability Assessment
  • 6. We discovered that some systems had anti- virus software that was outdated, while others had no antivirus protection at all. The first line of defence against the cyber- attack was to install standard antivirus software on all systems. As a result, we used standard antivirus software to protect each and every system Install Antivirus Protection;
  • 7. For threat hunting, Nuvento installed the threat detection software Infocyte. We discovered some suspicious logs while running Infocyte. Our team notified the company about the infected systems, quarantined them, cleaned them, and reconnected them to their network. Threat Hunting;
  • 8. We conducted vulnerability assessments using Tenable, a leading vulnerability management solution. Unsupported systems, open ports, out- of-date software, plugins, and web browsers were among the vulnerabilities discovered. Vulnerability Assessment;
  • 9. Based on the vulnerability assessments, Nuvento made the following recommendations: Upgrade their systems to the latest Windows versions Change their Windows user accounts and service accounts permissions Upgrade firewall Use third-party service providers to protect from DDoS attacks Continue using InfoCyte to get malware alerts in their network
  • 10. Contact our team. When you contact our technology leaders, they will evaluate your specific business case and share a proof of concept with cost estimates, technology and developer effort requirements, and a timeline for the process. www.nuvento.com