Educause Security Discussion mailing list archives

Re: Ransomware Playbook


From: Dan Wasson <dan () NMC EDU>
Date: Thu, 3 Oct 2019 16:35:02 -0700

I would be interested as well.  Thanks in advance.

Dan



On Oct 3, 2019, at 6:42 PM, Hagan, Sean <sean.hagan () yc edu> wrote:

(my apologies for the length)



Robert – At some point, it would be great to have a playbook “show and
tell”.  I realize they’re very sensitive by nature, but it was really hard
for me to even get an idea of what to put in one or how it should be
structured – and I’d imagine I’m not the only one who ran into that when
developing their first (and so far only) playbook.  Perhaps Educause or
Educause SPC would be good venues to share/compare/discuss in person.  I
still have no idea if mine is “right” or not, but it has a solid mix of
descriptive and operational content to help someone understand not only
what to do in a given situation but how and why we do things and how or why
certain systems are configured the way they are.



Ours is kept tightly controlled (mostly because it’s not finished), but our
CIO and the Infosec team (Security Analyst and myself) have access.
Certain parts of it are exported out to be made available for other people
who have a need to know (like some IAM and OPS stuff that our Helpdesk
makes use of).  There’s not a full communication plan, but there are
templates for various incidents and/or prompts to allow the experts (e.g.
PIO) to have an idea of what and when things need to be communicated out.
Based on experiences to date, we would absolutely make use of social media
for communicating with constituents, but ultimately that’s not my call – it
would be our executive leadership and/or PIO’s decision to make.



Mine coincidentally has 10 sections as well:



1.       Introduction/Purpose/Audience/Definitions/Major
Systems/Vendors/etc.

2.       Security Operations and Incident Handling Standards

3.       Threat and Vulnerability Management

4.       Identity and Access Management

5.       Security Awareness and Training

6.       Data Loss Prevention and Data Protection

7.       Compliance Management

8.       Vendor Security and Vendor Risk Management

9.       Risk Management

10.   Indexes, Key Contacts, Change Log, Appendices





Getting back to the ransomware part of this discussion:



One thing I learned from participating in a recent real-world ransomware
recovery was how important the non-technical aspects are.  Project
management, communication, logistics (!!!) are very critical and perhaps
not as planned for as the technical components (at least, they weren’t for
me).  I came away with pages of notes for where things broke down or how
things could have been improved to speed recovery or reduce risk.  Just one
communication breakdown resulted in ~200 man-hours being wasted, which was
time this organization really didn’t have.  Fetching USB sticks took 5
hours because it was a 2+ hour drive (each way) to the nearest store that
had sufficient quantities.  Organizations that I thought would help with
resources and expertise did not (and not because they were unaware).  There
were also plenty of “heat of the moment” compromises and decisions made
that, in hindsight, were problematic or introduced substantial additional
risk.  Table top exercises (simple discussions, really – nothing more
needed) with your team to walk through an outbreak and response can go a
long way towards minimizing these issues should a real incident occur.



Lots of questions to be asked in advance as well, like whether your
organization would even consider paying the ransom or not, whether you need
to preserve data on (potentially) impacted devices or not, whether you have
enough manpower (or network capacity) to handle mass reimaging, whether you
would make use of community volunteers, whether you could quickly source
dozens or hundreds of USB sticks or SSDs should you need them (in Arizona
and many other states, there are plenty of rural or semi-rural educational
institutions that could not easily do so), etc.  I’ve also had a dozen or
so discussions with our cyber liability insurance provider to better
understand what would and wouldn’t be covered and what support we would get
in the event of an incident.  I would encourage others to do the same, even
if my discussions weren’t always fruitful (an insurance group can be
frustratingly cagey in their responses to hypothetical questions).



As a sort of related aside to all of this and the original question – if
you have the opportunity to assist another organization with responding to
a ransomware incident, I highly encourage you to do so.  Not only is it a
nice thing to do, you’ll likely observe plenty of things both good/bad that
can be applied at your organization should an incident arise.  It becomes
the 21st century equivalent of a barn raising, and helps to build bridges
with public and private organizations that will hopefully long outlast the
actual incident that brought everyone together.





Just my two cents and 750+ words… J





Good luck to all!



Sean





*From:* The EDUCAUSE Security Community Group Listserv <
SECURITY () LISTSERV EDUCAUSE EDU> *On Behalf Of *Barton, Robert W.
*Sent:* Thursday, October 3, 2019 3:01 PM
*To:* SECURITY () LISTSERV EDUCAUSE EDU
*Subject:* Re: [SECURITY] Ransomware Playbook



While I do agree every playbook HAS to be unique, I know from my
perspective, there are various items I’m interested in hearing from others.

-          When and how do they communicate out.  Social Media first,
second or ever?  Do you include a full communication plan in your playbook?

-          What sections (descriptive and operational) are there in various
playbooks?  I have 10 different sections…but somebody could have ones I
don’t have that are good ideas.  Sometimes I’ll like something as simple as
the format and I’ll make a change in mine.

-          Where do people keep all these different documents?  Paper as
well as electronic?  Should I be pushing more for a document management
system (enterprise)?  Are they using a web based system (I’m still fighting
trust issues with management when you say ‘cloud’)?

-          Are others doing playbooks that are more ‘high level’ than
mine?  Why or why not?  What can I learn from that?

There are a few more things that I’ve thought up, but ABSOLUTELY the ‘meat’
will be different.  Another playbook is a reference to learn from and not a
tool you can use.  Isn’t that why we are all here?



Robert W. Barton

Executive Director of Information Security and Policy

Lewis University

One University Parkway

Romeoville, IL  60446-2200

815-836-5663



*From:* The EDUCAUSE Security Community Group Listserv <
SECURITY () LISTSERV EDUCAUSE EDU> *On Behalf Of *Jonathon Poling
*Sent:* Thursday, October 3, 2019 4:17 PM
*To:* SECURITY () LISTSERV EDUCAUSE EDU
*Subject:* Re: [SECURITY] Ransomware Playbook



A ransomware playbook, especially a prescriptive one, is going to be HIGHLY
specific to your environment and PPT (People, Process, Tooling) and thus
will require substantial (and unique) development and refinement for your
specific organization. There's a reason so many org's (and entire
counties/systems) fall victim to just paying the ransom, even when it's an
inordinate amount of money. There is a lot to it, completely aside from
properly testing and restoring backups. I only say this all because I've
built a lot of specific playbooks running the gamut for a lot of clients in
a variety of verticals over the years. This is definitely one of our most
involved playbooks we help people build, as it involves a lot of
non-technical preparation that is not readily apparent unless you've gone
through it.



This is one of those things you don't want to skimp on or necessarily even
copy from what others are doing, as a lot of org's aren't building the
comprehensive set of processes and procedures needed for properly
protecting against, operating amidst, and recovering from such attacks.



At any rate, just sharing my experience and hopefully some (useful) food
for thought, whichever route you end up going.



Jonathon



On Thu, Oct 3, 2019 at 2:15 PM King, Ronald A. <raking () nsu edu> wrote:

Me too, please.



*Ronald King*

*Chief Information Security Officer*



*Office of Information Technology*

(757) 823-2916 (Office)

raking () nsu edu

www.nsu.edu
<https://linkprotect.cudasvc.com/url?a=http%3a%2f%2fwww.nsu.edu%2f&c=E,1,HU_BWt4CkVoVJDQeP7kswSs3AsdtiNmLz6f2x2yGAVwChppB73EVi-Ra--paalI5fP_X5WZ9PHvYWGQollvUL3Mu9UiE_u5nJgl3Yk-7cnmkDQ,,&typo=1>

@NSUCISO (Twitter)

<image001.png>



*From:* The EDUCAUSE Security Community Group Listserv <
SECURITY () LISTSERV EDUCAUSE EDU> *On Behalf Of *Joey Rego
*Sent:* Thursday, October 3, 2019 5:13 PM
*To:* SECURITY () LISTSERV EDUCAUSE EDU
*Subject:* Re: [SECURITY] Ransomware Playbook



I am interested as well.  Thank you.



Joey Rego

Associate Director of Information Security

Information Technology

Lynn University

3601 N Military Trail

Boca Raton, FL 33462

561-237-7982

www.lynn.edu
<https://linkprotect.cudasvc.com/url?a=http%3a%2f%2fwww.lynn.edu&c=E,1,zkF267g3wzATAzhcs6Em9T9Jvopt25l00KAxkRqZFIZ9X_iq5ZC0soQnTysStHJHzn8ZjY43CJ9lsVG3OQNFhPFkVMrH9UvOlch8aLsRNRvt8Ng6wtG9chJsnA3I&typo=1>
------------------------------

*From:* The EDUCAUSE Security Community Group Listserv <
SECURITY () LISTSERV EDUCAUSE EDU> on behalf of John Ramsey <
jramsey () STUDENTCLEARINGHOUSE ORG>
*Sent:* Thursday, October 3, 2019 4:50:20 PM
*To:* SECURITY () LISTSERV EDUCAUSE EDU <SECURITY () LISTSERV EDUCAUSE EDU>
*Subject:* Re: [SECURITY] Ransomware Playbook



I have one and am happy to share!

Sent from my Verizon, Samsung Galaxy smartphone

Get Outlook for Android
<https://linkprotect.cudasvc.com/url?a=https%3a%2f%2furldefense.proofpoint.com%2fv2%2furl%3fu%3dhttps-3A__aka.ms_ghei36%26d%3dDwMFAg%26c%3dtSGu_Pc6mPnB6zIYTZr3Sw%26r%3dPTnT2JXctjp4MTPziGqcrg%26m%3dSynK17bceWMbt_dooTOo-leAVssO48qPL8MzLnn_EXI%26s%3dwPjf0flvlyR164RzC6qod76IJztI6nHPHP-lEfY7Df4%26e%3d&c=E,1,TetJFIkhGJGdkWALuVtxFs9Fc7mzfvIPZsA_1NzPGR73V_rI20H5yUY8KPRtL3mhQ49xs6kfRe7YxXQU7mAFjR2PX4xYBjkUH40HV72NdzYhRJEWxs6ECw,,&typo=1>


------------------------------

*From:* The EDUCAUSE Security Community Group Listserv <
SECURITY () LISTSERV EDUCAUSE EDU> on behalf of Kip Bates <
kbates () HOUSING UCSB EDU>
*Sent:* Thursday, October 3, 2019 4:34:08 PM
*To:* SECURITY () LISTSERV EDUCAUSE EDU <SECURITY () LISTSERV EDUCAUSE EDU>
*Subject:* [SECURITY] Ransomware Playbook



Colleagues:

I am hoping that I can find someone or someplace that has made an effort to
develop a Ransomware Response playbook that they would not mind sharing. I
understand all the preparation that needs to occur prior to an attack but I
am looking for something that we can provide users, help desk folks,
technicians and such on what actions to take if (when) they experience a
ransomware attack. I have found a few on the web and I was wondering if
someone has adapted one of these for their institution or have developed
one that they think is particularly good.

Feel free to comment here or off-list.




Kip Bates

Associate Chief Information Security Officer

University of California, Santa Barbara



**********
Replies to EDUCAUSE Community Group emails are sent to the entire community
list. If you want to reply only to the person who sent the message, copy
and paste their email address and forward the email reply. Additional
participation and subscription information can be found at
https://www.educause.edu/community
<https://linkprotect.cudasvc.com/url?a=https%3a%2f%2furldefense.proofpoint.com%2fv2%2furl%3fu%3dhttps-3A__nam01.safelinks.protection.outlook.com_-3Furl-3Dhttps-253A-252F-252Fwww.educause.edu-252Fcommunity-26data-3D02-257C01-257Cjramsey-2540studentclearinghouse.org-257Ceeb9effb345442318b0a08d748429912-257C8cc02fea054043a688b6069d3eac0119-257C0-257C1-257C637057323178918904-26sdata-3DjUWrk2Wt4Gr-252BBW9ZZXxvxCnl0II1IpaYOvaKgjB5XWY-253D-26reserved-3D0%26d%3dDwMFAg%26c%3dtSGu_Pc6mPnB6zIYTZr3Sw%26r%3dPTnT2JXctjp4MTPziGqcrg%26m%3dSynK17bceWMbt_dooTOo-leAVssO48qPL8MzLnn_EXI%26s%3dwRiqkwHXt6Jf5tWQ1QiT68gVcu1m5m3M9X1VAYqNvJ4%26e%3d&c=E,1,_Nfnr5opiKoBZFVwKFw_ZGWY6ePALGrgeeuXE1UfsmqPj3FaCwT332mPhqgnjIhKL2GUI-yOkcAUIj1ysDn5m2sXa55UZaVKPk5_oaR-&typo=1>

=======================================================

This message has been analyzed by Deep Discovery Email Inspector.

**********
Replies to EDUCAUSE Community Group emails are sent to the entire community
list. If you want to reply only to the person who sent the message, copy
and paste their email address and forward the email reply. Additional
participation and subscription information can be found at
https://www.educause.edu/community
<https://linkprotect.cudasvc.com/url?a=https%3a%2f%2furldefense.proofpoint.com%2fv2%2furl%3fu%3dhttps-3A__www.educause.edu_community%26d%3dDwMFAg%26c%3dtSGu_Pc6mPnB6zIYTZr3Sw%26r%3dPTnT2JXctjp4MTPziGqcrg%26m%3dSynK17bceWMbt_dooTOo-leAVssO48qPL8MzLnn_EXI%26s%3dfKkuKv3i6k7W-LRIBSa1iIePP8_8E9PyJhCtYBo-r1U%26e%3d&c=E,1,N-c3YuEODq3ejvZSk7UUSotEXkb2E84I1s__k5pwKlbBNxziCRx0tt30ZXNIweiy31Q6F4g24uizkTfk1V_tYnVFTA8xpwZt0Zey8qY9jrFLA9M1fLUvAlsd&typo=1>

This email is intended for the designated recipient only, and may be
confidential, non-public, proprietary, protected by the attorney/client or
other privilege. Unauthorized reading, distribution, copying or other use
of this communication is prohibited and may be unlawful. Receipt by anyone
other than the intended recipients should not be deemed a waiver of any
privilege or protection. If you are not the intended recipient or if you
believe that you have received this email in error, please notify the
sender immediately and delete all copies from your computer system without
reading, saving, or using it in any manner. Although it has been checked
for viruses and other malicious software, malware, we do not warrant,
represent or guarantee in any way that this communication is free of
malware or potentially damaging defects. All liability for any actual or
alleged loss, damage, or injury arising out of or resulting in any way from
the receipt, opening or use of this email is expressly disclaimed.

**********
Replies to EDUCAUSE Community Group emails are sent to the entire community
list. If you want to reply only to the person who sent the message, copy
and paste their email address and forward the email reply. Additional
participation and subscription information can be found at
https://www.educause.edu/community
<https://linkprotect.cudasvc.com/url?a=https%3a%2f%2fwww.educause.edu%2fcommunity&c=E,1,LLHfVbmj0m66bKe1ChT_GUBc9y3ltbLE0ObpE6V1EJBRRJLHF5NwwE4G_v77_vLLsKH-x9fcJHJWH_ipuz4PjEm3lNzWRGrtT7tHga97ksv7nac,&typo=1>

**********
Replies to EDUCAUSE Community Group emails are sent to the entire community
list. If you want to reply only to the person who sent the message, copy
and paste their email address and forward the email reply. Additional
participation and subscription information can be found at
https://www.educause.edu/community
<https://linkprotect.cudasvc.com/url?a=https%3a%2f%2fwww.educause.edu%2fcommunity&c=E,1,c23SnFbN3QTHhT5IRQ3FaAO-tj776PO7qHOzj7A_1I6NsUVpe3y0vq3bdM4yS-yYejYBJEwgJuW6YjtLOM-vNvX8pH1W7D5W0UqGkSmxxQIxexTcZcearlQq192F&typo=1>

**********
Replies to EDUCAUSE Community Group emails are sent to the entire community
list. If you want to reply only to the person who sent the message, copy
and paste their email address and forward the email reply. Additional
participation and subscription information can be found at
https://www.educause.edu/community
<https://linkprotect.cudasvc.com/url?a=https%3a%2f%2fwww.educause.edu%2fcommunity&c=E,1,tsjOVkkABcT7sPW-I_GPHfEA-GVZW4_vEs8LRijcDdbLpr0CnPp8Tgpejt8rJ_4H1CdyWenAuBZ-D65JPX_g0Sc2_EGjwGn4GzktLvLQYHxRuYU,&typo=1>

This message (including any attachments) is intended only for the use of
the individual or entity to which it is addressed and may contain
information that is non-public, proprietary, privileged, confidential, and
exempt from disclosure under applicable law or may constitute as attorney
work product. If you are not the intended recipient, you are hereby
notified that any use, dissemination, distribution, or copying of this
communication is strictly prohibited. If you have received this
communication in error, notify us immediately by telephone at
(815)-836-5950 and (i) destroy this message if a facsimile or (ii) delete
this message immediately if this is an electronic communication. Thank you.

**********
Replies to EDUCAUSE Community Group emails are sent to the entire community
list. If you want to reply only to the person who sent the message, copy
and paste their email address and forward the email reply. Additional
participation and subscription information can be found at
https://www.educause.edu/community
<https://linkprotect.cudasvc.com/url?a=https%3a%2f%2fwww.educause.edu%2fcommunity&c=E,1,i8U_rHCTMu91moJ6H9j8TgAv8vuBh94JubhVOPXzX2AHI3KYNNVTSVGsAEHlX-YTAM6CaXYqQLdO6FJ08bDCKysQ5_OuFD9LU0b21N6BDsgQvxuutfo5cddAWA,,&typo=1>

**********
Replies to EDUCAUSE Community Group emails are sent to the entire community
list. If you want to reply only to the person who sent the message, copy
and paste their email address and forward the email reply. Additional
participation and subscription information can be found at
https://www.educause.edu/community

**********
Replies to EDUCAUSE Community Group emails are sent to the entire community list. If you want to reply only to the 
person who sent the message, copy and paste their email address and forward the email reply. Additional participation 
and subscription information can be found at https://www.educause.edu/community

Current thread: