performing-ransomware-response
Executes a structured ransomware incident response from initial detection through containment, forensic analysis, decryption assessment, recovery, and post-incident hardening. Addresses ransom negotiation considerations, backup integrity verification, and regulatory notification requirements. Activates for requests involving ransomware response, ransomware recovery, crypto-ransomware, data encryption attack, ransom payment decision, or ransomware containment.
Best use case
performing-ransomware-response is best used when you need a repeatable AI agent workflow instead of a one-off prompt.
Executes a structured ransomware incident response from initial detection through containment, forensic analysis, decryption assessment, recovery, and post-incident hardening. Addresses ransom negotiation considerations, backup integrity verification, and regulatory notification requirements. Activates for requests involving ransomware response, ransomware recovery, crypto-ransomware, data encryption attack, ransom payment decision, or ransomware containment.
Teams using performing-ransomware-response should expect a more consistent output, faster repeated execution, less prompt rewriting.
When to use this skill
- You want a reusable workflow that can be run more than once with consistent structure.
When not to use this skill
- You only need a quick one-off answer and do not need a reusable workflow.
- You cannot install or maintain the underlying files, dependencies, or repository context.
Installation
Claude Code / Cursor / Codex
Manual Installation
- Download SKILL.md from GitHub
- Place it in
.claude/skills/performing-ransomware-response/SKILL.mdinside your project - Restart your AI agent — it will auto-discover the skill
How performing-ransomware-response Compares
| Feature / Agent | performing-ransomware-response | Standard Approach |
|---|---|---|
| Platform Support | Not specified | Limited / Varies |
| Context Awareness | High | Baseline |
| Installation Complexity | Unknown | N/A |
Frequently Asked Questions
What does this skill do?
Executes a structured ransomware incident response from initial detection through containment, forensic analysis, decryption assessment, recovery, and post-incident hardening. Addresses ransom negotiation considerations, backup integrity verification, and regulatory notification requirements. Activates for requests involving ransomware response, ransomware recovery, crypto-ransomware, data encryption attack, ransom payment decision, or ransomware containment.
Where can I find the source code?
You can find the source code on GitHub using the link provided at the top of the page.
SKILL.md Source
# Performing Ransomware Response ## When to Use - Ransomware has been detected executing or file encryption is actively occurring - Users report inability to open files with unfamiliar extensions appended - A ransom note is discovered on one or more systems - EDR detects mass file modification patterns consistent with encryption behavior - Threat intelligence warns of an imminent ransomware campaign targeting the organization **Do not use** for general malware incidents that do not involve file encryption or extortion; use malware incident response procedures instead. ## Prerequisites - Ransomware-specific incident response playbook reviewed and approved by executive leadership - Tested and verified offline backup strategy with air-gapped or immutable copies - Incident retainer with a specialized ransomware response firm (e.g., Mandiant, CrowdStrike Services, Kroll) - Legal counsel pre-engaged for OFAC sanctions screening and regulatory notification - Cyber insurance carrier contact information and policy coverage details - Bitcoin/cryptocurrency analysis capability or third-party engagement for payment tracing ## Workflow ### Step 1: Detect and Confirm Ransomware Validate that the incident is ransomware and determine the variant: - Identify the ransomware by analyzing the ransom note filename, extension appended to encrypted files, and note content - Upload the ransom note and a sample encrypted file to ID Ransomware (id-ransomware.malwarehunterteam.com) - Check NoMoreRansom.org for available free decryptors - Determine the ransomware deployment method from EDR/SIEM logs - Identify the ransomware group (e.g., LockBit, BlackCat/ALPHV, Royal, Akira, Play) ``` Ransomware Identification: ━━━━━━━━━━━━━━━━━━━━━━━━━ Variant: LockBit 3.0 (Black) Extension: .lockbit3 Ransom Note: README-LOCKBIT.txt Tor Site: lockbit[redacted].onion Deployment: Group Policy Object pushing ransomware.exe to all domain-joined systems Initial Access: VPN credential compromise (no MFA) Dwell Time: 12 days Data Exfiltration: Yes - 47GB uploaded to MEGA via rclone prior to encryption ``` ### Step 2: Immediate Containment Stop ransomware propagation before assessing damage: - **Priority 1**: Disconnect affected network segments from core infrastructure (pull the network cable, not shutdown) - **Priority 2**: Isolate all domain controllers immediately if GPO-based deployment is suspected - **Priority 3**: Disable the compromised accounts used for deployment - **Priority 4**: Block lateral movement protocols (SMB TCP/445, RDP TCP/3389, WinRM TCP/5985-5986) - **Priority 5**: Preserve at least one encrypted system live (do not power off) for memory forensics - **Do NOT**: Shut down encrypted systems; keep them powered on to preserve encryption keys in memory ### Step 3: Assess Damage and Scope Quantify the impact to inform recovery and business decisions: - Count the number of encrypted systems (workstations, servers, domain controllers) - Determine which business-critical systems and data are affected - Verify backup integrity: check that backups were not encrypted, deleted, or corrupted - Assess whether data exfiltration occurred (check for rclone, WinSCP, MEGA, cloud storage activity) - Determine the ransom demand amount and payment deadline - Check OFAC sanctions lists to verify the ransomware group is not a sanctioned entity (paying is legally risky) ``` Impact Assessment: Encrypted Systems: 187 of 340 endpoints (55%) Encrypted Servers: 12 of 28 (43%) - includes 2 file servers, 1 database server Domain Controllers: 2 of 3 encrypted Backup Status: Veeam repository intact (offline copy verified clean) Data Exfiltration: Confirmed - 47GB to MEGA (file listing under analysis) Ransom Demand: $2.5M in Bitcoin (72-hour deadline) OFAC Screening: LockBit - not currently sanctioned entity (verify with counsel) ``` ### Step 4: Recovery Decision Matrix Evaluate recovery options in consultation with legal, executive leadership, and cyber insurance: | Option | Pros | Cons | Recommended When | |--------|------|------|-----------------| | Restore from backup | No payment, no legal risk | Recovery time may be days | Clean backups available | | Free decryptor | No payment, fast | Rare availability | Variant has published decryptor | | Negotiate and pay | Potentially faster | No guarantee, legal risk, funds threat actors | No backups, business survival at stake | | Rebuild from scratch | Clean environment | Longest timeline, data loss | Backups compromised, willing to accept data loss | ### Step 5: Execute Recovery Implement the chosen recovery strategy: **If restoring from backup:** 1. Build a clean isolated network segment for recovery operations 2. Rebuild domain controllers first from clean media (do NOT restore DC backups older than the dwell time) 3. Reset ALL user and service account passwords before joining any system to the new domain 4. Restore servers in priority order: authentication, DNS, DHCP, then business-critical applications 5. Restore workstations via reimaging, not file-level restore 6. Restore data from verified clean backups to rebuilt file servers 7. Reconnect to production network only after validation **If using a decryptor:** 1. Test the decryptor on a non-critical system first 2. Decrypt in order of business priority 3. Scan all decrypted systems for residual malware before reconnection ### Step 6: Post-Ransomware Hardening Implement controls to prevent recurrence: - Enforce MFA on all remote access (VPN, RDP, cloud portals) - Implement 3-2-1-1-0 backup strategy (3 copies, 2 media types, 1 offsite, 1 immutable, 0 errors) - Deploy application whitelisting on servers - Implement network segmentation between workstation and server VLANs - Enable Protected Users security group for privileged accounts - Disable NTLM authentication where possible - Deploy LAPS (Local Administrator Password Solution) for local admin accounts ## Key Concepts | Term | Definition | |------|------------| | **Double Extortion** | Ransomware tactic combining file encryption with data exfiltration and threat to publish stolen data | | **Immutable Backup** | Backup storage that cannot be modified or deleted for a defined retention period, protecting against ransomware targeting backups | | **OFAC Sanctions** | U.S. Office of Foreign Assets Control restrictions that may prohibit ransom payments to sanctioned entities or jurisdictions | | **Dwell Time** | Days the attacker was present before deploying ransomware; critical for determining which backups are clean | | **Ransomware-as-a-Service (RaaS)** | Criminal business model where ransomware developers lease their malware to affiliates who conduct attacks | | **Rclone** | Legitimate cloud sync tool commonly abused by ransomware operators for data exfiltration before encryption | | **3-2-1-1-0 Backup Rule** | Backup strategy requiring 3 copies, 2 media types, 1 offsite, 1 immutable/air-gapped, and 0 errors in recovery testing | ## Tools & Systems - **ID Ransomware**: Online service to identify ransomware variant from ransom note or encrypted file sample - **NoMoreRansom.org**: Europol-backed project providing free decryption tools for certain ransomware families - **Veeam / Commvault**: Enterprise backup platforms with immutable repository and instant VM recovery capabilities - **KAPE**: Rapid forensic triage collection from encrypted systems to determine initial access and dwell time - **Cado Response**: Cloud-native forensics platform for investigating ransomware that affects cloud infrastructure ## Common Scenarios ### Scenario: LockBit 3.0 via Compromised VPN **Context**: Attackers compromised VPN credentials (no MFA), spent 12 days performing reconnaissance, disabled antivirus via GPO, exfiltrated 47GB of data, and deployed LockBit 3.0 across the domain via GPO at 2:00 AM on a Sunday. **Approach**: 1. Disconnect all network segments at the core switch level 2. Verify offline backup integrity (Veeam repository on immutable storage) 3. Preserve two encrypted servers powered on for memory forensics 4. Engage incident response retainer and cyber insurance carrier 5. Begin recovery in isolated network: rebuild DCs, reset all passwords, restore in priority order 6. Conduct forensic investigation in parallel to determine initial access and full adversary activity **Pitfalls**: - Restoring from backups that were created during the 12-day dwell time (may contain backdoors) - Paying the ransom without OFAC screening and legal counsel review - Reconnecting recovered systems to the production network before full password reset - Not checking for data exfiltration, leaving the organization exposed to the extortion threat ## Output Format ``` RANSOMWARE INCIDENT REPORT =========================== Incident: INC-2025-1892 Ransomware Family: LockBit 3.0 (Black) Date Detected: 2025-11-17T06:45:00Z Initial Access: VPN credential compromise (no MFA) Dwell Time: 12 days IMPACT SUMMARY Encrypted Systems: 187 endpoints, 12 servers Business Impact: Full operations disruption Data Exfiltrated: 47GB (finance, HR, legal documents) Ransom Demand: $2.5M BTC (72-hour deadline) Backup Status: Veeam immutable repository - CLEAN RECOVERY APPROACH Decision: Restore from backup (no ransom payment) Recovery Start: 2025-11-17T10:00:00Z DC Rebuild: Complete - 2025-11-17T18:00:00Z Critical Systems: Restored - 2025-11-18T12:00:00Z Full Recovery: Estimated 2025-11-21 CONTAINMENT TIMELINE 06:45 UTC - Ransomware detected by SOC analyst 07:00 UTC - Network segments disconnected 07:15 UTC - Incident commander activated IR plan 07:30 UTC - Backup integrity verification started 08:00 UTC - Memory forensics initiated on 2 live systems 10:00 UTC - Recovery operations commenced in clean room POST-INCIDENT ACTIONS 1. MFA enforced on all VPN and remote access 2. 3-2-1-1-0 backup architecture implemented 3. Network segmentation between workstation/server VLANs 4. LAPS deployed for local administrator passwords 5. Regulatory notifications filed (GDPR 72-hour, state AG) ```
Related Skills
testing-ransomware-recovery-procedures
Test and validate ransomware recovery procedures including backup restore operations, RTO/RPO target verification, recovery sequencing, and clean restore validation to ensure organizational resilience against destructive ransomware attacks.
reverse-engineering-ransomware-encryption-routine
Reverse engineer ransomware encryption routines to identify cryptographic algorithms, key generation flaws, and potential decryption opportunities using static and dynamic analysis.
recovering-from-ransomware-attack
Executes structured recovery from a ransomware incident following NIST and CISA frameworks, including environment isolation, forensic evidence preservation, clean infrastructure rebuild, prioritized system restoration from verified backups, credential reset, and validation against re-infection. Covers Active Directory recovery, database restoration, and application stack rebuild in dependency order. Activates for requests involving ransomware recovery, post-encryption restoration, or disaster recovery from ransomware.
performing-yara-rule-development-for-detection
Develop precise YARA rules for malware detection by identifying unique byte patterns, strings, and behavioral indicators in executable files while minimizing false positives.
performing-wireless-security-assessment-with-kismet
Conduct wireless network security assessments using Kismet to detect rogue access points, hidden SSIDs, weak encryption, and unauthorized clients through passive RF monitoring.
performing-wireless-network-penetration-test
Execute a wireless network penetration test to assess WiFi security by capturing handshakes, cracking WPA2/WPA3 keys, detecting rogue access points, and testing wireless segmentation using Aircrack-ng and related tools.
performing-windows-artifact-analysis-with-eric-zimmerman-tools
Perform comprehensive Windows forensic artifact analysis using Eric Zimmerman's open-source EZ Tools suite including KAPE, MFTECmd, PECmd, LECmd, JLECmd, and Timeline Explorer for parsing registry hives, prefetch files, event logs, and file system metadata.
performing-wifi-password-cracking-with-aircrack
Captures WPA/WPA2 handshakes and performs offline password cracking using aircrack-ng, hashcat, and dictionary attacks during authorized wireless security assessments to evaluate passphrase strength and wireless network security posture.
performing-web-cache-poisoning-attack
Exploiting web cache mechanisms to serve malicious content to other users by poisoning cached responses through unkeyed headers and parameters during authorized security tests.
performing-web-cache-deception-attack
Execute web cache deception attacks by exploiting path normalization discrepancies between CDN caching layers and origin servers to cache and retrieve sensitive authenticated content.
performing-web-application-vulnerability-triage
Triage web application vulnerability findings from DAST/SAST scanners using OWASP risk rating methodology to separate true positives from false positives and prioritize remediation.
performing-web-application-scanning-with-nikto
Nikto is an open-source web server and web application scanner that tests against over 7,000 potentially dangerous files/programs, checks for outdated versions of over 1,250 servers, and identifies ve