From My SOC Playbook --> Confirming and Containing Ransomware...

Jim Leone

7/24/20252 min read

When ransomware strikes, the first few minutes can make or break your response. Acting swiftly and methodically can contain the damage, preserve vital evidence, and prevent the attack from spreading deeper into the network. This SOC playbook outlines the critical steps to take immediately when ransomware is suspected, along with key pitfalls to avoid.

Identify Early Warning Signs

Ransomware isn't always obvious. Be alert for the following symptoms:

  • Files with strange extensions or encryption

  • Sudden inability to access mapped drives or shared folders

  • Appearance of ransom notes (e.g., READ_ME.txt or DECRYPT.html)

  • Spikes in CPU or disk activity

  • EDR/AV alerts showing unusual behavior, such as PowerShell abuse or file overwrites

  • Reports from users unable to access data or systems

Action --> Treat any of these as high-priority SOC alerts. Investigate quickly and escalate if suspicious patterns appear.

Contain the Threat Immediately

Time is your enemy. Once ransomware detonates, lateral movement can begin within minutes.

Take these actions without delay...

  • Isolate affected systems from the network (pull the plug or disable switch ports)

  • Disable Wi-Fi and Bluetooth if active

  • Kill suspicious processes via EDR tools if they're still running

  • Block outbound traffic from affected hosts (especially to Tor or known C2 infrastructure)

  • Suspend compromised user accounts

Containment buys time for investigation and forensics.

Preserve Evidence

Don’t rush to wipe systems. Digital evidence is vital for attribution, understanding blast radius, and regulatory requirements.

Preserve...

  • Memory (RAM) dumps if possible

  • Ransom notes, encrypted files, and logs

  • EDR telemetry and forensic snapshots

  • Firewall, VPN, and proxy logs

Tip: Don’t reboot infected machines unless absolutely necessary. You risk losing volatile evidence.

Assess Scope and Impact

Identify how far the infection has spread...

  • Which systems are encrypted?

  • Which users/accounts were involved?

  • What lateral movement (RDP, PsExec, SMB) is evident?

  • Are backups intact?

Use log correlation tools, SIEM, and EDR to map the attack path.

Communicate Internally and Activate IR Plan

Notify key stakeholders...

  • SOC/NOC

  • IT Leadership

  • Legal and Compliance

  • Executive Leadership

Activate your incident response plan and begin drafting an executive summary.

Avoid --> Making premature public statements or paying ransom without full legal and leadership involvement.

Watch for Common Mistakes

Even seasoned teams can make these critical errors...

  • Rebooting infected systems too early

  • Starting re-imaging before full containment

  • Failing to secure backups (online backups can be hit too!)

  • Ignoring lateral movement and only cleaning the "obvious" endpoints

  • Overlooking logs that help trace the attacker’s path

Avoiding these can save time, money, and reputation damage.

Aftermath and Recovery

Once containment is confirmed...

  • Begin recovery using offline, verified backups

  • Rotate credentials for all impacted accounts

  • Patch any vulnerabilities or misconfigurations

  • Perform a full root cause analysis and IOC sharing

  • Report to necessary agencies (CISA, FBI, regulators)

Prepare a post-mortem and update your playbooks based on lessons learned.

Ransomware isn’t just a technical issue, it’s a business crisis. Having a pre-defined SOC playbook, trained staff, and rehearsed response workflows is what separates a minor disruption from a full-blown disaster.

If you’re reading this as a "just in case," bookmark it. If you’re reading this during an actual incident, stop and isolate.