đ¨ CRITICAL: If encryption is observed, assume the threat actor is still active in the network.
- â Identify Scope: Which systems are encrypted? Check file extensions (e.g., .locked, .crypt).
- â Check Ransom Note: Locate the text file (e.g., RESTORE_FILES.txt). Do NOT contact the attacker yet.
- â Snapshot RAM: Capture memory from Domain Controllers if possible before shutdown.