FAQ
The specialists answer to you
FAQ : #what to do
Feel free to contact us to ask some questions or share a comment.
The first few hours are crucial to limit the extent of the damage. Here's the emergency procedure:
- Isolate infected machines — immediately disconnect from the network (Ethernet cable and Wi-Fi) to stop lateral propagation
- Do not restart systems — some encryption keys remain in RAM and can be extracted while the system is running
- Preserve traces — do not modify any system files; these elements are essential for forensic analysis
- Identify the ransomware — upload an encrypted file to ID Ransomware (id-ransomware.malwarehunterteam.com) to identify the family
- Evaluate your backups — check if your offline or cloud backups are intact
- Contact a specialist — an incident response expert can intervene in less than 2 hours
