Tabletop Exercise:
Data Encryption/Ransomware
Restore from Backups
Add Date
About This Exercise
This exercise was developed by the MiSecure team for school districts to enhance their preparedness for cybersecurity events and incidents.
This presentation is customizable and includes template exercise objectives, scenarios, and discussion questions as well as a collection of references and resources. While this exercise can be used as-is, it can and should be customized to be more realistic for your organization. For example, you can name systems that you operate and department or team names that are specific to your organization. If you are a school district in Michigan and need assistance running a tabletop exercise, reach out to the MISecure team.
To make the exercise more valuable, consider choosing a facilitator who is not a participant in the exercise.
This presentation is shared under Creative Commons Licensing CCBY https://creativecommons.org/licenses/by/4.0/.
We strongly recommend that you develop a cybersecurity incident response plan prior to running tabletop exercises. For a starting point, try the MiSecure Incident Response Planning templates (https://misecure.org/incident-response-planning-tools/)
2
Skip or hide this slide when running an exercise
Exercise Goal | Key Participants | Length | Incident Severity |
Rehearse technical roles and restoration procedures following a ransomware event. | District Tech Team and Backup Partners | 2.5 hours | High |
Welcome and Intros
3
What is a Tabletop Exercise (TTX)?
Definition:
Purpose:
4
Participant Engagement & Expectations
Goals:
Acquaintance Building:
Active Participation:
5
Exercise Roles
Players: �Perform their regular roles and responsibilities, talking through the simulated scenario as they would in a real emergency.
Facilitators: �Provide situation updates, moderate discussions, and resolve questions to keep the exercise on track.
Observers: �Ask relevant questions and offer expertise to support player responses without directly influencing outcomes.
Notetakers (this is you): �Document discussions and key takeaways for the After-Action Report.
6
Expected Outcomes
Documenting Findings:
Update Plans:
Enhanced Coordination through shared Experience:
7
Assumptions & Artificialities
8
Operational Security
9
The Scenario
10
Day 1 (Saturday): 6:00 AM: Ransomware Detected
Your IT Team discovers that all on premise hosted systems have been encrypted by a cyber threat actor.
11
Discussion
IT Director: What communications/notifications do you make?
IT Team: What steps do you take immediately?
Are you working from your Incident Response Plan now?
If “all on premise systems” are encrypted, what IT systems and �school services are available and which are not available?
12
Severity Level | Description |
False positive | Description: Events determined to be the result of normal, if unexpected, user or automated activity. Example: A user mistakenly believes that they’ve exposed their credentials in response to a suspicious email. Potential Response: none |
Low level Simple event | Description: Incidents that have minimal impact on the organization. Example: Detection of malware that has been quarantined, phishing emails that have been blocked, unsuccessful attempts to gain unauthorized access. Potential Response: Handled by routine operational processes, no significant disruption, limited to specific users or systems. |
Medium level Significant event | Description: Incidents that have a moderate impact and may require some intervention. Example: A compromise of a single user's credentials, malware infection on a few systems, unauthorized access to non-sensitive data. Potential Response: Requires IT/security team intervention, may involve resetting passwords, cleaning infected systems, monitoring for further issues. |
High level incident | Description: Incidents that significantly impact business operations or sensitive data. Example: Data breach involving sensitive information, widespread malware/ransomware attack, significant unauthorized access to critical systems. Potential Response: Response: Requires immediate and coordinated response from the incident response team, may involve shutting down systems, notifying affected parties, and implementing containment measures. |
Critical level Serious incident | Description: Incidents that pose an extreme threat to the organization's operations, data, or reputation. Example: Advanced persistent threats (APTs), major data breach affecting large volumes of sensitive data, coordinated cyberattacks causing substantial operational disruption. Potential Response: A full activation of the incident response plan, potential involvement of external agencies (e.g., law enforcement, cybersecurity experts), comprehensive containment, eradication, and recovery efforts. |
Catastrophic | Description: Incidents that threaten the survival of the organization. Example: Nation-state sponsored attacks causing massive data loss, critical infrastructure attacks leading to extended downtime, cyberattacks causing significant financial loss or legal ramifications. Potential Response: Crisis management, involvement of executive leadership, public communication strategies, extensive recovery and continuity plans, potential long-term impact assessment and remediation. Possible execution of your Emergency Management Plan. |
Incident Severity Scale from
Day 1: 7:00 AM: Assemble Your Team
Describe your Incident Response Team.
Is your Incident Response Quick Reference available offline?
Who are the decision makers?
14
Page 1 of Incident Response Worksheet available at MISecure.
Preliminary Investigation Reveals…
All on-premise systems are encrypted.
Cloud email system is compromised and cannot be trusted for incident communications.
15
16
Critical Assets Worksheet from MiSecure Incident Response Worksheet available at MISecure.
17
Incident Log Template from MiSecure Incident Response Worksheet available at MISecure.
Day 1 - 10 AM: Can we access log files?
Your Incident Response Firm and the FBI are requesting log files.
18
19
Critical Log File Worksheet from MiSecure Incident Response Worksheet available at MISecure.
Day 1 - 11 AM: RFI - Can we restore from backups?
Your Incident Response Leadership including insurance requests information about available backups to help in their decision making.
20
IR Team thanks you for the information and will now discuss with Insurance, law enforcement and possible communication with cyber threat actor.
Day 1 - 11:15AM: What does your team do while waiting?
Incident Response Team including insurance provider, law enforcement and others may take time to decide what to do next.
If you anticipate needing to restore, what could you do while waiting for the leadership to decide on a course of action?
What questions do you have at this point and how can you get answers?
21
22
Day 1: Saturday 5:00 PM - Restore from Backups!
Your preparation and confidence pays off - Incident Response Leadership Team decides that your district will not pay the ransom and instead restore from backup.
Request is that you restore to a restricted environment with limited internet access.
FBI and IR firm are familiar with the threat actor and ransomware variant. They provide firewall rules to prevent contact with threat actors command and control.
IR firm provides MDR for all devices to aid in eviction of threat actor.
There will also be a password reset event for all accounts to attempt to evict the threat actor.
23
Discussion
Walk through your restoration process.
Describe the restoration team including internal and external resources.
What systems come up first?
How do you reimage workstations?
What is the leadership team doing and communicating at this point?
Is all this documented?
How would you conduct a password reset for all accounts?
24
Day 1: 9:00 PM
Superintendent brings pizza, thanks the team and asks how things are going.
25
Day 1: 9:30PM - End of Day Tech Team Wrap Up
What is your report at this point?
What is your cadence for updating leadership?
Best/worst case scenarios.
What systems will and will not be fully operational on Monday morning?
How long until full restore is complete?
How are you feeling at this point?
26
Hotwash/Key Takeaways
27
Thank You!
28
Resources
MISecure Incident Response Planning Tools
30
MISecure Cybersecurity Tabletop Exercise Library
Full TTX Library at: https://misecure.org/tabletop-exercises/
Michigan Incident Response Contacts
For School Districts in Michigan:
MISecure Operations Center �989-763-5797 �misecure@gomaisa.org
For School Districts and other entities in Michigan:
Michigan State Police Cyber Command Center �877-MI-CYBER �mc3@michigan.gov
32