Chapter 6

Investigation

Knowledge itself is power.

—Sir Francis Bacon

Learning Objectives

  • Understand the purpose of investigating a cyber extortion attack

  • Gain strategies for identifying an adversary and using this knowledge to inform the response

  • Articulate techniques for scoping an attack, including identifying indicators of compromise, tracking down “patient zero,” and developing a timeline

  • Understand how and why to preserve evidence in cyber extortion cases

  • Learn the fundamentals of data breach investigations and how they relate to cyber extortion attacks

As soon as a cyber extortion attack is discovered, the investigation begins—at least informally, if not formally. Investigation refers to the process of systematically uncovering facts ...

Get Ransomware and Cyber Extortion: Response and Prevention now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.