CYBER-EXTORTION & RANSOMWARE RESPONSE

Cyber extortion typically involves some form of malware that provides malicious access to your systems and networks.

Cyber-attackers then obtain passwords and credentials, deleting any backups in the process, to your systems and ultimately encrypts your data using ransomware. Your files are then held for ransom until you pay a fee to receive a decryption key.  Another form of extortion involves DDoS attacks, whereby attackers use a vast network of infected computers to overload servers and other critical IT resources, resulting in unavailability until the attacks stop.

Lastly, cyber-attackers have begun stealing confidential data about companies, threatening to release the data to the public unless they are paid.

Prudential Associates has become one of the leading cyber-security companies  offering comprehensive cyber-extortion and ransomware response services. Our experts are well-versed in identifying ways to prevent such occurrences, as well as responding to cyber-extortion incidents after they’ve occurred.

Additionally, our cyber-incident response experts are highly experienced in dealing with cyber-extortionists. Due to our experience and familiarity with various cyber-crime groups that are involved in these attacks, we are more likely to secure effective and reasonable terms for the release of our clients’ data.

Our services include, but are not limited to, the following:
ransomware

Assessment: Prudential Associates can provide a comprehensive risk assessment to determine your specific risk factors and evaluate the likelihood of a successful attack on your system. 

Identification: If cyber-attackers succeed in accessing your network, Prudential Associates’ experts can determine what type of malware was used, what data was accessed or encrypted, and the extent of the intrusion into your network. If your data has been encrypted, our experts can determine the exact variant of ransomware that was used and the probability of successfully recovering your data.

Recovery & Response: Once our examiners determine what variant of ransomware has been used in your environment, we may be able to recover some of the encrypted data using our specialized decryption software.

Extortion Negotiations:  Prudential Associates offers negotiation services with the goal of reducing the cost of any ransom. If negotiation is successful, our experts can provide an anonymous bitcoin payment to the attackers, confirm that any decryption keys work properly, decrypt your data without the need for you to communicate with the attacker, ensure that your system is free of further malware, and preserve all evidence of the attack for law enforcement.

Post-Ransomware Assessment:  Prudential Associates’ team of computer forensics experts can perform a comprehensive analysis of your system to identify the relevant vulnerability, patch it, and ensure that your system/network is free from ransomware and related malware. At the client’s discretion, our experts can carry out this analysis remotely in our highly secure forensics lab or on-site.

Documentation: Throughout all processes, Prudential Associates documents every step taken and offers Chain of Custody documentation for all devices. Importantly, all communication with those carrying out the attack will be preserved and recorded for the client. 

Law Enforcement Support

Beyond individuals, companies, and law firms, our experience and team of experts routinely works with various law enforcement agencies (locally in Maryland as well as nationally) to provide support with multiple types of criminal investigations. Often, our firm will act in a consultative manner to partner with law enforcement agencies by providing resources, equipment, and/or advice.

Our state-of-the-art digital forensics lab has been utilized by multiple agencies in the past to assist with active investigations. In addition to tactical and strategic support for agencies, Prudential Associates also has strong ties with agencies around the country by way of employing active, off-duty officers for specific protection services and projects.


Does your company have proper insurance coverage for cybersecurity and compromised digital privacy incidents? We recommend Troy Turner and State Farm Insurance. Contact Troy for policy options.

state farm logo