Ransomware Attack & Containment Detection to Escalation: 1 Minute
Explore a real-world attack on a customer in the utilities industry. The threat actor leveraged a malicious encoded PowerShell Script (Base64) and within a minute of detection, the Arctic Wolf Labs team triggered an investigation.
We’ll show you, step by step, how Arctic Wolf helped this customer both stop this attack as well as develop a roadmap for preventing future ones.

Actual time from detection to remediation in this real-world Arctic Wolf ransomware response
View Timeline Navigation
Wednesday, May 4, 2022 | 5:53 PM
Detection: Arctic Wolf Agent
Possible malicious encoded PowerShell script (Base64) detected on an employee workstation
The suspicious obfuscated LOAD string is decoded
[LOCAL ADMIN PASSWORD] is changed by PowerShell Script
Wednesday, May 4, 2022 | 5:54 pm
Investigation Triggered
Indicators of compromise (IoC) previously curated by Arctic Wolf Labs triggers an event of interest
Arctic Wolf Platform correlates potential malicious activity with other known IoCs
Incident escalated to Triage Team forensic dashboard with Urgent status
Wednesday, May 4, 2022 | 5:58 PM
Investigation Escalated
Triage team identifies a Scheduled Task created by PowerShell
PowerShell activity consistent with Gootloader, a multi-staged JavaScript package, likely dropped via SEO poisoning
Highly probable secondary payload was to be ransomware from a threat actor group like REvil
Wednesday, May 4, 2022 | 6:01 PM
Endpoint Contained
Investigation concludes, resulting in endpoint containment via Arctic Wolf Agent based upon predefined customer instructions
Gootloader prevented from launching secondary payload or connecting with C2 server
Wednesday, May 4, 2022 | 6:05 PM
Incident Ticketed
Customer notified of incident, containment, and remediations steps
Passwords reset for compromised admin and services accounts
Customer decides to reimage infected device
Begin Post-Incident Zone
Wednesday, May 4, 2022 | 6:06 PM
Post-Incident Security Journey