Step 1
Mid-incident? Stop reading, start isolating.
Do these steps in this order. No decisions until the infected machine is off the network.
- Do not power off: a hard shutdown destroys forensic evidence and RAM-resident keys.
- Do not log in from a second machine: lateral movement is exactly what the actor wants.
- Do not pay, do not negotiate, no external mail from a possibly-compromised mailbox yet.