PACKET.TEL :: RAPID INCIDENT RESPONSE TEAM :: Basic, Free Recovery Run-Book

BEING ATTACKED? WE HAVE YOUR BACK - EVEN IF YOU'RE NOT CURRENTLY A CLIENT. THIS FREE RESOURCE IS PROVIDED AS A SERVICE TO HELP PEOPLE & BUSINESSES Figure Out Where To Start.

This is a very basic, condensed version of a "Recovery Run Book". Included, are some things that you can do, whether you're a customer of ours or not, and you find yourself a victim of Ransomware, Extortion via Cyber-Criminal Gangs, or Similar. If you are indeed a client of ours, we STRONGLY urge you to contact us instead. This resource is FREE, with NO STRINGS ATTACHED, and intended only as Initial Guidance for "Typical Scenarios". It's important to note that we are providing this HELPME page with no warranties - expressed or implied - and do not take any responsibility for outcome(s) of any actions taken as a result of this document. If you are unsure, let us help you. 

We have a SLIDING SCALE for paid options; You might be surprised how affordable services are.
Either way, Stay calm; We've handled this before. Let's continue on...

important LEGAL & ETHICAL disclaimer

IMPORTANT DISCLAIMER—READ THIS: This page offers free ideas for handling your potential situation. We stand by our paid services, but we're not liable for bad results from this advice—we don't know your specifics, so it could be totally wrong for you. Trust your instincts, like whether to grab a prepaid phone and call the FBI (USA) or seek the assistance of an Incident Response Team, including our PACKET.TEL RAPID INCIDENT RESPONSE Team. We DO NOT report to law enforcement unless legally obligated, unless you expressly give your consent. If you decide to pay the ransom (we don't recommend it), we can help broker it in an attempt to get some assurances that decryption is even possible if a ransom is paid, but due to the nature of this crime - NOTHING is guaranteed. Certainly we don't operate on the premise of blind trust in criminals.


IMMEDIATE ACTIONS TO TAKE

If you have the resources and manpower to make these things happen, with confidence that your actions will not simply tip-off your attackers, immediately:

  • ISOLATE affected systems: Shut down networks to stop spread.

  • DO NOT PAY yet: Assess the entire situation first—ransom often doesn't guarantee recovery. Request random files as "Proof of Life" (Yes, like Hollywood movies). Do NOT accept random files the attacker chooses as Proof of Life.

  • DOCUMENT EVERYTHING: Take screen recordings via cell phones or other devices so that they cannot easily be deleted (This is in case YOUR machine is compromised.) Screenshots should also be used to document demands, timelines, and other information. Record ALL telephone conversations with attackers. While our legal advice has been that these are extenuating and exigent circumstances, legal realities may be different depending on your situation. Always consult legal council - if possible. 

  • CALL HELP ANONYMOUSLY: Experts anonymously, if needed: Purchase prepaid cellular phones from gas stations or stores using cash, as sometimes attackers will have knowledge of security staff's banking histories, including credit cards.

IMMEDIATE ACTIONS TO TAKE NOW

If you have the resources and manpower to make these things happen, ensuring that your actions will absolutely not accidentally tip-off your attackers, begin

  • ISOLATE affected systems: Shut down networks to stop spread.

  • DO NOT PAY yet: Assess the entire situation first—ransom often doesn't guarantee recovery. Request random files as "Proof of Life" (Yes, like Hollywood movies). Do NOT accept random files the attacker chooses as Proof of Life.

  • DOCUMENT EVERYTHING: Take screen recordings via cell phones or other devices so that they cannot easily be deleted (This is in case YOUR machine is compromised.) Screenshots should also be used to document demands, timelines, and other information. Record ALL telephone conversations with attackers. While our legal advice has been that these are extenuating and exigent circumstances, legal realities may be different depending on your situation. Always consult legal council - if possible. 

  • CALL HELP ANONYMOUSLY: Experts anonymously, if needed: Purchase prepaid cellular phones from gas stations or stores using cash, as sometimes attackers will have knowledge of security staff's banking histories, including credit cards.

This is a frequently asked question?

This area of the HELPME site is incomplete and this will be finished after regression testing being completed on November 7th 2025. If you happen to be looking at this, we apologize but had to make this publicly available for system reasons. The rest of the page will be available within a few hours, check back. 

BOILERPLATE DUPLICATE.

BOILERPLATE: FAQ description. Add more detail about this service, such as benefits, appearance, components and value

BOILERPLATE DUPLICATE.

BOILERPLATE: FAQ description. Add more detail about this service, such as benefits, appearance, components and value

BOILERPLATE DUPLICATE.

BOILERPLATE: FAQ description. Add more detail about this service, such as benefits, appearance, components and value