📋 Ransomware Response Guide  ·  Ransomware Response · Step 3 of 7

Evidence you destroy in the first hours can never be recovered

Forensic evidence from a ransomware attack is needed for insurance claims, law enforcement, regulatory compliance, and understanding how the attack happened. Most of it is fragile — here's what to protect.

Get the Full PDF Guide Our Cybersecurity Services

Why evidence preservation is non-negotiable

In the panic of a ransomware attack, the instinct is to clean up — delete the malicious files, wipe and rebuild the infected machines, restore from backup and move on. This instinct, while understandable, can be extremely costly.

Forensic evidence from a ransomware attack is needed for: cyber insurance claims (most policies require evidence of the incident), law enforcement investigation, regulatory compliance notifications, understanding the attack vector to prevent reinfection, and potential legal action against attackers if they're identified.

Much of this evidence is volatile — it exists only in memory or in log files that get overwritten — and once destroyed, it cannot be recreated.

What not to do

Do not delete or overwrite any files on infected systems. Even files that look like ransomware artifacts — the executable that started the encryption, temporary files, ransom notes — should not be deleted until a forensic investigator has had the opportunity to examine them.

Do not run cleanup tools or antivirus scans on infected machines. These tools are designed to delete malware — which is exactly the evidence you need to preserve. Run them after forensic imaging is complete, not before.

Do not restart infected machines (we covered this in Step 1, but it bears repeating). Volatile memory — RAM — may contain encryption keys, attacker tools, and forensic artifacts. A restart wipes RAM permanently.

What to capture and preserve

Ransom notes

Ransom notes contain critical information: the ransomware variant, the attacker's communication method (usually a .onion address or email), the ransom amount, and the payment deadline. Photograph or screenshot every ransom note you find — they sometimes appear as text files (README.txt, HOW_TO_DECRYPT.txt) in every encrypted directory.

System and network logs

Windows Event Logs, firewall logs, VPN logs, email gateway logs, and Active Directory logs contain evidence of how the attack entered your environment and where it moved. These logs have retention limits and may be overwritten if not exported promptly. Ask your IT team or MSP to export and preserve logs from:

  • Windows Security Event Log from affected servers and workstations
  • Firewall and network logs for the 30 days preceding the attack
  • VPN access logs
  • Microsoft 365 audit logs (available in the Security & Compliance Center)
  • Email gateway logs
  • Active Directory authentication logs

Memory capture

If you have access to forensic tools, capturing a memory image (RAM dump) from infected machines before they're shut down can preserve encryption keys and attacker artifacts. This typically requires specialist tools and expertise — it's a task for your incident response team, not something to attempt without training.

Disk images

Before wiping and rebuilding any infected machine, create a forensic disk image. This preserves a complete copy of the machine's state at the time of the attack. Your incident response team can analyze it later without needing the original hardware.

Chain of custody

If you believe law enforcement may become involved, document every action taken with affected machines and evidence. Who touched what, when, and why. This "chain of custody" documentation may be required for evidence to be admissible in legal proceedings.

Quick Reference Checklist

  • Do NOT delete any files on infected systems
  • Do NOT run antivirus or cleanup tools on infected machines
  • Do NOT restart infected machines
  • Photograph or screenshot all ransom notes
  • Export Windows Event Logs from affected systems
  • Export firewall, VPN, and network logs for the prior 30 days
  • Export Microsoft 365 audit logs
  • Document every action taken with a timestamp and who did it
  • Engage your incident response team before touching infected machines
← Step 2: Assess Scope ↑ Back to guide overview Step 4: Attack Vector →

All 7 Steps

  1. Step 1: Isolate
  2. Step 2: Assess Scope
  3. Step 3: Preserve Evidence
  4. Step 4: Attack Vector
  5. Step 5: Notifications
  6. Step 6: Legal & Compliance
  7. Step 7: Harden
📄 Download Full PDF Guide
Need Help Right Now?

We've helped businesses recover from ransomware before

If you're dealing with an active incident or want to make sure you're protected before it happens, call us directly. We pick up.

Schedule a Free Consultation (646) 791-2137
0
Skip to Content
Moore Technology Consulting
Home
About
Services
Pricing
Client Stories
Free Consultation
Moore Technology Consulting
Home
About
Services
Pricing
Client Stories
Free Consultation
Home
About
Services
Pricing
Client Stories
Free Consultation

Contact Us

646-791-2137info@mooretechnologyconsulting.com

MTC_logo_R2-01.png

New York Locations
New York City, NY Manhattan | Brooklyn | Queens | Bronx | Staten Island

White Plains, NY 44 S Broadway, White Plains, NY 10601

Connecticut Locations
Stamford, CT 700 Canal Street, Stamford, CT 06902



Westport, CT 55 Post Rd W, Westport, CT 06880

©2026 Moore Technology Consulting.

All Rights Reserved.

Privacy Policy | FAQ

Moore Technology Consulting

Cybersecurity-first managed IT for SMBs across CT, NY & NYC.

(646) 791-2137 ✉ info@mooretechnologyconsulting.com 📍 Stamford, CT · White Plains, NY · Westport, CT
Services
  • Managed IT Services
  • Cybersecurity
  • Microsoft 365
  • Cloud Services
  • Backup & DR
  • Compliance & vCIO
Resources
  • Free Consultation
  • Ransomware Guide
  • About MTC
  • Client Stories
  • Contact Us
Stay Informed

Practical IT & cybersecurity insights for business owners. No spam, no fluff — just useful intel.

We respect your inbox. Unsubscribe anytime.

Powered by an Enterprise-Grade Stack

Microsoft Partner · Datto Partner · Huntress Partner · ThreatLocker Partner
Cisco Meraki · Fortinet · Cloudflare · Pax8

Moore Technology Consulting is headquartered in Stamford, CT and certified as a Minority Business Enterprise (MBE) by the New York City Department of Small Business Services (SBS) and New York State Empire State Development (ESD). We deliver managed IT and cybersecurity services to small and mid-sized businesses across Fairfield County, Westchester, and the greater New York metro area.

© 2026 Moore Technology Consulting. All rights reserved.
Privacy Policy Terms of Service Accessibility