INLYSE
Dienstleistungen
Produkte
Unternehmen
Anrufen
Schnelle Soforthilfe

Incident Response
Soforthilfe bei Angriffen

Ihr Unternehmen ist unter Beschuss? Unsere Ransomware- & Forensik-Spezialisten sind sofort einsatzbereit, um den Schaden zu begrenzen und den Betrieb sicher wiederherzustellen.

Zertifizierte Analysten
Reaktionszeit < 2 Std.
Active Incident Detected
ID: IR-2024-88A
Anomaler TrafficCritical
Memory ScanScanning...
Log CorrelationMatching
> isolation_protocol --force
... success: node-08 isolated
WARNING: Unauthenticated exfiltration attempt
Mehr erfahren
Erste Hilfe · Protokoll aktiv

Sofortmaßnahmen:
Was Sie jetzt tun sollten

Bevor unsere Experten eintreffen, können diese drei Schritte entscheiden, wie schnell Ihr Unternehmen wieder voll handlungsfähig ist.

01
PROTOCOL-001
HOCH

Keine Panik

Bewahren Sie Ruhe. Server nicht herunterfahren! Virtuelle Maschinen pausieren (Memory bleibt erhalten). Bei physikalischen Servern: Memory Dump erstellen, dann erst herunterfahren.

02
PROTOCOL-002
KRITISCH

Isolation

Trennen Sie betroffene Systeme sofort vom Netzwerk (Kabel ziehen, WLAN deaktivieren), um eine weitere Ausbreitung der Bedrohung zu verhindern.

03
PROTOCOL-003
LAUFEND

Dokumentation

Notieren Sie Zeitpunkt, Symptome und erste Beobachtungen chronologisch. Führen Sie keine Dateimanipulationen auf betroffenen Systemen durch.

Im Zweifel
Rufen Sie uns sofort an. Jede Minute zählt.
+49 721 619 328-0
Interactive Remediation Playbooks

Expertise, die man sofort spürt

Wir arbeiten nicht nach Bauchgefühl, sondern nach präzisen Playbooks. Erkunden Sie unsere Bibliothek an Maßnahmen für typische Cyber-Bedrohungen.

highID: ssl-expired-cert

Renew Expired SSL/TLS Certificate

An expired SSL/TLS certificate was detected. This breaks HTTPS trust and may expose users to man-in-the-middle attacks.

15 minutes
mediumID: ssl-weak-cipher

Replace Weak SSL/TLS Cipher Suites

Weak cipher suites (DES, 3DES, RC4, export ciphers) are enabled, potentially allowing decryption of traffic.

20 minutes
mediumID: ssl-self-signed

Replace Self-Signed Certificate

A self-signed certificate provides no chain of trust. Users will see browser warnings, and the certificate cannot be verified by clients.

20 minutes
highID: ssl-weak-protocol

Disable Deprecated TLS/SSL Protocols

Deprecated protocols (SSLv2, SSLv3, TLS 1.0, TLS 1.1) are still enabled, vulnerable to known attacks like POODLE, BEAST.

15 minutes
highID: telnet-enabled

Disable Telnet and Switch to SSH

Telnet transmits all data including credentials in cleartext. It should be replaced with SSH for all remote access.

20 minutes
highID: ftp-cleartext

Replace FTP with SFTP/SCP

FTP transmits files and credentials in cleartext. Replace with SFTP or SCP which use SSH encryption.

30 minutes
highID: smb-signing-disabled

Enable SMB Signing

SMB signing is disabled, allowing man-in-the-middle attacks and NTLM relay attacks on file sharing connections.

15 minutes
mediumID: ssh-hardening

Harden SSH Configuration

SSH configuration allows potentially insecure settings like root login, password authentication, or old protocols.

15 minutes
highID: snmp-default-community

Secure SNMP Configuration

SNMP is using default community strings (public/private), allowing anyone to read/modify device configurations.

20 minutes
mediumID: dns-open-resolver

Disable Open DNS Resolver

An open DNS resolver can be abused for DNS amplification DDoS attacks and DNS cache poisoning.

15 minutes
criticalID: sql-injection

Fix SQL Injection Vulnerability

SQL injection allows attackers to read, modify, or delete database contents and potentially execute system commands.

2 hours
highID: xss-reflected

Fix Cross-Site Scripting (XSS) Vulnerability

XSS allows attackers to inject malicious scripts that execute in users' browsers, stealing sessions, credentials, or defacing content.

1 hour
mediumID: csrf-missing

Implement CSRF Protection

Missing CSRF tokens allow attackers to trick authenticated users into performing unintended actions.

1 hour
mediumID: directory-listing

Disable Directory Listing

Web server directory listing exposes file structure, potentially revealing sensitive files, backups, or configuration files.

10 minutes
mediumID: missing-security-headers

Add Missing Security Headers

Important HTTP security headers are missing, leaving the application vulnerable to clickjacking, MIME-sniffing, and other attacks.

15 minutes
criticalID: default-credentials

Change Default Credentials

Default manufacturer/vendor credentials are in use. These are publicly known and can be exploited trivially.

15 minutes
mediumID: password-policy-weak

Strengthen Password Policy

Weak password policy allows easily guessable passwords, increasing risk of brute-force and credential stuffing attacks.

20 minutes
highID: mfa-missing

Implement Multi-Factor Authentication

Critical services lack multi-factor authentication, making them vulnerable to credential compromise.

1 hour
highID: outdated-software

Update Outdated Software

Software with known vulnerabilities is running. Apply available patches to prevent exploitation.

30 minutes
criticalID: cve-patch-available

Apply CVE Security Patch

A known CVE with an available patch has been identified. Apply the vendor patch immediately to prevent exploitation.

30 minutes
highID: ad-kerberoasting

Remediate Kerberoasting Risk

Service accounts with SPNs are vulnerable to Kerberoasting — offline password cracking of Kerberos TGS tickets.

1 hour
highID: ad-asrep-roasting

Fix AS-REP Roasting Vulnerability

Accounts without Kerberos pre-authentication can have their password hashes retrieved and cracked offline.

30 minutes
criticalID: ad-unconstrained-delegation

Remove Unconstrained Kerberos Delegation

Systems with unconstrained delegation can impersonate any user to any service, enabling domain compromise if the system is compromised.

1 hour
mediumID: ad-password-never-expires

Fix Accounts with Non-Expiring Passwords

User accounts with 'Password never expires' flag increase risk of credential compromise from stale passwords.

30 minutes
highID: ad-inactive-privileged

Disable Inactive Privileged Accounts

Privileged accounts that have not been used for extended periods pose a significant security risk.

45 minutes
criticalID: ad-attack-path

Remediate Active Directory Attack Path

An attack path to Domain Admin has been identified, allowing privilege escalation from compromised accounts.

2 hours
highID: ad-smb-signing

Enable SMB Signing on Domain Systems

SMB signing is not enforced, allowing NTLM relay and man-in-the-middle attacks against domain systems.

30 minutes
highID: ad-laps

Deploy LAPS for Local Admin Passwords

Local administrator passwords are identical across workstations, enabling lateral movement after any single compromise.

2 hours
mediumID: host-file-permissions

Fix Insecure File Permissions

Sensitive system files have overly permissive access controls, potentially exposing credentials or configurations.

30 minutes
mediumID: host-kernel-hardening

Apply Kernel Security Hardening

Linux kernel parameters are not hardened, leaving the system vulnerable to various network and local attacks.

20 minutes
mediumID: host-service-hardening

Disable Unnecessary System Services

Non-essential services are running, increasing the attack surface of the system.

20 minutes
mediumID: host-audit-logging

Configure System Audit Logging

System audit logging is not configured or insufficient, hindering incident detection and forensics.

30 minutes
criticalID: host-secrets-in-code

Remove Exposed Secrets from Code/Files

Sensitive credentials, API keys, or tokens were found in source code or configuration files.

1 hour
highID: host-open-database

Secure Exposed Database Ports

Database services (MySQL, PostgreSQL, MSSQL, MongoDB) are directly accessible, risking unauthorized data access.

20 minutes
highID: host-open-rdp

Secure or Restrict RDP Access

Remote Desktop Protocol (RDP) is exposed, making the system vulnerable to brute-force and credential stuffing attacks.

30 minutes
criticalID: endpoint-defender-disabled

Re-enable Windows Defender Real-Time Protection

Windows Defender real-time protection is disabled, leaving the system without active malware protection.

15 minutes
highID: endpoint-signatures-outdated

Update Windows Defender Antivirus Signatures

Antivirus definitions are outdated, reducing detection capability for recent malware threats.

10 minutes
criticalID: endpoint-unresolved-threats

Resolve Detected Malware Threats

Windows Defender has detected threats that have not been fully remediated or quarantined.

30 minutes
highID: endpoint-ntlm-relay

Mitigate NTLM Relay Attack Risk

NTLM authentication is enabled and systems are vulnerable to relay attacks allowing credential forwarding.

1 hour
Unser Vorgehen

Unser strukturierter IR-Prozess

Nach NIST- und SANS-Standards führen wir Ihr Unternehmen systematisch durch die Krise zurück in den Normalbetrieb.

01

Triage & Analyse

Sofortige Lagebewertung und Priorisierung der Maßnahmen.

02

Eindämmung

Isolierung betroffener Systeme zur Schadensbegrenzung.

03

Beseitigung

Vollständige Entfernung von Bedrohungen und Schwachstellen.

04

Wiederherstellung

Sicherer Rückgang zum operativen Normalbetrieb.

05

Nachbereitung

Analyse der Ursachen und dauerhafte Systemhärtung.

Jede Minute zählt

Warten Sie nicht,
bis es zu spät ist.

Ob Prävention oder akuter Notfall — INLYSE ist Ihr Partner für belastbare Cyber-Resilienz und professionelle Incident Response.

Antwort in unter 4 Stunden
Zertifizierte Experten
DSGVO-konform

Bereit für mehr Sicherheit?

Lassen Sie uns gemeinsam Ihre IT-Infrastruktur absichern.

INLYSE

INLYSE ist Ihr Experte für Malware-Analyse, Incident Response und proaktive IT-Sicherheit. Wir schützen Ihr Unternehmen vor digitalen Bedrohungen.

Haid-und-Neu-Straße 18
76131 Karlsruhe
Germany
+49 (0) 721 619328-0info@inlyse.com
X
LinkedIn
Facebook
YouTube
Unternehmen
  • Über uns
  • Karriere
  • Blog & News
  • Kontakt
Dienstleistungen
  • Security Audit
  • IT-Forensik
  • Penetration Testing
  • Incident Response
  • Malware Analyse
  • Readiness Workshop
  • Security Awareness
  • Systemhärtung
Produkte
  • Malware Detection & Analysis
  • INLYSE CDR
  • VulnScan
  • Darknet Scan
Rechtliches
  • Impressum
  • Datenschutz
  • AGB

© 2026 INLYSE GmbH. Alle Rechte vorbehalten.

Systeme aktiv & geschützt
DSGVO-konform
Made with passion and protected by INLYSE