Cyber Risk Incident Response


Leveraging our expertise in packet level network analysis 5-L is able to rapidly validate the presence, and operational dynamics of an attack from the lowest levels of the network foundation up. By working from the transport layers upwards, 5-L can rapidly determine and implement the most effective method of response.

Emergency Technical Response Services

RANSOMWARE – 5-L has effectively restored critical systems to operation from some of the most destructive ransomware attacks. Using a structured approach, 5-L IR specialists assess the type of attack, isolate and image attacked systems for data preservation, and develop an effective response strategy ensuring the best possible outcome. Your ability to recover from a ransomware attack is dictated by how the situation is handled. The moment the attack is detected, contact 5-L for guidance.


- Do not communicate with the attackers. The moment you make contact, you start the clock.
- Using a known clean computer, verify whether your backups are not infected.
- Isolate infected computers from any network connection.
- Contact 5-L to aid you in identifying the ransomware variant, and to develop an Incident Response strategy.

In the event that you do pay the ransom and are provided with a decryption tool. The tool WILL fail at some point in the decryption process. The attackers will provide minimal assistance, but the tool will need to be rebuilt to complete the process. 5-L specializes in the repair of failed decryption apps.

Network Infiltration

Has a threat actor infiltrated your network to gain access to sensitive data. 5-L provides IR services to assist clients in identifying and addressing incidents of:


- Sabotage of IT resources by trusted parties.
- The theft of company confidential information for sale on the dark web.
- Exposure of payment processig or transaction data.
- Unexplained data loss or corruption.