CIRCLE 6 SYSTEMS PRESENTS
DUDE DILIGENCE
Issue #3: The 60-Minute Countdown
Dude Diligence - Duke Dillingham, compliance officer and cybersecurity hero
"Looks like someone opened that attachment."
RANSOMWARE!

The office is encrypted. The clock is ticking. Everyone is panicking.
Everyone except Duke Dillingham.

Ransomware Readiness Training • A Circle 6 Systems Production
Page 2 of 10
What Is Ransomware?
Duke Dillingham turns to face you directly. He knows you're reading this. He doesn't mind. He sips his coffee.
DUDE DILIGENCE Alright, let's talk about ransomware. Pull up a chair. Grab some coffee. This is going to be a thing.
Digital Kidnapping

Ransomware is malware that encrypts your files — documents, databases, spreadsheets, everything — and demands payment (usually in cryptocurrency) for the decryption key.

DUDE DILIGENCE It's digital kidnapping. Except they kidnap your spreadsheets. And somehow that's worth millions.
Double Extortion

Modern ransomware gangs don't just encrypt — they steal your data first, then threaten to publish it if you don't pay. Encrypt AND leak. Belt AND suspenders, but for criminals.

DUDE DILIGENCE They'll lock your files, then post your HR records on the dark web. Real classy operation.
By the Numbers
48% enter via
compromised VPN
5 median days
intrusion to encryption
$1.5M average
ransom demand
80% who pay get
hit again
DUKE (inner monologue) Five days. They're in your network for five days before they pull the trigger. And nobody noticed. That's the part that keeps me up at night. Well, that and the coffee.
Page 3 of 10
How It Gets In
Dude leans against the whiteboard. He's drawn four attack vectors. The handwriting is surprisingly neat for someone who looks like he just rolled out of a van.
48%

Compromised VPN/RDP Credentials

Stolen or weak passwords to remote access systems. Bought on the dark web, brute-forced, or harvested from previous breaches. They log in like an employee. Because they have an employee's password.

32%

Phishing Emails

Malicious attachments, macro-enabled Word docs, links to credential harvesting pages. The classic. "Please review the attached invoice." The invoice is not an invoice.

12%

Exploited Vulnerabilities

Unpatched software, zero-day exploits, exposed services. That update you've been snoozing for three weeks? That's the one.

8%

Supply Chain Attacks

Compromised software updates, trusted vendor access, managed service provider breaches. They don't hack you — they hack someone you trust.

DUDE DILIGENCE 48% come through the front door with stolen keys. We literally handed them the password. I want you to sit with that for a second. Almost half of all ransomware attacks happen because someone's VPN password was "Summer2024!" and they didn't have MFA turned on. We're not getting hacked by geniuses. We're getting hacked by people who can use a search engine.
Page 4 of 10
The Attack Chain
Dude draws a timeline on the whiteboard. Five stages. Five days. By the time you see the ransom note, you're on stage five.
1

Initial Access

The attacker gets a foothold. A phishing email gets clicked. Stolen VPN credentials get used. An unpatched server gets exploited. One way or another, they're in.

2

Persistence & Reconnaissance

They install backdoors, create scheduled tasks, and start mapping your network. They use "living off the land" tools — legitimate admin tools like PowerShell and WMI — so they don't trigger antivirus. Clever. Annoyingly clever.

3

Lateral Movement

They spread through the network. Privilege escalation. Domain admin credentials. Jumping from workstation to server to domain controller. They're building a map of everything valuable.

4

Data Exfiltration

Before they encrypt anything, they steal your data. Customer records, financial data, intellectual property. This is the "double extortion" setup. Insurance policy for the bad guys — even if you have backups, they can still threaten to leak.

5

Encryption & Ransom Note

The locks go on. Every file gets encrypted. The ransom note appears. The phone starts ringing. This is the part everyone sees. But it's the last thing that happens, not the first.

DUDE DILIGENCE By the time you see the ransom note, they've been in your network for days. The note is the victory lap. They've already won. They're just telling you about it now. It's like getting a postcard from someone who robbed your house last week.
Page 5 of 10
Monday Morning
Monday. 8:07 AM. Duke Dillingham walks into the office. Coffee in hand. Sweater slightly rumpled. Lanyard swinging. Everything is normal. Until it isn't.
AAAAHHH!!!

The lobby is chaos. Karen from Accounting is hyperventilating. Dave from IT is running — actually running — down the hallway. Three people are crying. One person is trying to unplug a printer for some reason.

KAREN (ACCOUNTING) EVERYTHING IS RED! MY SCREEN IS RED! ALL MY FILES SAY .LOCKED! WHAT DO I DO?!
DAVE (IT) DON'T TOUCH ANYTHING! NO, WAIT — TOUCH SOME THINGS! I MEAN — HOLD ON —
Dude Diligence transformation - hoodie comes off, badge glows

YOUR FILES HAVE BEEN ENCRYPTED

All your files have been encrypted with military-grade AES-256 encryption.
To decrypt your files, you must pay 15 BTC to the following address:

bc1qxy2kgdygjrsqtzq2n0yrf2493p83kkfjhx0wlh
71:59:58

If payment is not received before the timer expires,
the price will double. After 7 days, your data will be published.

DO NOT attempt to decrypt files yourself. DO NOT contact law enforcement.

Dude takes a long sip of coffee. Looks at the screen. Looks at Karen. Looks back at the screen.

DUDE DILIGENCE Alright. Clock starts now.

The hoodie comes off. The badge glows. Dude Diligence has activated.

TRANSFORMATION!
DUKE (inner monologue) They encrypted the whole network in 4 hours. I've seen faster. The 2023 Akira crew did it in 2. Amateurs.
Page 6 of 10
The First 60 Minutes
The clock is ticking. Dude Diligence moves through the office like a man who has rehearsed this exact scenario forty times. Because he has.
TICK TICK TICK
0-5 MIN DISCONNECT

Unplug your ethernet cable. Turn off Wi-Fi. Do NOT power off the computer. Isolating the machine stops the ransomware from spreading to other systems on the network.

DUDE DILIGENCE (Mr. Rogers mode) Hey, hey. Take a breath. You're okay. Just unplug your ethernet cable — that's the one that looks like a fat phone cord. That's it. Don't turn anything off. Just unplug the cable. You're doing great. I'm really proud of you.

Karen unplugs the cable. Her hands are shaking but she does it. Dude gives her a gentle nod.

5-10 MIN CALL IT / SECURITY

Call your IT security team by phone. Do not use email — it may be compromised. Use your cell phone, a landline, or walk to their office in person.

DUDE DILIGENCE Call. Don't email. Email might be compromised. Use your phone. Use a landline. Use a carrier pigeon if you have to. I don't care if you yell out the window. Just don't use the company network to report that the company network is compromised. Think about it.
10-15 MIN ALERT NEARBY COLLEAGUES

Walk around. Use your voice. Tell nearby coworkers to unplug their network cables. If their screen looks odd — weird file extensions, error messages, ransom notes — they need to disconnect immediately.

DUDE DILIGENCE We're going analog. Stand up. Walk to the next desk. Use the thing evolution gave you — your voice. If their screen looks weird, tell them to unplug. Be the human firewall.
15-30 MIN DOCUMENT EVERYTHING

Take photos with your phone. Every ransom note. Every error message. Every weird file name. Write down the exact time you noticed the problem. This is evidence now — treat it like a crime scene.

DUDE DILIGENCE Phone photos of every ransom note. Every error message. Write down the time. What you saw. What you clicked. I know it feels like we should be doing something more dramatic right now, but documentation wins cases. Boring saves the day. Story of my life.
30-60 MIN FOLLOW IT'S LEAD

IT and security take point from here. Follow their instructions exactly. Do not run your own antivirus scan. Do not try to decrypt files yourself. Do not negotiate with the attackers. Do not "just check one thing real quick."

DUDE DILIGENCE IT takes point from here. Your job is to do exactly what they say. No freelancing. No "I'll just run a quick scan." No "I found a decryption tool on Reddit." No. Your initiative is appreciated in every other context. Not this one. Sit tight. You've done your part. Beautifully, I might add.
Page 7 of 10
The Defense Playbook
The crisis is contained. The forensic team is working. Dude pours his fourth coffee of the morning and turns to the whiteboard. Time to make sure this never happens again.
Dude Diligence studies the sacred arts of encryption and compliance
1

Use a Password Manager

Every account gets a unique, complex password. Generated by the password manager, not by your brain. Your brain is good at many things. Random 24-character strings is not one of them.

"'123456' isn't a password, it's an invitation. You might as well leave a key under the mat and a sign that says 'PLEASE ROB ME.'"

2

MFA on Everything

Multi-factor authentication on VPN, email, cloud services, admin accounts — everything. A stolen password with MFA enabled is just a stolen password. Without MFA, it's a stolen kingdom.

"MFA on everything. Especially VPN. ESPECIALLY email. I cannot stress this enough. I have stressed this in four all-hands meetings, two memos, and one haiku. Enable MFA."

3

Never Enable Macros

If a document asks you to "Enable Content" or "Enable Macros," that's malware asking you to let it run. Legitimate documents don't need macros to display their content.

"Don't enable macros. Ever. I don't care what the document says. I don't care if it says 'URGENT: ENABLE MACROS TO VIEW YOUR BONUS.' Especially then, actually."

4

Patch Your Software

Install updates promptly. That "Update and Restart" button you've been ignoring for two weeks is closing security vulnerabilities that attackers are actively exploiting.

"Patch your software. Yes, the updates are annoying. You know what's more annoying? Ransomware. You know what's more annoying than ransomware? Explaining to the CEO that ransomware got in through a vulnerability that was patched three months ago."

5

Back Up Your Data (Offline, Tested)

Maintain offline backups that are disconnected from the network. And test them. Regularly. A backup you haven't tested is a box of mystery — it might contain your data, it might contain nothing.

"Back up your data. Offline. Tested. If you haven't tested your backups, you don't have backups. You have hopes and dreams in a storage format."

6

Trust Your Gut on Attachments

If an email or attachment feels wrong — unexpected sender, weird subject line, urgent language, strange file type — trust that feeling. Report it to IT. Better a false alarm than a real incident.

"If an attachment feels weird, it IS weird. Trust your gut. Call IT. We would rather get 50 false alarm calls than miss the one real one. Seriously. Call us. We like talking to people. Well, most of us."

Page 8 of 10
What Would You Do?
Dude leans back in his chair and cracks his knuckles. Time for some scenarios. Choose wisely. He's watching. Gently.
Scenario 1: The Red Screen

You arrive at your desk and your screen shows a ransom note. Red background. "YOUR FILES HAVE BEEN ENCRYPTED." A countdown timer is ticking. What do you do?

Scenario 2: The Suspicious Coworker Screen

You notice your coworker's computer is acting strange — files are renaming themselves with weird extensions, and programs are crashing. They haven't noticed yet because they're in the break room. What do you do?

Scenario 3: The "Enable Content" Doc

You receive an email with a Word document attached. When you open it, a yellow bar at the top says "PROTECTED VIEW — Enable Content to edit this document." The email says it's an urgent invoice from a vendor. What do you do?

Scenario 4: The Counter-Intuitive Instruction

During an active ransomware incident, IT tells you to keep your encrypted computer powered on and not to restart it. Your instinct says to turn it off to stop the damage. What do you do?

Page 9 of 10
The Final Quiz
Eight questions. No pressure. Okay, some pressure. Dude is watching. He believes in you. He also has very high standards.
Question 1 of 8

What is the most common entry point for ransomware attacks?

Nearly half of all ransomware incidents begin with compromised remote access credentials. Attackers buy stolen passwords on the dark web or brute-force weak ones. MFA is your best defense here.
Question 2 of 8

What should you do FIRST when you see a ransom note on your screen?

Disconnect immediately to prevent the ransomware from spreading to other systems. Unplug the ethernet cable and disable Wi-Fi, but do NOT power off the computer.
Question 3 of 8

Why should you NOT restart a computer during a ransomware incident?

RAM (volatile memory) may contain encryption keys, attacker artifacts, and other forensic evidence that is lost when the computer is powered off or restarted. Forensic teams need this data.
Question 4 of 8

What is "double extortion" in a ransomware attack?

Double extortion means attackers exfiltrate sensitive data before encrypting it. Even if you can restore from backups, they threaten to publish stolen data unless you pay. It's leverage on top of leverage.
Question 5 of 8

Why are macros in Office documents dangerous?

Macros are essentially small programs embedded in documents. Malicious macros can download ransomware, install backdoors, and give attackers control of your system. "Enable Content" is ransomware's favorite phrase.
Question 6 of 8

How does multi-factor authentication (MFA) help prevent ransomware?

MFA adds a second verification step (like a phone notification or hardware key). Since 48% of ransomware enters through stolen credentials, MFA blocks attackers even when they have the password.
Question 7 of 8

How do you verify that your backups actually work?

The only way to know backups work is to test them by actually restoring data. Backup files can be corrupted, incomplete, or improperly configured. If you haven't tested your backups, you don't have backups.
Question 8 of 8

During a ransomware incident, who should you contact first and how?

Use a phone call — never email or internal messaging during a ransomware incident. The attacker may have access to email and chat systems. Phone calls are out-of-band communication the attacker can't intercept.
Quiz Results

DUDE DILIGENCE
Page 10 of 10
Certificate of Completion
DUDE DILIGENCE
Issue #3: The 60-Minute Countdown
THIS CERTIFIES THAT
has successfully completed the Ransomware Readiness training module, demonstrating knowledge of how ransomware attacks occur, proper incident response procedures during the critical first 60 minutes, and preventive security practices.
Certified by Duke "Dude Diligence" Dillingham
Chief Compliance Officer & Cybersecurity Hero
• A Circle 6 Systems Production • circle6systems.com
DUDE DILIGENCE You made it through Issue #3. I'm genuinely proud of you. The world is full of people who skip security training, and here you are — reading a comic book about ransomware on a Monday. You're one of the good ones. Now go enable MFA on everything. And I mean everything. I'll know if you don't. I always know.

Dude puts his hoodie back on. Badge stops glowing. He picks up his coffee. Walks out of the frame.

THE END.

Dude Diligence will return in Issue #4.