We found that the ransomware was an unknown variant of ‘Phobos’, a common ransomware virus, with no known data recovery tools. This meant there would be no simple way to build a decryption key.
While forensic data was lacking due to insufficient logging and lost evidence from refreshed workstations, our analysis of existing infrastructure configurations showed the likely point of attack was the Windows Remote Desktop Protocol (RDP) which was exposed to the public internet.
Exposed ports are an EXTREMELY common and very easy way to be breached. Typically there is an automated scanner that an attacker sets up to scan the web for exposed ports.
From the available forensic data, it appeared the servers were infected first, and the ransomware exploited other hosts via RDP over the local network.