Threat detection and analysis
These are the two most important stages of the incident response process. Why? If your detection and analysis fails, you will most likely find your or your client's infrastructure encrypted by some ransomware affiliates. Of course, it's not the case if your client detected the attack when he or she saw a ransom note on a computer screen. And yes, this is a very common example.
So, generally, you may face one of two scenarios: everything is already encrypted and you need to reconstruct the attack, or there is only a ransomware precursor, so it must be contained and remediated as fast as possible.
Usually, if you are dealing with impact, it's not really difficult to understand what ransomware strain you are dealing with – just look inside the ransom note.
Nowadays, many of them contain links to portals where victims can communicate with the threat actors: