Definitive Ransomware guide for business in 2019

The best time to learn about ransomware is before it strikes. This resource will leave you better prepared to protect your business from ransomware and to recover from an attack. We’ll include specific steps that are often overlooked, show some fascinating real life examples and leave you with a clear understanding of ransomware and how to avoid or manage an attack.
  • Read on and avoid the panic and crisis that often characterize ransomware attacks​
Share on email
Share on print
Share on facebook
Share on google
Share on twitter
Share on linkedin

1.0. Know your enemy – understanding ransomware and how it works

Although ‘what is ransomware’ can be answered in a sentence, it’s worth equipping you with a deeper understanding using a quick FAQ. We’ll expand on these answers in the following sections, but first let’s give you a solid grounding in the basics.

1.1. What is ransomware?

Ransomware is malicious software that “locks you out” of your own data, by encrypting it with a secret key, and then demanding payment for that key so you can decrypt and access your data again.

Many strains of ransomware force victims to take action by incorporating an expiration date into the ransom demand: if the ransom is not paid by a certain date, the decryption key will be destroyed and all ransomed data will be inaccessible forever.

1.2. Is ransomware the same as malware?

There are many types of malware, and ransomware is one such type. But rather than stealing or deleting information, or spying on you, it’s designed to extract a payment from you to get back access to your data.

1.3. Where does ransomware come from?

Ransomware originates from cyber-criminals, which can range from “lone-wolf” individuals all the way to well organized consortiums. Such criminals preserve their anonymity and conceal their activities by using tools such as TOR and cryptocurrencies, to the point where it is almost impossible for an regular computer user to know where the criminal is located.

1.4. How can ransomware get onto my network or computer?

Broadly speaking, three of the most common ways this can happen are:

1. Self-propagated infection – much like a virus, some strains of ransomware can automatically probe adjacent computers on a network, and “jump” from one host to another, spreading automatically by exploiting certain charactistics and services of a computer’s operating system or application software.

2. Manual infection – involving hackers who can break into systems (via a variety of methods, such as weak passwords, vulnerabilities in protocols such as RDP, or zero-day exploits) and then manually install ransomware in order to monetize their break-in.

3. “Hapless user” infection – where users unknowingly infect themselves by clicking on links in spam or phishing emails, plugging in USB devices, or visiting websites that have been sabotaged.

We describe this in more detail later in the article.

1.5. How does ransomware affect your computer systems?

Two common things that ransomware can do to your system is:

1. To prevent it from booting. The Petya (2016) strain attacked the Master Boot Record (MBR) of machines to hijack the computer and demand ransom from the user.

2. To allow booting, but otherwise deny access to data. Here, ransomware will looks for data that it thinks has value, like documents and databases, and encrypts that data so that you can no longer use or view it.

1.6. What happens when you are infected?

Most ransomware displays an onscreen warning to inform you that your data’s been encrypted. It will also explain how to pay the ransom and that you’ll get a digital key to decrypt your data when the ransom’s paid. Some ransomware will prevent your computer from even starting unless you pay the ransom.

1.7. How common is ransomware?

Ransomware is far more common than most people think and reported infection are increasing year on year. According to the McAfee Labs Threat Report (August 2019), the number of Ransomware reports worldwide during first quarter of 2019 was 1.3 million. This was more than double the 600,000 infections reported in the previous quarter at the end of 2018.

2.0. Staying a step ahead - how ransomware gets into your network

This section will leave you with an understanding of what vulnerabilities your business may have, and how an infection can exploit them.

2.1. Anatomy of a network breach

Ransomware can get into your network via exploited network vulnerabilities, removable media, remote access tools like RDP, malicious websites and email attachments. Once the ransomware installs on one computer, it can spread around the network installing itself on every device it finds.

This graphic shows the 3 common ways ransomware uses to spread: internet connections, email attachments and infected removable drives. Once it’s on a machine in your network, ransomware can detect all the workstations, servers, laptops and other local networks and spread to them as well.

Let’s take a closer by examining 5 ways ransomware can spread into your network and onto your computers


The internet threat

Every time a service (e.g. a web server, remote login server, email server or e-commerce site) is exposed to the Internet, there’s a potential security risk that the service can be hacked and exploited. Hackers often use automated tools to search the internet for computers and networks with vulnerabilities such as poor configurations, outdated network or computer patches and weak passwords, and then use those vulnerabilities to copy ransomware code onto a device in your network.
Example: Summer of discontent  To help users work remotely, a company enables remote protocols so users can log into their work computers from their home PCs A hacker figures out company usernames using an employee email address list, and runs a program to brute force the passwords. 2 days later the password summeR76 works for one of the employee’s PCs, and the hacker installs ransomware, which spreads. Job done!


The attached device threat

Ransomware can hide on USB drives, thumb drives and connected devices, and will spread to other machines when that drive or device is attached.
Example: Terror in the top draw

Jane uses a USB thumb drive to back up her work laptop. She loses the USB, and gets another one from a drawer at home. At some time in the past the USB was infected with ransomware. She plugs the USB into the laptop, then securely connects to her company network using a trusted laptop, and the USB deploys its ransomware to the company file server. It then spreads, infecting the whole company.


Malicious websites​

A computer with an unpatched vulnerability can be infected with ransomware when visiting a malicious website. Although Google and web browsers do filter malicious websites, the danger persists due to the risk of redirection techniques such as cross-site scripting. These attacks use a compromised legitimate website to send you to a malicious website.
Example: The doppelgangers portal  An new employee’s told to use a web portal to log their timesheet. They don’t have the site saved so they Google it and select the site name. But the site they selected is instead of They’re on a malicious site that looks legitimate. The click a link and quickly select okay to a message but nothing happens, so they leave the site and move on to something else. Like most staff, the employee goes home early that day, as there’s something wrong with all the company computers.



Online advertising uses dynamic features to encourage you to view and click on ads. Unfortunately, these features can be exploited by hackers who insert ransomware into legitimate advertisements. The adds can infect your machine by redirecting you to a malicious website or by deploying the ransomware when you interact with the ad. In some cases, it is enough just to view the advertisement for it to infect your computer.
Example: Buyer’s remorse

Kim recently made a purchase online with a reputable company. After making the purchase, the company’s online advertisements start showing up in her social media. One add prompts her to consider another purchase but she changes her mind. Unfortunately, that’s not the end of it. Hackers have injected malware into the company’s advertisements and Kim and thousands of others notice the computers they used to view the  advertisement at work and at home, now have a new flashing message – this time its ransomware.


The email threat​

Ransomware can be spread using emails with attachments. Although PDFs and office documents are a lot more secure than they used to be, file compression formats like WinRAR can be used to deliver ransomware, especially if the mail server does not provide adequate mail filtering. The email may sound like a legitimate communication, but once the attachment is opened, it will quietly begin encrypting your data and spreading from one machine to the next.

Although this is one of the oldest forms of ransomware propagation, the McAfee Advanced Threat Research team’s August 2019 report shows that user execution attachments are still used, and threat actors often the survey large organizations before sending the emails due to the lucrative returns.
Example: A horrible resume

Dave in HR receives an email titled ‘Job application’ with a PDF attached. The email makes sense and Dave opens it to find a poorly written resume for a generic job. He closes the PDF, not knowing that it ran a macro and installed ransomware. Ten minutes later the ransomware has encrypted Dave’s PC and spread to all company PCs and servers. The company is now unable to function or access critical data.

2.2. Honorable mention - 0-day exploits

New ransomware is a special kind of nasty that can apply to any of the previous examples. It can exploit even the most secure systems because the vulnerability the ransomware uses may not yet be known (day 0), so patched and updated machines can still be compromised.

3.0. The big reveal – what Ransomware does once it’s on your computer

This section explains what ransomware does once it’s installed. It can help with what to look for if you suspect you’ve been infected, and what needs to be undone when you are infected. These tasks can occur in different orders, depending on the ransomware.

3.1. Backdoors

No, not an official term, but an apt one. Ransomware can be clever. Once installing, it can open backdoors in your systems and exploited them later. It can also do something called privilege elevation, whereby system or user accounts the ransomware may use are given more access. These changes can be used to help the infection spread to secure areas, and open more back doors into your network.

3.2. Propagation

Once on a computer, ransomware can locate and spread to any location you can access from your desktop. In fact, with the creation on backdoors, it can probably spread to more locations that you think. And this will happen quickly and often unnoticed, while it’s encrypting your machine.

GRAPHIC or spreading from 2 PCs to 6 to 30 etc

3.3. Encryption

Ransomware will stay hidden and operate in the background locating data it thinks is valuable. For example, everything in My documents, in a folder called photos, all Microsoft Office documents, and files that look like databases. Once encrypted, the files will often appear as files with no application association and if you open them they shows gibberish.

3.4. Notification

Once your important files have been encrypted, the ransomware will display a notification. This notification could be an open text file or, more commonly with new ransomware, a flashy hard to miss browser graphic.

2 examples of ransomware notifications

3.5. A ransomware notification will usually:

Advise that your data has been encrypted

Tell you how much to pay

Explain how to pay

Tell you what will happen when you pay

A ransomware notification may also pressure you to make a quick decision by having a ransom that increases if you delay paying or including a time limit after which you will never get your data back

4.0. The business model - how ransomware makes money and how bitcoin is involved

Ransom demands ask to be paid using cryptocurrency, usually bitcoins, because they use digital wallets that are anonymous – and therefore appealing to cyber criminals.

4.1. $ How much is a ransom

Ransoms range from a few hundred dollars to over a million, and average in the thousands. Ransoms have been increasing each year and almost doubled in 2019 to an estimated $12,000.

In 2016, the estimated total cost in the US reached the billion-dollar threshold and by 2018 the global cost of ransomware reached an estimated 8 billion a year.

4.2. $ Additional costs of an attack

Ransomware response firm Coveware’s 2019 ransomware report estimates that the average downtime due to a ransomware infection is 7.3 days. That’s over a week’s lost income and does not take into account the cost of managing the recovery process.

2019 has seen many attacks on public institutions and has a high success rate with counties and schools

2019 snapshot of summertime for IT staff in the US counties

as ransomware payment

4.3. $ Does paying a ransom fix the problem?

Not necessarily. Most ransomware payments result on the delivery of a decryption key, but about 5% of paid ransoms are not sent a decryption key. And even if your data is decrypted, your network may still be compromised by backdoors and malware. This can lead to repeat victims – users who show they are willing to pay and are targeted again by ransomware.

The lesson here is that if you pay, it may not be the end of it. You could be target again and, as explained in the backdoor section, all impacted servers and machines will still need to be rebuilt.

4.4. $ How do you pay a ransom

To pay a ransom with bitcoin, you must get an account and a bitcoin wallet with one of the online bitcoin exchanges. This process includes providing identification information to verify your identity. You then have to buy bitcoins, send them to your wallet and then use the wallet to transfer the ransom to the address of the wallet detailed in the ransomware notification.

This process itself can be a problem because it takes time (often over a week) for an account and wallet to be verified by the exchange, and ransoms often have a limited window of time to make the payment.
Before we continue, let’s pause to look at what a recovery is – because it going to come up a lot.

A recovery is what companies that pay ransoms

A recovery is something every company is


10 key steps to protect your company and data from ransomware

Unfortunately, there is no silver bullet for ransomware. It’s impossible to guarantee that you’ll be protected against every attack in the future, because:

1. Machines are never infalliable (so zero-day exploits and vulnerabilities will always exist)

2. Users will always make mistakes.

However, if you follow these 10 key steps to cyber-resilience, you’ll safeguard your organization and its future by taking positive and effective steps towards both prevention and remediation.

1. Prevention steps are designed to stop ransomware from infecting your machines.

2. Remediation steps enable you to recover from an attack.

Given that prevention is never 100% effective, we always recommend combining it with remediation as part of a holistic cyber-resilience strategy.

The first seven steps are all about preventing a ransomware outbreak in the first place. The more of these steps you take, the less likely you are to be infected.


Use anti-virus software and email filtering

Have antivirus software installed on all machines. The software should be updated regularly and scan files that are opened and sent.

ACTION : check that the antivirus on all servers and desktops is updating correctly.

Set up email filtering on your mail server. Email filters check for spam, emails from suspicious sources, known malware and ransomware, and can also check emails with attachments.

ACTION : check that your email filtering is configured to protect your from ransomware. For example criteria that checks emails addressed to people in your domain that don’t exist.

ACTION : Put a process in place to review and implement security updates. Any high to extreme risk vulnerabilities should be patched in 48 hours.


Patch and update your computers

All server and desktop operating systems should be kept up to date with patches. These patches often include security enhancements based on new threats and exploits.


Patch and update your software

Most applications include processes that access the internet making them open to exploitation by ransomware.

ACTION : Audit all applications to ensure they are securely configured and patched. Check for applications that are no longer supported, as they may need to be upgraded. Applications like Flash, web browsers, Microsoft Office, Java and PDF viewers in particular should be patched.

ACTION : Configure your web browsers to block Flash and Java if those features are not needed, and review any Microsoft Office macros that access the internet.

ACTION : Consider implementing multi-factor authentication for remote access activities such as RDP and VPN connection. You can also implement this for access to important areas in your network. Check out this resource on how to secure RDP and this recent example from 2019.


Secure any remote access points

Remote tools like RDP (Remote desktop protocol) allow remote access to computers for remote work and system support. RDP is a frequent target of ransomware and must be configured securely.


Do not use simple or default credentials

ACTION : Check your user password requirements and ensure all RDP passwords are strong.

ACTION : Check that administration privileges have only been given to users and process that need them, and that they are only used for tasks that need those privileges.

ACTION : Check how often data is moved or shared in your business or organization using removal drives, and if a safer option could be used – such as Dropbox or Google Drive.


Be careful with attached devices

Manage the use of removable storage devices such as thumb drives and USB drives on company computers. Restrict access to removable drives and devices that are used for backups and keep them safe.


Promote user awareness

Even though you will have anti-virus and email filtering software installed, no software is infallible. That means user awareness is also important to protect against ransomware that arrives through messages and emails that contain links or attachments. They are worded to encourage users to trust them and open the link or attachment. It is important for users to understand this threat and to exercise caution with all such emails.

ACTION : Develop an suspicious email checklist and distribute it to all staff

This email checklist could include the following:

  • Does an email’s wording sound vague?
  • Does an email’s address look correct for who the email purports to be from?
  • Does an email’s address have modified spelling to make it look like a trusted source?
  • Are there any spelling errors in the main part of the email?
  • Is there a sense of urgency?
  • Do you recognize the attachment’s file extension?

If the answer to any of these ‘ is yes, then there is every reason to be concerned and your IT support should be informed. If you have the option, call the sender to verify the email.

The final three steps are all about being able to remediate your systems and continue operations without needing to pay the ransom.


Back up all your important data
Ensure that you have full, regular backups of all the servers, desktops and devices that you can’t afford to lose. 
”   THIS POINT IS NOT OPTIONAL. Recovering from backups is the only safe way to recover from ransomware.   “
This means you should have identified what systems and data are critical to your business and must be restored or recovered in the event of an attack. You should also ensure that you have the right backup system for your organization. We’ll discuss this in more detail later in the article.
ACTION : To check that your backup strategy is adequate, perform test recoveries for your systems. This will confirm if your backup and recovery plan functions as intended.
The mistake many people make is setting up their backup system once, and letting it run for months or years without ever testing a recovery. The problem is that things can change over time:
  • Administrators can add extra hard drives or Network Attached Storage but forget to change their backup configuration to add the new storage devices to the backup
  • Backup media – such has hard drives – can become worn out over time and stop working
  • Hackers can disable or sabotage the backups ahead of a ransomware attack, to make it impossible to recover.
Monitoring and testing your backup system enables you to detect these and other problems ahead of time.


Monitor and test your backups regularly by doing recoveries
It’s vitally important to perform test recoveries from backup, to make sure that the backup is complete, effective and functioning properly.


Have a Ransomware Response Plan
The difference between a panicked and efficient response, can be the existence of a documented response plan. It does not need to be long or detailed, just the steps to go through when an infection is detected. What are the first 4 things you should do? Who should be contacted? How or when do you recover? How do you work out what has happened? All these questions have answers but they need to be thought through and agreed on.
ACTION : Create a document for a Ransomware Response Plan. A ransomware response plan explains what to do and will be different for every business or organization.
  1. Look at the section below for guidance.
  2. Look at online resources for guidance
  3. Get input from stakeholders and IT staff.
  4. Test your Ransomware Response Plan by performing the documented tasks
  5. Get approval across the business
  6. Distribute the Ransomware Response Plan and train staff in how to use it.
ACTION : Create a business continuity plan The business continuity plan explains how you can continue to operate at a limited capacity while computer systems are unavailable.
You cannot be Uncle Scrooge and cyber-resilient at the same time.
If there’s one lesson to learn from history, it’s this: INVEST IN DATA PROTECTION
There’s a common thread among organizations that are taken down by ransomware, and a reason why so many public authorities are shut down by ransomware – underinvestment. As part of your IT budget, invest in staff training, system recovery exercises, and updating and maintaining hardware and software.

ACTION : Review this list and note any items worth following up for your business

1. Have a specialist security consultant review your vulnerability to ransomware

2. Audit you systems to see if any of them should be upgraded to more secure versions

3. Look at network and computer security training opportunities for your staff

4. Budget for an annual system recovery exercise

5. Initiate a review to ensure all systems have adequate backups with secure destinations

6.0. Zeroing in on backups – are your backups and backup plan ready for ransomware?​

In the previous section, point 8 highlighted the importance of a backup strategy that meets the needs of your business. So let’s see if your backup plan is up to scratch – by taking a quiz

6.1. How many of the 5 keys to a successful best practice backup strategy do you use

Ready your mouse – no cheating!

I use the right backup type

The right backup type for you will be one that successfully recovers a computer from a backup to a new or reformatted disk. It is possible to recover from a file-based backup - that is, you back up only your files, but not your system. However if you do, you’ll have to rebuild your machine, install the Operating System and all applications, and make any required configuration changes. This might be easy if your organization uses a Standard Operating Environment (SOE), but for SMEs who do not use SOEs, this is going to be troublesome and result in more downtime. If that is the case, we recommend creating full image backups of your systems. An image is a snapshot of the operating system and all data on the disk, and it can be used for a bare-metal recovery.


Your backups probably will help with ransomware


Your backups probably won’t help with ransomware

I use a secure backup destination

If your backups use destinations you can browse to then ransomware can infect them. The best option it to always use secure backup destinations. These are often called an offline or air gapped destinations. Examples are media that are disconnected after each backup and authenticated cloud destinations that ransomware cannot spread to.

Warning: If you do use a destination that you can browse to, you must have additional backups that ransomware can’t reach. E.g a weekly backup to a cloud destination, but this means your recovery point is a week old. The best option is to always use secure backup destinations.


Your backups probably will help with ransomware


Your backups probably won’t help with ransomware

I know my Recovery Point Objective

When a computer is recovered from backup, it will be recovered to how it was at the time the backup job started. If your mail server is recovered using a 3-day old backup, you will lose 3 days’ worth of emails. Your recovery point objective (RPO) is how long a gap your business can afford to go back in time - and therefore how frequent your image backups to secure destinations should be made.


Your backups probably will help with ransomware


Your backups probably won’t help with ransomware

I test my backups

Unless you have tested your backups, you don’t know if they work. The only way to test your backups it to perform a full bare-metal server recovery, and to test that the recovered server works as intended.


Your backups probably will help with ransomware


Your backups probably won’t help with ransomware

I train my staff

Performing a recovery of a full system it a lot harder that restoring files. Your IT staff need to be familiar with the process. A ransomware attack is not the time to learn as you go.


Your backups probably will help with ransomware


Your backups probably won’t help with ransomware

If you selected NO for the first 2, your backups probably won’t help with ransomware

If you selected NO for any - your backup plan may not give the result you had hoped for

If you select YES to all – congratulations, your backups can save you from ransomware

A quick note about the importance of testing backups

Performing a test recovery will reveal possible issues including:

  • If some of the backup are corrupted due to hardware or data transfer issues
  • If the replacement drive fails to meet the requirements for a recovery
  • That the process of replacing the current physical drive has no unexpected problems
  • That the computer’s firmware supports the recovery process
  • That you are familiar with any networking and connectivity requirements

7.0. Hitting pause – a quick review of what we’ve covered before looking at how to respond to a ransomware attack

You can’t pause things during an actual ransomware infection, so we’ll take one now and recap a couple of things we’ve covered before looking at how to respond to a ransomware attack.
In the previous sections – we explained what ransomware is, how it works and how you can avoid it – and noted that every business or organization should have:

A Business Continuity Plan

this is outside the scope of this document and there are plenty of resources online. The best to begin is to go through each business function and look at ways it could be performed without computers. It could be using pen and paper, phone apps, relocating to a partner site or just deciding

A Ransomware Response Plan

this lays out the process to follow when a ransomware infection is detected. The goal is to minimize the impact and work quickly towards a solution. In the next section, we will go through 4 steps to consider when formulating this plan.

A Disaster Recovery Plan

this explains the technical steps to follow when performing bare-metal recoveries of your systems from backups. This is a technical document, but in the section below we’ll go through 5 steps to consider when formulating your plan.
These plans could be in the same or different documents and will be tailored to your own needs, based on the type and size of your business or organization.

8.0. Ransomware response resources – key products and tools to help you before and during a ransomware attack

There are companies that specialize in understanding and countering ransomware with detection, protection and decryption solutions. It is worth understanding the data protection products available, and the options you have during a ransomware attack. This section provides an overview of some key ransomware protection companies and resources.

8.1. Before an attack – ransomware detection and protection solutions

Most antivirus solutions will also try to detect ransomware. Here is a selection of 3 popular products and the types of features they provide. This is a good starting point when looking for data protection solutions and the types of features available.
  • Detects and stops attempts to remotely execute code in your system.
  • Monitors files and network and process activity for signs of malicious behavior.
  • Looks for anomalies suspicious executables on your computer.
  • Record changes to your data and rolls back those changes to undo encryption.
  • Provides intrusion detection for virtualized environments.
  • Uses machine learning to detect zero day threats.
  • Has real-time communication between the threat detection features.
  • Can include an integrated firewall to block persistent threats.
  • Record changes to your data and rolls back those changes to undo encryption.
  • Uses a file server agent to monitor activity and looks for signs of ransomware.
  • Blocks malicious websites and filter emails with malicious attachments.
  • Removes unsafe browser extensions.

8.2. During an attack – ransomware identification and decryption solutions

If your systems have been encrypted by ransomware, you may be able to identify the strain from the on-screen message. If you cannot, take a photo of the screen and perform an image search or use an online tool like Crypto Sherriff to identify the virus by uploading one of your encrypted files for analysis.

Once you identify the ransomware, check if there’s a decryption solution available. Two useful resources, WatchPoint and, can help determine if there is a decryptor available for your strain of ransomware. There are also decryptors available from Avast, AVG, Kaspersky and Trend Micro.

8.3. Online resources

The companies that lead the fight against ransomware also provide their own guides and reports. In particular, Malwarebytes and Norton provide guides to understanding ransomware. McAfee releases quarterly threat reports on the current state of virus, malware and ransomware. The Australian Government also has a great ransomware resource called the Essential eight.

9.0. Ransomware Response Plan – What to do during a ransomware attack

Phone calls are being made, staff stand around looking at each other and screens show a red-bannered message. Your business has ceased operations, and the only certainty is that there will be a financial impact. The question is how big. So now is the time to keep calm, and work through your Ransomware Response Plan.

As someone responsible for fixing the ransomware attack in an operational or IT capacity, the saving grace is that you have a plan, you’ve tested it, and you have backups ready to go. But what should be in your response plan?

In the previous section, we looked at the tools and technical resources that can be used during a ransomware response. In this section, we look at processes and decision points to consider when making a response plan.

9.1. For Small and Medium Business

Below are 4 key steps in a ransomware response plan. Each one should be reviewed and tested before being applied to your business or organization.


Communicate and coordinate
Communication is critical. Get all the people who can make the decisions and will be performing the tasks in the same area (war room), stay calm and work towards a successful outcome. Easy to say but having a response plan means what to do is clearly laid out. Pass out hard copies. All parties involved on the response are now coordinated and following the response steps as documented.
  • Qatarize the wound
    As soon as ransomware’s detected, all machines should be disconnected from the network to prevent the infection from spreading by pulling out the network cables and turning off the machines. This includes connections to other networks, sites and remote devices.
  • Quarantine the backups
    A recovery needs uninfected backups, so your backup plan should include backups that aren’t online and therefore safe. Backup destinations like NAS devices and removable drives should also be isolated. Recall offsite backup media so they’re ready to use.


Isolate all machines and backups


Understand your options
Now that the immediate actions have been taken to mitigate the impact, you can assess what’s happened, determine the extent of the infection and work out the best way to move forward.
  • Confirm the infection
    Some malware claiming to be ransomware is just an onscreen message claiming to be ransomware and asking for a bitcoin payment. Turn on an infected machine and confirm it’s a real ransomware and that data has been encrypted.
  • Understand the ransomware
    Review everything known about your strain of ransomware. Learn from those who have faced it, specifically: are there known solutions and does this ransomware present any risks to backups and recoveries. If there is a ransom notice on screen, take a photo
  • Know the damage
    What has been infected and what may have been infected. Run a quick audit to identify the extent of the infection. See if any machines have not have been infected.
Useful questions:
  • What machines are known to be infected
  • What machines showed no sign of an infection but may be infected.
  • If you have multiple sites or LANs, was ransomware found in the other locations.
  • Were any machines in the company turned off - these may be clean.
Once you know what was infected and have your backups and staff ready, you can recover your machines using their backups. This process should also be documented as part of your Ransomware Response Plan or as a standalone Disaster Recovery Plan.


Begin recovering your servers and desktops

9.2. Larger Businesses

With a larger business, there may also be shareholder, legal and market considerations. This means additional steps are often followed.

Possible steps to add for larger organizations:
  • Set up an incident room and rooms in regional hubs to manage the response
  • Inform stake holders
  • Contact specialized consultants
  • Contact specialized consultants
Things to consider during the response
  • You don’t know how long the ransomware infection has been on your network. Machines you think are safe may have ransomware installed.
  • Machines can be turned on to confirm an infection if they are isolated, but this can allow a partly complete infection to continue encrypting local data.
  • You can start machines from external drives using virus detection tools to check for ransomware without the ransomware running, because the computer itself is not started.
  • Uninfected machines or LANs provide an opportunity to resume business functions BUT you would need to be very certain they are clean before connecting and using them.
  • The only way to be sure you have removed ransomware from your network is the perform a full recovery of all machines. In fact, you should also replace the hard drives first.
This section explains 5 key disaster recovery steps in a ransomware scenario.


Decide what machines are to be recovered
Work out the server and workstations that are the highest priority. This may be a domain controller and a workstation that you can use to run some functionality tests on.


being able to recover a domain controller is critical as Maersk, the world’s largest shipping conglomerate, found out when it was hit by a cyberattack and all 150 of its domain controllers were wiped. They relied on the servers acting as fallbacks for each other, and the company was only saved when one remaining domain controller was found in the Ghana office, because there had been a power outage at the time of the cyberattack.

Due to the poor network connection, an employee at the Ghana office was flown to Nigeria with the domain controller’s drive, and then another employee flew with it to London – delivering the drive that the whole company needed to start the recovery process and allow 20% of global shipping to resume. Read the full amazing story.

Ransomware can perform actions that change access permissions, leave back doors and maybe even create spaces in which it can hide. For peace of mind, and if feasible, replace the hard drives with hard drives of equal or greater capacity, and then check that the machines can detect them.


Replace all internal hard drives [optional]


Recover the selected machines
Use your bootable recovery media and image backups to recover the server and selected desktops. Once they have been recovered and started, check that they can communicate and that user credentials can authenticate.
The ransomware attack on the city of New Bedford, Massachusetts, is a good reminder that even if you are prepared and take the right steps, recovering from a ransomware attack takes time, money and planning. In this case, the city of New Bedford had followed many best practices with a compartmentalized network and activity monitoring. In July 2019, this monitoring detected signs of malware that led to the IT department shutting down of the city’s network, hampering a ransomware infection that was already spreading. This quick response meant only 158 computers were infected out of 3,500. However, to ensure the ransomware was removed, the IT department rebuilt the entire server network, replaced affected computers and recovered all applications from backups.
Once the first machines are recovered and functioning, check that no ransomware is present using the information you know about the ransomware that infected your network. If the ransomware exists, it would begin to encrypt data again.


Test for infection


Repeat the steps above
Continue to recover more servers and workstations. As a precaution, you can isolate a domain controller and a workstation as a fallback point in the case of a reinfection.

On behalf of the BackupAssist Cyber Security team

Thanks for reading our ransomware guide.

We would be happy to help you explore our solutions and answer any questions this article has raised during a free 15 minute consultation. No strings attached! At the end of the call we will provide you with download links and 30-day evaluation keys so that you can experience firsthand the peace of mind that BackupAssist provides.

Don’t wait, contact us now through to request your one-on-one session with one of our Client Success team members.
Share on email
Share on print
Share on facebook
Share on google
Share on twitter
Share on linkedin

Leave a Comment