Key Takeaways

  • Offline, tested backups are your best defense.
  • Phishing and RDP are the top attack vectors.
  • EDR and network segmentation limit spread.
  • Have an incident response plan before you need it.
  • Paying ransom doesn't guarantee data recovery.
  • Modern ransomware also steals data for double extortion.

1. Understanding Ransomware

Ransomware encrypts files and demands payment for decryption keys. Modern ransomware operations are sophisticated criminal enterprises, often operating as Ransomware-as-a-Service (RaaS) with affiliates conducting attacks and sharing profits with developers.

Double extortion is now standard: attackers steal data before encrypting and threaten to publish it. Triple extortion adds DDoS threats or contacting customers. These tactics increase pressure to pay even if backups exist.

1.1 Notable Ransomware Families

FamilyModelKnown For
LockBitRaaSFast encryption, active affiliate program
BlackCat/ALPHVRaaSCross-platform (Windows, Linux, VMware)
Cl0pRaaSMass exploitation of vulnerabilities
AkiraRaaSTargeting SMBs, VMware ESXi

2. Attack Vectors

2.1 Common Entry Points

2.2 Attack Lifecycle

# Typical ransomware attack timeline:
1. Initial Access - Phishing, RDP, exploit
2. Execution - Malware deployment
3. Persistence - Backdoors, scheduled tasks
4. Privilege Escalation - Admin/domain admin access
5. Discovery - Network mapping, identifying targets
6. Lateral Movement - Spreading to other systems
7. Collection - Exfiltrating sensitive data
8. Impact - Encryption, ransom note deployment
Dwell Time is Key

Attackers often spend days or weeks in networks before deploying ransomware. This is your window to detect and stop them. Focus detection on early stages (initial access, lateral movement) not just the final encryption.

3. Prevention Strategies

3.1 Technical Controls

3.2 RDP Security

# RDP hardening:
- Never expose RDP directly to internet
- Use VPN or Zero Trust access
- Enable Network Level Authentication (NLA)
- Limit who can RDP (remove from Administrators group)
- Use strong, unique passwords
- Monitor for brute force attempts

4. Backup Best Practices

4.1 3-2-1 Backup Rule

4.2 Ransomware-Resistant Backups

# Backup security essentials:
✅ Air-gapped or immutable storage
✅ Separate backup credentials (not domain joined)
✅ Regular restore testing
✅ Backup encryption with separate keys
✅ Include system state and configurations
❌ Don't rely solely on Volume Shadow Copies
❌ Don't use network-accessible backups only
Test Your Restores

Backups that haven't been tested aren't backups—they're hopes. Regularly perform full restore tests to verify you can actually recover. Know how long recovery takes. Many organizations discover backup failures during an actual incident.

5. Detection & Response

5.1 Detection Indicators

5.2 Immediate Response

  1. Isolate affected systems from network
  2. Preserve evidence (don't power off if possible)
  3. Identify the ransomware variant
  4. Check for available decryptors (nomoreransom.org)
  5. Assess scope of encryption and data theft
  6. Activate incident response plan

6. Recovery Process

6.1 Recovery Steps

  1. Eradicate attacker access (all backdoors, compromised accounts)
  2. Rebuild from clean sources (don't trust cleaning)
  3. Restore data from verified clean backups
  4. Validate restore integrity
  5. Implement additional security controls
  6. Monitor closely for re-infection

6.2 Post-Incident

7. To Pay or Not to Pay

7.1 Reasons Not to Pay

7.2 When Organizations Consider Paying

Free Decryptors

Check nomoreransom.org and ID Ransomware before considering payment. Law enforcement and security researchers have cracked many ransomware families. Identify your variant and check for free decryptors first.

8. Frequently Asked Questions

Can ransomware encrypt cloud storage?
If synced locally (OneDrive, Dropbox), yes—encrypted local files sync to cloud. Most cloud providers maintain version history allowing recovery. Disable sync immediately during an attack to preserve cloud versions.
How fast does ransomware spread?
Modern ransomware can encrypt an entire network in hours. LockBit 3.0 reportedly encrypts systems in minutes. Speed depends on the variant and network configuration. Segmentation and early detection are critical to limiting scope.

Conclusion

Ransomware defense requires layered prevention, robust backups, and prepared response. Focus on stopping initial access (phishing, exposed RDP), limit spread through segmentation, maintain offline backups, and practice your response plan. The organizations that recover fastest are those that prepared before the attack.

Continue Learning:
Incident Response Backup Strategies