Incident response

When ransomware
gets inside

Detected ransomware on your network? The first 24 hours decide whether you stay offline for a week or a month — and how much data you actually lose. Here's the structured playbook we use with our clients (and the basis for the IR plans we write for them).

01

Detection & verification

First minutes

1.1

Confirm it really is ransomware

Files encrypted with a `.crypted` extension, ransom note on the desktop, files unreachable across network drives — these are classic signals. But sometimes it looks like ransomware and it's something else (e.g. a failed backup job). Before declaring an incident, quickly verify with the system owner that this isn't expected behaviour.

1.2

Identify the ransomware family

The note or file extension often pinpoints the variant (Lockbit, Akira, BlackCat, Phobos…). For some, free decryptors exist at nomoreransom.org. It costs 5 minutes and may save you a backup restore.

1.3

Activate the Incident Response Plan

If you have one. Convene the crisis team (IT lead, executives, lawyer, comms, external IR partner). If you don't have an IRP, hire an external IR team now — improvised incident response ends badly more often than you'd expect.

02

Containment & scope

First hours

2.1

Disconnect affected devices from the network

Pull the ethernet cable, turn off Wi-Fi, isolate VLANs at the switch. Don't fully power them off — RAM holds forensic traces, decryption keys, indicators of successful data theft. If you can, leave the machines running in their current state.

2.2

Reset all privileged passwords

Domain admin, service accounts, local admin passwords, VPN access, cloud consoles. The attacker has likely escalated already — leaving access in place means they're back soon. Do this from a clean (non-domain-joined) machine, ideally over pre-prepared out-of-band channels.

2.3

Preserve evidence

Logs from firewall, AD, EDR, email gateway, VPN — export everything before you delete or reinstall anything. Take a forensic snapshot of critical systems (memory dump + disk image). Photograph and store the ransom note. Without evidence you can't do forensics or claim insurance.

2.4

Disconnect backups from the domain

If the backup server is in the domain, the attacker may have already compromised it. Physically/logically separate it from the network before they delete or encrypt the backups. 60% of organisations lose their online-reachable backups during a ransomware attack.

03

Communication & notification

First 24 hours

3.1

Notify NÚKIB (if you're obligated)

Entities under ZoKB / NIS2 must report cyber security incidents — typically within 24 hours of detection (early warning), full report within 72 hours. Submission via nukib.gov.cz. If you're not sure whether the obligation applies, ask a lawyer — fines for non-reporting run into millions.

3.2

Data protection authority notification (if personal data leaks)

If the attacker exfiltrated personal data (and with today's double-extortion campaigns you should assume so), you're obliged to notify the data protection authority within 72 hours under GDPR. Often you also have to inform the data subjects themselves.

3.3

Criminal report to police

Ransomware is a criminal offence (extortion, unauthorised access to a computer system). File a criminal report even if you don't expect investigation — without it you can't claim most insurance payouts and it complicates writing off the loss for accounting.

3.4

Contact the insurer

If you have cyber insurance, call them now. Most policies cover IR team costs, legal counsel, recovery, and sometimes business interruption. Insurer dealbreakers: late notification, destroyed evidence, no due diligence done.

3.5

Internal & external communication

Employees: clearly tell them what to do (disconnect devices, don't reset passwords from infected machines, where to report issues). Clients / vendors / regulators: coordinate via the lawyer — what you say in the first days defines the narrative for the entire incident. PR damage from poorly handled communication can cost more than the attack itself.

⚠ Should we pay the ransom?

Both NÚKIB and ENISA clearly recommend not paying. Reasons: (1) There's no guarantee you'll get a working decryptor — success estimates hover around 60%. (2) Paying funds the next attacks and marks you as a willing target — 80% of paying companies are hit again within 12 months. (3) Paying ransomware groups under sanctions (e.g. Russian groups) is potentially criminal in the EU/US.

There are situations where paying is a real option (destroyed backups + threat to life + no other way to recover). That decision always discuss with a lawyer, IR team, and insurer — never in the first hours of panic.

04

Operations recovery

Days to weeks

4.1

Forensics before you restore anything

Find out how the attacker got in (entry vector), where they went, exactly when. Without that, recovery restores the attacker too — who returns in a few weeks. The IR team helps with this; don't try it yourself unless you have incident forensics experience.

4.2

Build a clean infrastructure (clean room)

Restoring onto the same network is a risk. Build a new segment, a new domain (or thoroughly cleaned), restore there, verify cleanliness with EDR and a malware scan, then connect users. This adds days to recovery — but it's the only way to make sure the attacker doesn't come back.

4.3

Restore by priority

First what the company can't operate without (email, ERP, key business apps). Then the rest. Not everything has to be restored on day one — some systems can wait weeks without impact. A pre-prepared business impact assessment helps.

4.4

Reset all passwords and tokens

Domain passwords, API tokens, OAuth refresh tokens, certificates, SSH keys, cloud credentials. The attacker likely had access to many of these — leaving them valid leaves a backdoor open. Do this in a coordinated way so users understand why they need to sign back in to everything.

05

Lessons learned

Weeks after recovery

5.1

Post-incident review

A structured debrief with the entire crisis team: what worked, what didn't, where we wasted time, what information we lacked. The goal isn't to find someone to blame — it's to get the uncomfortable lessons on paper while they're fresh.

5.2

Address the root cause

Ransomware getting into the network is always the result of a specific defence failure — an unpatched system, a compromised account without MFA, a reported phishing email nobody followed up on. Find that specific hole and close it as priority 1.

5.3

Update the IRP and test it

The plan you actually used now has obvious gaps. Rewrite it. And in 6 months run a tabletop exercise — to refresh the playbook and verify the changes hold up under pressure.