Under Attack Right Now?
Call our 24/7 emergency hotline immediately for guided incident response.
866-903-2097You arrive at work on Monday morning. Screens across the office display the same menacing message: your files have been encrypted, and the attackers demand payment in cryptocurrency. The clock is ticking. What do you do?
Panic is natural, but it is the enemy of effective response. This guide walks you through exactly what to do, step by step, from the moment you discover ransomware until your systems are fully restored. Print this out, share it with your team, and keep it accessible because you may need it when your digital systems are down.
Step 1: Do Not Panic and Do Not Pay
The ransom note is designed to create urgency and panic. Countdown timers, threatening language, and escalating demands are all psychological tactics. Take a breath and focus on containment.
The FBI, CISA, and all major cybersecurity organizations advise against paying the ransom. Here is why:
Step 2: Isolate Affected Systems Immediately
The single most important immediate action is to prevent the ransomware from spreading further. Ransomware actively seeks out network shares, connected drives, and other systems to encrypt.
Isolation Checklist
Critical Warning
Do NOT shut down or reboot infected systems. Forensic investigators need the data stored in volatile memory (RAM) to identify the attack vector, determine the ransomware variant, and potentially recover encryption keys. Shutting down destroys this evidence permanently.
Step 3: Activate Your Incident Response Team
If you have an incident response retainer with a cybersecurity firm, call them immediately. If not, assemble your internal response team and consider engaging external help. Ransomware incidents require specialized expertise.
IT/Security Lead
Coordinate technical containment and investigation
Executive Leadership
Authorize resources and make critical decisions
Legal Counsel
Advise on regulatory obligations and liability
Communications
Prepare internal and external messaging
HR/Operations
Coordinate business continuity procedures
Cyber Insurance Broker
Notify carrier and initiate claims process
Step 4: Preserve Evidence
Evidence preservation is critical for forensic investigation, law enforcement cooperation, insurance claims, and regulatory compliance. Every piece of evidence tells part of the story of how the attackers got in and what they did.
Step 5: Assess Damage and Begin Recovery
Once the threat is contained, shift focus to understanding the full scope of the damage and planning your recovery. This phase requires methodical assessment before taking any restoration actions.
Recovery Priority Order
Identify the ransomware variant
Tools like ID Ransomware can help. Some variants have known decryptors available for free.
Verify backup integrity
Confirm that your backups are clean and were not compromised before restoration.
Patch the entry point
Before restoring, fix the vulnerability that allowed the attack to prevent immediate re-infection.
Restore from clean backups
Begin with the most critical business systems. Use a clean, isolated environment for initial restoration.
Validate restored systems
Scan restored systems for dormant threats before reconnecting to the production network.
Monitor for re-infection
Implement enhanced monitoring for at least 90 days following the incident.
Step 6: Notification and Reporting
Depending on your industry and the data involved, you may have legal obligations to notify regulators, customers, and law enforcement. Getting this right is critical.
After the Storm: Post-Incident Hardening
Recovery is not the end. The weeks following an attack are your opportunity to build stronger defenses and ensure it never happens again. Organizations that skip this step are frequently re-victimized.
Key Takeaways
- Do not panic, do not pay — focus on containment and evidence preservation
- Isolate affected systems immediately but do not shut them down
- Activate your incident response team and external partners
- Preserve all evidence for forensics, insurance, and law enforcement
- Recover from clean backups only after patching the entry point
- Use the incident as a catalyst to strengthen your security posture permanently
Related Articles
Should You Pay the Ransom? Pros, Cons, and Legal Implications
An in-depth analysis of the ransom payment decision, including legal risks, recovery statistics, and alternative strategies.
Read ArticleThe 3-2-1 Backup Strategy: Your Last Line of Defense
When prevention fails, backups are your lifeline. Learn how to implement the 3-2-1 backup strategy for ransomware resilience.
Read Article