How a mid-sized manufacturer recovered from a LockBit ransomware attack that encrypted production systems across 3 facilities — restoring critical operations in 48 hours with zero data loss.
48 hrs
Production Restored
Zero
Data Loss
12 days
Full Recovery
$0
Ransom Paid
A mid-sized precision manufacturing company with approximately 800 employees across 3 production facilities and a corporate headquarters. The company manufactures components for the aerospace and automotive industries, operating CNC machines, industrial robots, and quality control systems connected to their IT network. Annual revenue exceeded $200 million, with production downtime costing approximately $150,000 per hour across all facilities.
On a Saturday morning at 3:17 AM, LockBit ransomware began encrypting systems across the company's network. The attackers had gained initial access 11 days earlier through a compromised VPN credential obtained via a phishing email sent to an engineer. During those 11 days, the attackers performed reconnaissance, moved laterally using stolen credentials, identified backup systems, and staged data for exfiltration.
The encryption was devastating: ERP system (SAP), engineering file servers containing CAD drawings and specifications, production scheduling systems, quality management databases, and email servers were all encrypted. Critically, the attackers had also encrypted the company's primary backup server, which was network-accessible. All three production facilities were forced to halt operations.
The ransom demand was $3.5 million in Bitcoin, with a threat to publish stolen engineering drawings and customer data on the LockBit dark web leak site.
Our IR team was on-site within 2 hours of the call. We immediately isolated all network segments, disabled external connectivity, and began forensic imaging of key systems. We identified the LockBit variant and confirmed the initial access vector through VPN logs. Critically, we discovered that the company's tape backup rotation — which had been maintained by an IT administrator as a personal practice — had an offline tape set from 3 days before the attack.
We mapped the attacker's full path through the network: compromised VPN credential, lateral movement via RDP to domain controllers, Mimikatz for credential harvesting, and rclone for data exfiltration to a Mega cloud account. We identified all persistence mechanisms (4 backdoor accounts, 2 scheduled tasks, 1 malicious service) and developed a comprehensive eradication and recovery plan. We advised the client not to pay the ransom.
We rebuilt domain controllers from clean images, restored the ERP system and production scheduling from the offline tape backups, and brought one production facility online with enhanced monitoring. We verified all attacker persistence was removed and implemented emergency security controls: new MFA for all VPN access, EDR deployed to all endpoints, and network segmentation between IT and OT.
The remaining two facilities were brought back online on days 3 and 4. Engineering file servers were restored from tape backups with minimal data loss (3 days of engineering changes were manually recreated from revision history). Email was restored on day 5. Quality management and remaining systems were restored over the following week. Continuous monitoring confirmed no signs of re-compromise.
Following recovery, we implemented a comprehensive security program to prevent recurrence: