Ransomware response (backup and restore)
Topic: Backups recovery
Summary
When ransomware encrypts or destroys data, isolate affected systems, determine scope, and restore from a backup that is known to be clean and immutable. Do not pay the ransom without legal and executive decision; focus on recovery from backups. Use this when building a ransomware response plan or during an incident.
Intent: How-to
Quick answer
- Isolate: disconnect affected systems from the network to stop spread. Identify which systems and data are encrypted or destroyed; do not reconnect until you have a clean restore path.
- Restore from backup that is offline or immutable (not writable by the same credentials that run production). Verify backup is from before the infection; scan restored data if possible before bringing systems back.
- Do not pay the ransom without legal and leadership approval; payment does not guarantee decryption and funds further crime. Restore from backup; patch and harden; improve backup isolation and access control for the future.
Prerequisites
Steps
-
Isolate and assess
Disconnect affected hosts from the network (unplug or segment). Identify encrypted or deleted data and the likely time of compromise. Determine which backup is from before that time and is not on a system the attacker could have encrypted.
-
Restore from clean backup
Restore from backup that is stored offline or in an immutable store (not deletable by production credentials). Restore to clean systems (rebuilt or new). Scan restored data for malware if tools exist; then bring systems back online in a controlled order.
-
Do not pay without approval
Paying the ransom is a business and legal decision; do not pay without executive and legal approval. Assume payment may not result in decryption; prioritize restore from backup and improving defenses.
-
Harden and improve
Patch and harden restored systems; change all credentials; review backup access so backup storage cannot be encrypted by the same threat. Add immutable or offline backup copies; test restore.
Summary
Isolate affected systems; restore from a clean, immutable or offline backup; do not pay without approval. Harden and improve backup isolation and access. Use this when planning or executing ransomware response.
Prerequisites
Steps
Step 1: Isolate and assess
Disconnect affected systems; identify scope and time of compromise; identify a backup that is clean and from before the incident.
Step 2: Restore from clean backup
Restore from offline or immutable backup to clean systems; scan if possible; bring systems back in a controlled order.
Step 3: Do not pay without approval
Treat payment as a business and legal decision; prioritize recovery from backup.
Step 4: Harden and improve
Patch and change credentials; improve backup isolation and access control; add immutable copies and test restore.
Verification
Affected systems are isolated; restore is from a known-clean backup; runbook and backup design reduce the chance backup is encrypted in a future incident.
Troubleshooting
Backup also encrypted — Use a backup that was offline or in a separate account with different credentials; fix design for next time. No clean backup — Restore from the oldest backup and accept data loss; consider professional recovery services for critical data.