1. Incident Response for Ransomware
Ransomware Introduction
Ransomware represents one of the most disruptive and financially damaging incident types that organizations face today. This chapter addresses ransomware-specific considerations within the broader DAIR model established in Part 2: A Dynamic Approach to Incident Response. Organizations responding to ransomware should reference the relevant sections in Part 2 for comprehensive guidance on each response activity, using this chapter to supplement that foundation with ransomware-specific considerations.
Ransomware Attack Trends
Ransomware (including data extortion threats) remains one of the most significant cybersecurity threats facing organizations across all sectors. The number of data leak events, including claims of successful attacks, has risen steadily from 2022 through the end of 2025. Chainalysis' 2026 Crypto Crime Report notes a 50% year-over-year increase in data leak site postings between 2024 and 2025 (Figure 1). Although victims paid ransom in fewer than 30% of reported cases in 2025, the frequency of ransomware and data extortion events continues to increase. [1] Even when the ransom itself is not paid, the overall financial impact of ransomware incidents remains substantial, including the costs of business interruption, forensic investigation, legal fees, regulatory penalties, and reputational damage.
In 2025, ransomware actors received more than $820 million in on-chain payments — an 8% decline year-over-year (YoY) from $892 million, our updated 2024 estimate. The 2025 total is likely to approach or exceed $900 million as we attribute more events and payments, just as our 2024 total grew from our initial $813 million estimate this time last year.
Chainalysis
Modern ransomware has evolved from simple encryption schemes into sophisticated multi-stage extortion operations. The overlap between ransomware and broader cyber extortion has blurred the boundaries of what constitutes a ransomware attack, with many campaigns now focusing primarily on data theft rather than encryption.
Initial access methods have evolved in response to improvements in defender capabilities and endpoint protection. Remote access mechanisms remain a persistent threat vector, with Remote Desktop Protocol (RDP) and Remote Monitoring and Management (RMM) tools frequently appearing in ransomware investigations. Credential attacks against exposed authentication endpoints, such as VPN services, remain common, particularly against organizations that lack consistent multi-factor authentication requirements.
Phishing and related attacks (voice phishing, SMS phishing, etc.) remain a valuable tactic for adversaries to harvest credentials and establish initial access. These stolen credentials are often used to subsequently access VPN concentrators, cloud services, remote desktop systems, or other remote access portals.
| Stolen credentials used for initial access may have been compromised weeks or months before the attack, often on mobile devices, personal computers, or other hosts outside the response team’s telemetry. The credential theft itself may have occurred entirely outside the victim organization’s environment, leaving no evidence in organizational logs. |
Some ransomware campaigns operate without traditional command-and-control infrastructure, relying instead on legitimate Remote Monitoring and Management (RMM) tools such as ScreenConnect, AnyDesk, or TeamViewer for remote access. These tools can blend into enterprise environments, making detection more difficult because the same software may be used without malicious intent by IT support teams or end users.
The use of Initial Access Brokers (IABs) has professionalized the initial compromise phase of ransomware operations. IABs specialize in gaining access to victim networks and then sell that access to ransomware affiliates. This division of labor means that the time between initial compromise and ransomware deployment can extend to weeks or months as affiliates conduct reconnaissance, escalate privileges, and position themselves for maximum impact. Because IABs often use stealthy techniques to maintain access and disclose credential details only when selling access, Cyber Threat Intelligence (CTI) resources may lack insight into the specific credentials available for an extended period.
Ransomware operators have increasingly focused on virtual infrastructure and backup systems as primary targets. Hypervisors running VMware ESXi or similar platforms represent high-value targets because compromising a single hypervisor can impact dozens of virtual machines. Backup servers, storage systems, and underlying remote lights-out management (LOM) systems are targeted specifically to eliminate recovery options before encryption begins.
Attack Differentiation
Ransomware attacks fall into several distinct categories, each requiring different response considerations.
Human-Operated Ransomware (HumOR)
Human-operated ransomware attacks are often the most sophisticated form of ransomware. Skilled operators or affiliates actively navigate the victim network, conducting reconnaissance, escalating privileges, and moving laterally before deploying encryption payloads. Attackers make real-time decisions about which systems to target, how to disable security controls, and when to execute the final encryption phase. Extended dwell times allow attackers to identify and exfiltrate high-value data, disable backup systems, and position themselves to encrypt as much of the environment as possible.
In HumOR attacks, the increased use of AI and Large Language Models (LLMs) by threat actors is lowering the technical barrier to entry. Tasks that previously required skilled operators, including writing convincing social engineering lures, analyzing complex identity platform permission inheritance, identifying high-value targets, and adapting tooling to specific environments, can now be accelerated and automated using AI. This allows ransomware affiliates with limited technical expertise to execute campaigns that previously demanded experienced operators, effectively expanding the pool of actors capable of conducting sophisticated, hands-on-keyboard attacks. The practical impact on defenders is an acceleration of ransomware campaign volume and scope without a corresponding increase in attacker skill.
Automated or Mass-Distributed Ransomware
Automated or mass-distributed ransomware campaigns prioritize volume over the precision often associated with HumOR attacks. Automated delivery mechanisms, such as malicious email attachments or exploit kits, infect as many systems as possible. The ransomware executes immediately upon delivery without the reconnaissance and lateral movement characteristic of HumOR attacks. Recovery from automated ransomware is often simpler because the scope of compromise is limited to systems directly manipulated through the delivery mechanism.
Encryptionless Extortion
Encryptionless extortion attacks are a growing trend where attackers focus on data theft without deploying encryption. The threat of data exposure becomes the primary leverage rather than operational disruption from encrypted systems. Some groups have shifted entirely to this model, recognizing that data theft alone can generate ransom payments without the technical complexity of reliable encryption and decryption. Response to encryptionless extortion emphasizes breach notification workflows, data classification to understand exposure, and regulatory compliance considerations.
Pseudo-Ransomware and Wipers
These attacks appear to be ransomware but offer no viable path to data recovery. Attackers may demand ransom payments, but either never intended to provide decryption keys or use destructive techniques that make recovery impossible regardless of payment. Responders should consider the possibility that apparent ransomware may actually be a wiper, particularly when the ransom note lacks typical negotiation details or when early decryption attempts fail despite valid keys.
Multi-Vector Extortion Campaigns
Early ransomware families focused almost exclusively on encrypting data and demanding payment for decryption. Modern groups have evolved into broader extortion operations that apply pressure for payment across multiple channels simultaneously. In these multi-vector campaigns, encryption is only one part of a broader strategy that may include data theft, data leaks, distributed denial-of-service (DDoS) attacks, and direct harassment of executives, employees, customers, or regulators, as shown in Table 1. These tactics all have potentially significant negative impacts on the organization, and can be combined in various ways to increase pressure for payment and maximize the attacker’s leverage.
| Attack Technique | Description |
|---|---|
Encryption |
Core tactic of ransomware to disrupt operations and pressure payment for decryption keys. |
Data Theft |
Attackers exfiltrate sensitive data, sometimes in conjunction with data encryption, using the threat of public exposure as leverage for payment. |
Data Leaks |
Attackers publish stolen data on dark web leak sites or send targeted notifications to customers, partners, or regulators to increase pressure for payment or threaten reputational damage. |
DDoS Attacks |
Attackers may launch DDoS attacks against the victim’s public-facing infrastructure to extort payment, threatening prolonged service disruption if demands are not met. |
Harassment |
Direct contact with executives, employees, customers, or regulators through phone calls, emails, or social media, used to apply additional pressure for payment or to threaten reputational damage. |
From an incident response perspective, this changes the problem from systems are encrypted to the organization is being coerced on several fronts simultaneously. Encryption may be complete, partial, or absent; the real leverage often comes from the attacker’s ability to threaten business relationships, regulatory exposure, and public reputation in a combined assault, as shown in the Figure 5.
Multi-vector extortion has several practical implications for organizations:
-
Preparation should explicitly account for extortion beyond encryption, including data classification and mapping for rapid impact assessment, understanding legal and regulatory obligations for potential leaks, and establishing communication strategies for customers, partners, and regulators.
-
Detection efforts need to address both technical and information impacts: determining what data was accessed or exfiltrated is as important as understanding which systems were encrypted.
-
Scoping should evaluate business impact across operational disruption, data exposure, and reputational risk.
-
Response actions frequently require close coordination with legal, communications, and executive leadership to balance technical containment with the timing and content of public and private communications.
Recognizing ransomware as one component of a broader extortion attack helps teams frame decisions appropriately. It also underscores the need for response playbooks, tabletop exercises, and policies that integrate technical, legal, and business perspectives to build a comprehensive defense strategy.
| Modern ransomware response is not just about restoring encrypted systems. Organizations should prepare for coordinated pressure across technical, legal, reputational, and regulatory fronts simultaneously. |
In the sections that follow, we will address ransomware-specific considerations within each waypoint of the DAIR model with recommendations for organizations working to improve their response capabilities.
Prepare
Preparation is the most effective phase for reducing ransomware impact. Organizations with robust preparation can recover more quickly, limit business disruption, and avoid the worst outcomes that ransomware can inflict. Investments made before an incident occurs pay dividends when a response becomes necessary.
| This bears repeating: Preparation is the most effective phase for reducing ransomware impact. Response efforts following ransomware incidents are complex, time-consuming, and costly. Investing the time and resources to prepare thoroughly before an incident occurs is the best way to limit the damage ransomware can cause. |
General incident response preparation is covered in Prepare Activity. This section addresses ransomware-specific preparation considerations that supplement baseline incident response readiness.
Crisis Communications and Public Relations
Ransomware incidents generate immediate and sustained communication demands that few organizations are prepared to handle. Organizations should establish crisis communications capabilities before an incident occurs, either through an internal communications team with incident response experience or through a retainer agreement with an external crisis communications firm. Waiting until ransomware is actively encrypting systems to identify a PR partner or draft a holding statement leaves the organization reactive when controlled messaging matters most.
The speed at which information escapes organizational control during ransomware incidents is a recurring problem. When ransom notes appear on hundreds or thousands of systems simultaneously, employees across every department become aware of the attack within minutes. Social media posts, messages to friends and family, and direct contacts with journalists can put the incident into public view long before the response team has assessed the situation or leadership has approved any messaging. Organizations that lack pre-approved holding statements and designated spokespersons find themselves reacting to media coverage rather than shaping the narrative.
A crisis communications plan for ransomware should address:
-
Pre-drafted holding statements that can be quickly adapted to specific circumstances.
-
Designating spokespersons authorized to communicate externally on behalf of the organization.
-
Establishing internal communication channels and procedures to keep employees informed and reinforce that only authorized personnel should discuss the incident publicly.
-
Escalation procedures that define when and how to engage external communications support.
-
Social media monitoring to identify leaks and public discussion early.
-
Coordination protocols between technical response teams, legal counsel, and communications staff.
These preparations allow organizations to respond to communication demands quickly and consistently rather than improvising under pressure.
CTI for Ransomware
Cyber threat intelligence helps organizations prepare for ransomware by identifying current threats, understanding attacker tactics, and recognizing gaps in defensive visibility and capability. Effective CTI enables proactive defense by surfacing information about how ransomware groups operate before they target the organization.
CTI for ransomware preparation should prioritize the use of tactics, techniques, and procedures (TTPs) over generic indicators of compromise (IOCs) for detection and threat hunting. Ransomware payloads are frequently customized for each victim organization, with custom binaries containing hardcoded ransom notes specific to the target. File hashes and other payload-specific IOCs have limited value for proactive defense because the indicators change with each attack. This is exemplified in the LockBit RaaS operation discussed earlier, where each affiliate-generated build produced unique binaries for each victim, as shown in Listing 1. TTPs, by contrast, remain more consistent across campaigns and provide durable foundations for detection and hunting.
mysql> SELECT DATABASE(); +--------------+ | DATABASE() | +--------------+ | paneldb_dump | +--------------+ 1 row in set (0.00 sec) mysql> SELECT COUNT(*) AS "Total Builds", COUNT(DISTINCT company_website) AS "Unique Orgs" FROM builds; +--------------+-------------+ | Total Builds | Unique Orgs | +--------------+-------------+ | 1183 | 631 | +--------------+-------------+ 1 row in set (0.01 sec)
Consider a common tactic: ransomware groups consistently target backup-deletion mechanisms in their campaigns to eliminate recovery options, using tools like vssadmin, wbadmin, and bcdedit.
Building detection capabilities around the unexpected execution of these commands is more valuable than tracking specific malware hashes that change with each attack tool build.
| Ransomware payloads are customized for each victim, making file hashes and other payload-specific IOCs short-lived. Focus detection engineering on attacker behaviors and techniques that remain consistent across campaigns. |
Important CTI sources for ransomware intelligence include:
-
Government advisories from CISA, FBI, and international partners that provide detailed technical analysis of active ransomware groups.
-
Industry-specific ISACs that share threat information relevant to particular sectors.
-
Commercial threat intelligence feeds that track ransomware group activity, infrastructure, and evolving techniques.
-
Open-source intelligence from security researchers, vendor blogs, and community threat tracking projects.
Ransomware operators rapidly adapt their tactics in response to defensive improvements. Where conventional IOCs remain valuable for broad threat awareness, TTP-focused CTI provides more actionable insights for ransomware defenses.
Employee Training and Awareness
Employee training is a critical defense against social engineering and phishing attacks that often initiate ransomware campaigns. Most ransomware infections begin with human interaction, whether clicking a malicious link, opening a malicious attachment, or responding to a convincing impersonation attempt.
Effective training helps employees recognize important indicators of phishing attempts:
-
Urgent or emotionally manipulative language designed to bypass careful consideration.
-
Claims of dire consequences for not responding immediately.
-
Requests for personal information, credentials, or financial data.
-
Untrusted or shortened URLs that obscure the actual destination.
-
Slight misspellings in email addresses or domain names (e.g., "amazan.com" instead of "amazon.com").
-
Unexpected communications that do not align with normal business processes.
AI-generated content has improved the quality of phishing campaigns, making grammatical and stylistic errors less reliable as indicators. Attackers without native-language skills or cultural knowledge can now generate convincing messages that would previously have contained obvious tells. Training should emphasize verification procedures and reporting mechanisms rather than relying solely on employees to identify sophisticated deception.
Help desk impersonation has emerged as a particularly effective social engineering technique. Employees should understand organizational policies regarding remote support sessions, particularly whether help desk staff will ever request the installation of remote access tools or ask for credentials. Organizations should clearly communicate that legitimate support staff will not request password disclosure or installation of unfamiliar software.
Training programs should emphasize regular, ongoing engagement rather than annual compliance exercises. Training programs are not effective when they are not engaging or when employees view them as formalities that they click through as quickly as possible. Simulated phishing campaigns should test recognition and reporting behavior to obtain data on resilience to these attacks and practices to follow organizational policies.
Metrics that track reporting rates, click rates, and time-to-report help security teams identify which departments or roles need additional attention. Clear reporting mechanisms that employees understand are valuable when they encourage prompt escalation of suspicious activity. Feedback loops that inform employees about the outcomes of their reports reinforce vigilance and build a security-conscious culture.
| When employees report suspicious emails or activity, respond promptly with acknowledgment and next steps. Users who report potential threats should feel that their actions are valued and lead to meaningful outcomes. When reported incidents are not followed up on, users often become discouraged from reporting in the future. |
Identity, Access, and Tier-0 Protection
Ransomware operators rarely begin by deploying an encryptor on a random workstation. In modern campaigns, threat actors attempt to take control of the organization’s identity and administration layer so they can push ransomware everywhere, destroy recovery options, and resist containment efforts. Domain controllers, identity providers (IdPs), remote management platforms, virtualization consoles, and backup servers become the distribution vehicles for broad ransomware deployment.
Preparing for ransomware requires treating these components as tier-0 assets and defending them accordingly. The goal is to make it significantly harder for attackers to obtain persistent, global administrative control, and to ensure that the organization can still operate if its primary identity systems are disrupted or untrusted.
| Domain controllers, identity providers, backup servers, and virtualization platforms are the systems attackers use to push ransomware everywhere at once. Protecting these tier-0 assets limits the attacker’s ability to achieve widespread encryption with greater ease. |
Important preparations include:
-
Hardening domain controllers, IdPs, and key admin platforms such as remote management tools, virtualization platforms, and backup servers. These systems should have minimal internet exposure, tight network segmentation, and aggressive patching practices.
-
Separating administrative roles and credentials so that no single account has broad, standing privileges across the entire organization. Use distinct admin accounts for different roles, avoid shared domain admin accounts, and implement just-in-time privilege elevation where possible.
-
Implementing strong MFA for all privileged and remote access, with preference for phishing-resistant methods for high-value accounts.
-
Monitoring for identity and privilege anomalies as early-warning indicators of compromise, including unexpected changes to admin group membership, new high-privilege accounts, unusual logon patterns, and modifications to IdP or federation configurations.
-
Maintaining documented and tested break-glass accounts and procedures that remain usable if your Single Sign-On (SSO)/IdP or primary directory is unavailable or cannot be trusted. These break-glass options should use separate credentials, be stored and accessed under strong control, and be exercised during tabletop exercises and technical tests.
When identity, access, and tier-0 systems are well protected, ransomware operators must work much harder to reach the point where they can deploy encryptors broadly. Strong identity hygiene also improves detection and scoping (through better visibility into privileged changes) and gives the organization more options during containment and recovery.
Backups
Backups serve as the primary recovery mechanism for ransomware incidents, yet many organizations discover during an attack that their backups cannot fulfill that role. Modern ransomware campaigns explicitly target backup infrastructure, hypervisors, and storage snapshots before deploying encryption, recognizing that eliminating recovery options increases the likelihood of ransom payment.
Ransomware-Resistant Backup Strategies
Effective backup strategies for ransomware resilience assume that attackers will have privileged access to the production environment. The question is not whether backups exist, but whether those backups can survive an attacker with domain administrator or other privileged credentials.
Start with the direction of data flow. Pull-based backup architectures, where backup systems retrieve data from production, are more resilient than push-based models. When production systems push to backup storage, a compromised system can overwrite or delete existing backups. Pull-based systems initiate connections from the backup infrastructure, limiting what compromised production systems can reach.
Network isolation reinforces this protection. Backup infrastructure should be accessible only through dedicated management networks or specialized agents, not directly reachable from potentially compromised production systems. Attackers who compromise a workstation or even a domain controller should not have a network path to backup storage.
Immutability provides protection even when attackers reach backup systems. Write-once-read-many (WORM) configurations and immutability guarantees prevent modification or deletion regardless of credential compromise. An attacker who gains access to the backup console cannot delete immutable backups before the retention period expires. Storage-layer snapshots maintained with retention policies separate from backup software provide additional recovery points that application-level attacks cannot reach. Snapshot-based backup approaches also support rapid restoration by accommodating faster recovery of virtual machines or volumes, though their storage capacity requirements make them more costly than traditional backup methods.
Air-gapped or offline copies represent the strongest protection. At least one backup copy should be physically disconnected from networks, eliminating any possibility of remote compromise. Removable storage libraries or systems that are powered off except during scheduled backup windows provide this protection.
Identity separation can also limit the blast radius of credential compromise. Backup system access managed through credentials separate from production IdP means that domain administrator credentials alone cannot reach backup infrastructure data. Separate identity providers, dedicated local accounts, or third-party authentication systems create this separation.
| If domain administrator credentials can access backup systems, attackers with those credentials can destroy backups before encrypting production systems. Separate backup authentication from production identity providers to limit the access opportunity from a compromised domain administrator account. |
Hypervisor-level protection adds another layer for virtualized environments. VM snapshots and replication managed at the hypervisor layer with separate administrative access survive attacks that compromise guest operating systems. Some backup platforms also support replica-from-backup capabilities, where virtual machine replicas are created directly from backup data rather than from running source systems. [4] This approach allows organizations to spin up critical workloads from backup data when source systems are unavailable or untrusted, accelerating recovery of priority systems while the primary environment is being rebuilt. Cross-cloud storage with external identity extends these protections to cloud environments, preventing compromised on-premises credentials from reaching off-site backups authenticated through separate identity providers.
Not all systems are equally important, and backup strategies should reflect that. Prioritizing backup coverage and restoration testing for mission-critical systems ensures the most important workloads have verified recovery paths before less critical systems are addressed. Attempting to restore everything simultaneously during ransomware recovery is rarely feasible and often counterproductive. Identifying the priority order for system recovery in advance allows teams to focus their efforts on the areas with the highest business impact.
The 3-2-1-1-0 Backup Rule
The traditional 3-2-1 backup rule has served as a baseline for data protection, but comprehensive preparation to defend against ransomware threats often requires an expanded strategy. The 3-2-1-1-0 rule extends the original framework with two additions that directly address modern attack patterns: [5]
-
3 copies of data (production plus two backups).
-
2 different media types (preventing single-technology failures).
-
1 off-site copy (protecting against physical or logical site-wide events).
-
1 immutable or air-gapped copy that cannot be modified or deleted regardless of credential compromise.
-
0 errors in backup recovery verification, confirmed through automated or scheduled restoration testing.
The first addition, an immutable or air-gapped copy, addresses the threat that ransomware operators specifically target backup infrastructure with compromised credentials. A backup that cannot be altered or destroyed through network access or administrative privilege provides a recovery path that survives even a complete domain compromise.
The second addition, zero recovery errors, shifts backup validation from assumption to verification. Ransomware incidents compress decision timelines, and discovering that backups do not restore properly during an active attack eliminates the primary recovery option at the worst possible moment. Organizations should regularly test restoration procedures, measure actual recovery times against Recovery Time Objectives (RTO), and verify data completeness against Recovery Point Objectives (RPO). Automated recovery verification tools can perform these checks on a scheduled basis, confirming that backups are complete and restorable before an incident forces the question.
| Ransomware recovery timelines are often significantly longer than organizations expect. Unlike a single-system failure, ransomware can encrypt hundreds of systems simultaneously, creating a restoration scope that can take days or weeks to work through, even with clean backups available. Extended recovery times increase organizational pressure to pay ransom, which is exactly why attackers target backup infrastructure in the first place. Organizations should measure actual restoration times during testing and use those measurements, not theoretical estimates, when setting recovery expectations with stakeholders. |
Backups Are Your Last Line of Defense
Finally, it’s important to recognize that backups function as insurance rather than prevention. Organizations cannot rely on backup-based recovery as their primary ransomware strategy. Defense-in-depth, early detection, and effective response remain essential even with robust backup capabilities.
Verify/Triage
General guidance on verification and triage activities is covered in Verify and Triage Activities. This section addresses ransomware-specific considerations for verification and triage.
Ransomware Verification Indicators
Ransomware verification often occurs under compressed timelines because encryption spreads rapidly, and additional delay can increase the impact on the organization. Unlike verification for other incident types where analysts can take time to gather context, ransomware verification frequently happens while the attack is still active.
Start by identifying the specific indicators that distinguish ransomware from other threats. Encrypted files with modified extensions, ransom notes appearing across file systems, and mass file modification events in rapid succession all point toward ransomware rather than data theft or espionage. System logs showing widespread service disruptions, failed backup operations, or unexpected shadow copy deletions on Windows systems further support the classification of ransomware.
Analysts should aim for early identification of the ransomware family during verification. Ransom notes often contain identifying information, including group names, contact addresses, and payment portal URLs. Services such as ID Ransomware allow analysts to upload ransom notes or encrypted file samples to identify the ransomware variant. [6] Early family identification allows responders to research known decryption options, understand typical attacker behavior patterns, and anticipate what evidence sources may be available.
| Treat ransom notes as confidential. Victim identifiers in ransom notes grant access to negotiation portals, and leaked identifiers have caused ransomware groups to terminate negotiations and immediately publish stolen data. |
Distinguishing Attack Types
Not every ransomware incident involves data exfiltration. The 2025 Verizon Data Breach Investigations Report found ransomware in 44% of all breaches reviewed, up from 32% the prior year, with that combined figure encompassing both traditional encryption-based ransomware and pure extortion attacks in which adversaries steal data without encrypting systems. [9] The 2024 report separated these categories, finding that pure extortion accounted for 9% of all breaches compared to 23% for encryption-based ransomware. [10] Data theft as an additional extortion lever traces back to around 2019, when the Maze ransomware group pioneered the technique to retain leverage even when victims could restore from backups. [11]
During verification, look for indicators that help distinguish between attack types, as summarized in Table 2. This early classification shapes how the organization communicates with stakeholders and allocates response resources.
| Attack Type | Indicators |
|---|---|
Encryption-only |
|
Data theft with encryption |
|
Extortion without encryption |
|
Communicating with Decision Makers
An effective ransomware response requires managing the tension between executive information needs and investigation timelines rather than resolving it. Analysts should explicitly communicate uncertainty, distinguishing between what is known, what is suspected, and what remains under investigation.
For example, a statement that positions known and suspected information, along with next steps, provides leadership with the insight needed for decision-making.
Based on current evidence, we believe the attacker accessed the file server containing customer data. We have not yet determined what specific files were accessed or whether data was exfiltrated. We expect to have better visibility on data access within twelve hours.
Regular briefings (every few hours early in the incident, then daily) help leadership stay informed without the constant interruption of technical work. Consistent communication formats that show progress without overpromising build credibility over time. Analysts should also help leadership understand that some questions may never be definitively answered, and that reasonable assessments based on available evidence are sometimes the best possible answers.
Resource Planning for Extended Response
Resource allocation during triage should account for the extended duration typical of ransomware incidents. Response efforts may continue for weeks or months through investigation, containment, eradication, and recovery. Early engagement of external resources, including forensics firms, legal counsel, and communications specialists, helps ensure adequate capacity for the sustained effort ahead.
When presenting the incident to decision makers for resource allocation, include realistic estimates of response duration and the specialized skills required. Ransomware response often requires expertise in negotiation, regulatory compliance, and crisis communications that may not exist within the internal incident response team.
Scope
Ransomware scoping should be more thorough than scoping for many other incident types. While advanced threat actors may focus narrowly on specific data or systems, ransomware attackers typically survey the environment broadly and access whatever is immediately available. This difference means scoping must extend across the entire environment rather than following a narrow path from initial access to a specific target.
The biggest scoping failure in ransomware response is failing to perform it thoroughly. Organizations that limit their scope to systems already known to be encrypted often discover during recovery that attackers had accessed additional systems, established persistence mechanisms, or exfiltrated data from locations not initially considered.
| Failure to adequately scope ransomware incidents results in incomplete containment, missed data exposures, and prolonged recovery times. Responders should invest the necessary time and resources to perform comprehensive scoping throughout the response action loop. |
Framework for Ransomware Scoping
Effective ransomware scoping requires systematic data gathering across multiple categories. The framework checklist in the Table 3 provides guidance to help responders ensure comprehensive scoping coverage.
| Category | Key Questions and Data Points |
|---|---|
Incident Overview |
How was the incident identified? Which hosts are known to be impacted? What actions have already been taken? What are the organization’s expectations for response? What would be considered the organization’s most sensitive information assets? Do backups exist and are they unencrypted? Do current network diagrams exist? |
Host Inventory |
How many Windows, Linux, macOS, and ESXi hosts exist in the environment? Which systems are domain-joined? What virtualization platforms are in use? Where are backup servers located? |
Host Data Sources |
What Windows Event Logs are available and at what retention? What Linux audit or syslog data exists? What application-specific logs are available? Is Endpoint Detection and Response (EDR) telemetry available? |
Network Data Sources |
What firewall logs are available? What VPN authentication logs exist? Is NetFlow data collected? Is there a Network Detection and Response (NDR) solution in place? |
Security Systems |
Is a Security Information and Event Management (SIEM) system deployed and what data does it contain? What EDR coverage exists? What endpoint protection or antivirus data is available? Are there cloud security logs (Microsoft Entra ID, AWS CloudTrail)? |
Cloud Logging |
What cloud platforms are in use (AWS, Azure, GCP)? What logging and monitoring services are enabled (CloudTrail, Azure Monitor, etc.)? What is the retention period for cloud logs? What logging resources are available for Software as a Service (SaaS) applications (e.g., Microsoft 365 audit logs, Google Workspace logs)? |
This scoping data serves multiple purposes: understanding the environment where the attack occurred, identifying available evidence sources, and planning collection and analysis activities. Internal teams may already know many of these answers, but external responders or consultants should systematically gather this information before proceeding.
Scoping Activities for Ransomware
Ransomware scoping activities focus on understanding the full extent of attacker activity across the environment. Start by identifying all affected systems: not just those showing obvious encryption, but every system the attacker accessed, authenticated against, or used for staging tools. This broader view reveals the true scope of compromise rather than the visible symptoms of encryption.
Next, determine data exposure by examining which systems containing sensitive data the attacker accessed. File servers, databases, document repositories, and backup systems all warrant scrutiny. Understanding data exposure informs breach notification decisions and helps leadership assess regulatory and reputational risk.
Map the attacker’s lateral movement path from initial access through to the systems ultimately encrypted. This reconstruction reveals how attackers navigated the environment and which credentials or vulnerabilities they exploited along the way. Similarly, identify any persistence mechanisms the attacker established, including backdoors, scheduled tasks, registry modifications, or unauthorized accounts that could enable re-entry after recovery.
Finally, establish a comprehensive timeline of the attacker’s activity. Determine when initial access occurred and how long the attacker was present before deploying encryption. This dwell-time measurement helps identify the window during which data exfiltration may have occurred and informs decisions about which backup restore points are most likely trustworthy.
Eradicate
Eradication in ransomware incidents involves two parallel objectives: understanding what data attackers accessed, and removing all attacker presence from the environment. Both objectives need to be completed thoroughly before recovery can proceed safely.
Assessing Data Access and Exfiltration
Understanding what data attackers accessed is critical for regulatory compliance, notification decisions, and business risk assessment. In double-extortion scenarios, this assessment determines the organization’s exposure even if the encryption is resolved.
Data access assessment begins with identifying which systems attackers touched:
-
Authentication, Authorization, and Accounting (AAA) records: Where did compromised accounts authenticate? Each successful authentication represents a system that the attacker could access.
-
File access telemetry: What files were opened, copied, or modified on accessed systems?
-
Network share access: Which file servers and shared drives did the attacker browse or access?
-
Database access: Did attackers connect to databases containing sensitive information?
Software inventory and data classification become valuable during this assessment. Understanding what data types reside on each system helps translate "the attacker accessed the backup server" into "the attacker potentially accessed customer personally identifiable information (PII) and financial records stored on that system."
Investigative Techniques for Data Exfiltration Hunting
Ransomware attackers commonly stage data before exfiltration using archival tools and temporary storage locations. Investigators should hunt for evidence of these staging activities, summarized in Table 4.
| Technique | What to Look For |
|---|---|
Archival artifacts |
Tools like WinRAR, 7-Zip, and native Windows compression utilities leave forensic traces:
|
Staging locations |
Attackers stage data in predictable locations:
|
Exfiltration tools |
Hunt for file transfer utilities, including:
|
Deleted artifacts |
Attackers often delete staging archives after exfiltration:
|
Systematic hunting across these artifact categories helps investigators reconstruct the data exfiltration timeline and estimate what information left the environment, even when attackers attempted to cover their tracks.
Data Exfiltration Detection Strategies
When the specific data accessed is unknown, detection focuses on identifying anomalous data movement. Start by examining network telemetry for large outbound data transfers to external IP addresses, particularly transfers destined for hosting providers or known file-sharing services. Use network monitoring tools to identify spikes in data volume to narrow down investigation windows, as shown in the examples in Figure 7. File system analysis should look for the creation of large archive files, especially in unusual locations where archives would not normally appear.
User and Entity Behavior Analytics (UEBA), often supported with AI-based technology platforms, provides additional detection opportunities. Execution of archival tools by unexpected accounts or on systems where such activity is abnormal warrants investigation. Similarly, network connections to cloud storage services from systems that do not normally use such services may indicate unauthorized data staging or exfiltration.
Decryption Possibilities
Before committing to backup restoration or considering a ransom payment, responders should investigate whether free decryption options are available. Law enforcement operations, security researchers' efforts, and implementation flaws in ransomware encryption have led to decryption tools for numerous ransomware families.
Some circumstances allow organizations to perform decryption without payment:
-
Implementation vulnerabilities: Although less common today, some ransomware families have included cryptographic implementation flaws that allow researchers to recover encryption keys or decrypt files directly. These vulnerabilities are uncommon in modern, well-maintained ransomware operations, but older or less sophisticated variants may contain exploitable weaknesses.
-
Law enforcement operations: Coordinated efforts have led to the seizure of ransomware infrastructure, including decryption keys. Operations against groups such as Hive, ALPHV/BlackCat, and LockBit have yielded decryption capabilities that were subsequently made available to victims.
-
Leaked keys: Internal conflicts within ransomware groups, disgruntled affiliates, or operational security failures have occasionally resulted in decryption keys being leaked publicly.
-
Security researcher efforts: Independent researchers and antivirus vendors analyze ransomware samples and, when they identify weaknesses, sometimes develop decryption tools.
The No More Ransom Project serves as the primary repository for free ransomware decryption tools. This initiative, supported by Europol, law enforcement agencies, and security vendors, aggregates decryption tools for over 150 ransomware families. Responders should check this resource early in the response process.
Additional decryption resources include:
-
Vendor-provided tools from security companies, including Kaspersky, Avast, Emsisoft, and Bitdefender.
-
Decryption tools from law enforcement agencies (sometimes not publicly released but available through direct contact).
-
Security researcher publications and tool releases.
-
Commercial decryption services, including Unidecrypt from Coveware. [12]
Responders should maintain realistic expectations about the likelihood of decryption. Most modern ransomware uses properly implemented encryption without known vulnerabilities. Decryption without obtaining the attacker’s keys is typically not feasible for current, actively maintained ransomware families.
Even when decryption tools exist, they may have limitations:
-
Tools may only work for specific ransomware versions or variants.
-
Some encrypted files may not be recoverable even with the correct keys.
-
Decryption processes can be slow and resource-intensive, particularly for large file volumes.
-
Partial file corruption may occur even after successful decryption.
-
Tools may not provide sufficient scalability to handle enterprise-scale recovery.
Given these constraints, responders should evaluate decryption possibilities early but continue pursuing backup restoration and system rebuild options in parallel.
Decryption Assessment Process
When investigating decryption options, follow a structured approach:
-
Identify the ransomware family: Analyze ransom notes, encrypted file extensions, and any available malware samples to accurately identify the ransomware variant. Misidentification leads to wasted effort with incompatible tools.
-
Check available resources: Search the No More Ransom project, vendor tools, and recent security news for decryption options matching the identified family.
-
Validate tool applicability: Confirm that available tools match the specific variant and version encountered. Tools developed for older versions may not work on newer variants.
-
Test on sample files: Before committing to full-scale decryption, test tools on a subset of encrypted files to verify they work correctly. Measure the time and resources required for decryption to inform broader planning.
-
Plan decryption execution: If tools prove effective, plan the decryption process, including prioritizing of critical files and validating recovered data.
-
Backup encrypted data: Before attempting decryption, create secure backups of the encrypted files to prevent data loss if the tool fails or corruption occurs during decryption.
-
Execute decryption: Run the decryption process according to the plan, using dedicated systems with a copy of the encrypted data, where possible, instead of live systems.
-
Validate and Monitor: Continue monitoring for any issues and validating recovered data as it becomes available.
Decryption tools, when available, may represent the least costly recovery path. Even a few hours spent investigating decryption options is worthwhile before committing to longer restoration or payment alternatives.
Recover
Recovery is typically the longest and most resource-intensive phase of ransomware response. Organizations often underestimate the time and effort required to restore operations, particularly when critical infrastructure such as domain controllers, identity platforms, or backup systems has been compromised.
Too often, an organization will pay the ransom, obtain a decryptor, and expect to be back up and running within hours or days. This is seldom the case, especially when the organization hasn’t prepared for recovery in advance. In this section, we’ll cover key principles for ransomware recovery, including planning and prioritization, restoring from backups, system rebuild, monitoring for an attacker’s return, and communication during recovery.
Recovery Planning and Prioritization
Recovery planning prioritizes systems based on organizational criticality, with infrastructure dependencies addressed before application services. As with any other major incident, critical systems receive priority, but ransomware recovery requires particular attention to the order of operations, since foundational services must be trustworthy before dependent systems can be restored.
Recovery prioritization considers several factors, including:
-
Business criticality: Revenue-generating systems, patient care capabilities, and critical operations platforms.
-
Infrastructure dependencies: Identity services, DNS, and network infrastructure must be restored before systems that depend on them.
-
Data availability: Systems with verified clean backups versus those requiring rebuild.
-
Regulatory requirements: Notification deadlines and compliance obligations that may drive timeline constraints.
-
Resource availability: Staff, hardware, software licenses, and vendor support capacity.
Coordinate recovery priorities with decision makers to align technical work with organizational needs. Important questions include which systems are most critical for resuming organizational operations, what operational workarounds can sustain the organization while recovery proceeds, and what resources can be allocated to accelerate recovery of priority systems. Answering these questions early in the recovery process helps align technical efforts with organizational priorities and sets realistic expectations for stakeholders. Clear communication and priority setting help reduce frustration when recovery timelines extend longer than hoped.
Restoration from Backups
As we saw in Section 1.2.5, restoration is the primary recovery method when backups are available and verified to be clean. However, restoration requires careful attention to avoid reintroducing attacker access or compromised data.
Critical considerations for backup restoration:
-
Identify clean restore points: The restore point must predate the attacker’s compromise, not just the encryption. A threat actor (such as an IAB) may have been present collecting information about the organization’s systems for weeks or months before selling access to a ransomware threat actor.
-
Verify backup infrastructure: Confirm that backup servers, storage systems, and control planes were not compromised or manipulated by attackers.
-
Validate backup integrity: Test restoration on isolated test systems before deploying to production.
-
Understand data loss: Accept that data created between the last clean backup and the encryption event may be unrecoverable.
Challenges with backup restoration include determining the correct restore point when attacker dwell time is uncertain, accepting potentially significant data loss when restoring from older backups, and the time required to restore large systems and datasets.
System Rebuild
For critical infrastructure, particularly Active Directory domain controllers, system rebuild is often preferable to restoration. Compromised domain controllers pose unique risks because attackers can embed their persistence deeply within Active Directory (AD) objects, Group Policy, and trust relationships. Restoring a compromised DC may reintroduce attacker access that is extremely difficult to detect or remove.
| Recovering a compromised Active Directory environment when an attacker has had domain admin access is complex and risky. Organizations should carefully consider the perceived cost-benefits of restoration against the long-term security risks of incomplete eradication of attackers. |
Rebuild is recommended when:
-
Domain controllers or other identity infrastructure were compromised.
-
Backup integrity is uncertain, or backups may contain attacker persistence.
-
Systems are significantly outdated, and recovery offers an opportunity to modernize.
-
The time to validate backup cleanliness exceeds the time to rebuild.
A critical principle for recovery: do not decrypt and reuse encrypted data without validation. Victims sometimes assume that paying ransom and decrypting systems returns them to a clean state. This assumption is dangerous. Decrypted systems retain whatever attacker tools, persistence mechanisms, and compromised configurations existed before encryption. Decryption restores data accessibility but does not remove the attacker’s presence.
| Decrypting a system restores data accessibility but does not remove attacker tools, backdoors, or compromised configurations. Treat decrypted systems as compromised and validate or rebuild them before returning to production. |
Watching for Attacker Return
Ransomware victims face an elevated risk of re-attack, particularly if they paid the ransom. Payment establishes the organization as willing to pay, making it an attractive target for secondary ransom or extortion attacks from the same group or others who purchase victim lists.
Organizations should maintain heightened monitoring during and after recovery:
-
Enhanced detection rules based on TTPs observed during the incident.
-
Increased scrutiny of authentication activity, particularly for privileged accounts.
-
Network monitoring for command-and-control (C2) patterns similar to those used in the initial attack.
-
Regular hunting for indicators associated with the ransomware group that attacked the organization.
Re-ransoming attacks on victims who did not thoroughly eradicate the attacker’s access or address the root causes represent a common pattern. Recovery is not complete when systems are restored; it is complete when the organization has confidence that attacker access has been eliminated and the vulnerabilities that enabled the attack have been remediated.
| Paying ransom establishes the organization as willing to pay, making it an attractive target for repeat attacks. Recovery is not complete until attacker access is eliminated and the vulnerabilities that enabled the attack are remediated. |
Communication During Recovery
Ransomware recovery often extends for weeks or months, requiring sustained communication with multiple stakeholder groups. Unlike shorter incidents where a single status update may be all that is needed, ransomware response often requires ongoing communication management throughout an extended recovery period.
| In Stakeholder Communication, we covered broad stakeholder communication guidance. This section addresses ransomware-specific communication considerations. |
Internal Communication Efforts
Recovery progress updates keep leadership informed and help manage organizational expectations. Establish a regular cadence for internal updates, adjusting frequency based on recovery phase and stakeholder needs.
Leadership Updates
Executive leadership needs visibility into recovery progress, resource requirements, and timeline estimates.
These updates should focus on business impact, risk posture, and the decisions required, rather than on technical details.
Regular briefings (daily during active recovery, then transitioning to weekly) maintain leadership engagement without overwhelming executives with operational minutiae.
User Communication
Affected users need clear information about service availability, workarounds, and expected restoration timelines.
Be honest about timeline uncertainty rather than providing optimistic estimates that will be missed.
Users can adapt to known constraints more easily than they can to repeated delays in optimistic projections.
Recovery Team
Multiple teams typically participate in ransomware recovery, including infrastructure, applications, security, and business units.
Regular coordination meetings ensure teams remain aligned on priorities and dependencies.
Document decisions and assignments to prevent confusion during extended operations.
External Communication Efforts
External communication during ransomware incidents requires coordination between technical teams, legal counsel, communications staff, and executive leadership.
Regulatory Notifications
Ransomware incidents involving data exposure may trigger notification requirements under HIPAA, state breach notification laws, the GDPR, the Network and Information Security (NIS2) Directive, the Digital Operational Resilience Act (DORA), the 8-K market transparency report, or industry-specific regulations.
Work with legal counsel to identify applicable requirements and manage notification timelines.
Some regulations impose specific deadlines that must be tracked regardless of recovery status.
Customer and Partner Notifications
Customers and business partners may need to be notified of service disruptions, data exposure, or changes to business processes during recovery.
Coordinate these communications with legal counsel and communications staff to ensure consistent messaging.
Insurance Carrier Coordination
Contact the cyber insurance carrier as early as possible in the response, ideally before engaging third-party forensics firms or making significant response decisions.
Many cyber insurance policies include specific requirements regarding which vendors may be used, how evidence should be handled, and which actions require prior approval.
Organizations that engage outside counsel, sign forensic investigation contracts, or begin remediation work before notifying their carrier risk having those costs denied during the claims process.
Law Enforcement Engagement
If law enforcement is involved, coordinate communications to avoid compromising any ongoing investigation.
Law enforcement may request that certain details not be disclosed publicly.
Debrief
Ransomware incidents generate critical lessons about technical defenses, response procedures, and organizational resilience. The debrief phase is an opportunity to convert the stress and disruption of the incident into improvements that reduce the likelihood and impact of future attacks.
The stakes of a thorough debrief are high: documented cases of victims being re-ransomed by the same or similar threat actors demonstrate that organizations that fail to address root causes or thoroughly eradicate attacker access face an elevated risk of repeat incidents. Organizations that treat ransomware as a one-time crisis rather than a learning opportunity may find themselves responding to the same attackers again.
General debrief guidance, including facilitating After-Action Review (AAR) sessions, documentation requirements, and implementation tracking, is covered in Debrief Activity. This section focuses on ransomware-specific debrief considerations.
Ransomware-Specific Debrief Questions
Beyond the standard AAR questions covered in Conducting the After-Action Review, ransomware debriefs should address considerations unique to this incident type:
Backup and recovery assessment: Did backups survive the attack? If not, what architectural changes would have protected them? How did actual recovery time compare to RTO targets, and were those targets realistic? Did the organization have to accept data loss, and if so, what would have prevented it?
Dwell time analysis: How long were attackers present before encryption? What detection opportunities existed during that window? Could earlier detection have prevented encryption entirely, or at a minimum, reduced its scope?
Data exfiltration determination: Was the organization able to determine what data was accessed or exfiltrated? If not, what logging or monitoring gaps prevented that determination? How did uncertainty about data exposure affect notification decisions and stakeholder communications?
Ransom decision evaluation (if applicable): Did the organization’s ransom payment policy function as intended? Were decision makers prepared with the information they needed? If payment was made, did decryption work as expected? If payment was declined, was data publicly disclosed or sold on the dark web, and how did that affect the organization?
Extortion response: If the incident involved multi-vector extortion beyond encryption, how effectively did the organization respond to each pressure channel? Were legal, communications, and executive teams prepared to coordinate on non-technical threats like leak site postings or customer harassment?
Identity and privilege exposure: What privileged accounts were compromised? Did the organization have visibility into the full scope of credential exposure? Were break-glass procedures needed, and did they function correctly?
These questions help to focus on ransomware-specific lessons that generic incident debriefs may overlook.
Ransomware-Specific Metrics
Tracking ransomware-specific metrics supports the organization’s own improvement efforts, but there is significant value when these metrics are shared across organizations. When anonymized metrics are shared through ISACs, industry reports, and community forums, they contribute to a collective understanding of how ransomware attacks unfold and how effectively organizations are responding. Aggregated data on dwell times, TTPs, backup survival rates, and recovery methods across many incidents gives the broader security community the evidence needed to identify trends, calibrate defenses, and advocate for resources. Organizations that contribute to this shared knowledge base help improve ransomware resilience across their industry and beyond.
In addition to standard incident metrics examined in Getting Started (including Mean Time To Detect and Mean Time To Respond), ransomware incidents warrant tracking several measurements unique to this attack type. Table 5 lists several ransomware-specific metrics that organizations should consider tracking across incidents to evaluate their preparedness and response effectiveness.
| Consider these metrics as opportunities that may provide additional value to the organization, rather than requirements that should be tracked for every incident. Organizations should select the metrics that best align with their organizational priorities and data availability, and focus on consistently tracking them across incidents to identify trends and inform improvements. |
| Metric | Description | Value |
|---|---|---|
Attacker dwell time |
Time from initial access to encryption deployment |
Reveals the detection opportunity window where earlier identification could have prevented encryption |
Backup survival rate |
Percentage of backup systems and data that remained accessible and uncompromised |
Indicates whether backup architecture can withstand privileged attacker access |
Data exfiltration confidence |
Whether the organization could definitively determine what data was accessed (high/medium/low/unknown) |
Reflects logging and monitoring maturity and affects notification decision confidence |
Recovery method distribution |
Percentage of systems restored from backup versus rebuilt versus decrypted |
Informs future preparation investments and validates backup strategy effectiveness |
Encryption spread rate |
Systems encrypted per hour during active encryption |
Measures containment effectiveness and helps calibrate automated response thresholds |
These metrics help organizations evaluate ransomware-specific preparedness and identify where investments would have the greatest impact on future incident outcomes. Tracking these measurements across incidents reveals patterns that inform strategic decisions about detection capabilities, backup architecture, and containment procedures. Organizations that experience multiple ransomware incidents can use this data to validate whether improvements are delivering measurable results. Where possible, organizations should also share anonymized metrics with ISACs, sector partners, and community threat-sharing programs so that the broader security community can build on a larger dataset of real-world ransomware outcomes.
Final Considerations
Ransomware incidents test every aspect of an organization’s incident response capabilities. Organizations with strong technical defenses, well-practiced response teams, and resilient business processes fare best, but even the most prepared organizations face significant challenges. In this final section, we’ll examine several overarching considerations that apply across the ransomware response lifecycle.
The Human Element
Ransomware response is exhausting. Extended incidents spanning weeks or months create sustained pressure on response teams, IT staff, and leadership. Organizations should plan for personnel rotation, ensure adequate rest during extended operations, and provide support resources for staff experiencing burnout or stress. The best technical response procedures fail when the people executing them are too exhausted to function effectively. In ransomware incident response, the stakes are high, and mistakes are costly; leadership can help reduce the likelihood of errors by prioritizing team well-being.
| Just as we avoid single points of failure in high-value systems, we should avoid them in our response teams. Cross-training all team roles helps the organization avoid gaps in essential skills when key personnel are unavailable. |
Legal and Regulatory Complexity
Ransomware incidents increasingly intersect with complex legal and regulatory requirements. Data breach notification laws, industry-specific regulations, contractual obligations, and the potential for sanctions create a set of requirements that technical responders are not equipped to navigate on their own. Early engagement of legal counsel, ideally counsel with specific experience in ransomware incidents, helps ensure that response decisions do not create additional legal exposure.
AI as an Evolving Threat
Earlier sections of this chapter examined how AI is lowering the technical barrier for ransomware affiliates and improving the quality of social engineering campaigns. Those developments represent the early stages of a more fundamental shift in ransomware campaigns where AI is moving from an advisory role, where attackers consult it for guidance, to an operational one, where AI systems actively execute phases of an attack with minimal human direction.
Where we once made assumptions about the relationship between attacker skill and attack capability, these considerations are no longer accurate. Threat modeling in ransomware has relied on the idea that technically complex campaigns require technically skilled operators. With AI coding agents, minimally competent threat actors can access instant operational competence across reconnaissance, exploitation, lateral movement, and data exfiltration, creating new risks for organizations to consider.
AI Across the Attack Lifecycle
Threat actors are integrating AI throughout ransomware and extortion operations, not just for social engineering assets, but across the full attack chain. AI coding agents are actively executing attack phases rather than simply advising a human operator. Documented cases show AI conducting network scanning, credential harvesting, lateral movement, and data exfiltration with minimal human oversight (see also Autonomous Adversaries). [16]
The Anthropic November 2025 threat intelligence report documented a campaign in which AI performed an estimated 80 to 90 percent of the operations, with human decision-making required only four to six times per engagement. [17] A single operator with AI assistance can match the output of a team, conducting simultaneous operations against multiple organizations. Organizations should assume that even unsophisticated actors can execute technically complex campaigns.
AI-Optimized Extortion
Extortion revenue depends on the victim’s willingness to pay, which depends on how damaging disclosure would be and how credibly the attacker can demonstrate that damage. AI is automating both sides of this equation: identifying the most sensitive stolen data and calibrating the extortion approach to maximize payout.
After exfiltration, threat actors face a data analysis problem. Terabytes of stolen files need to be evaluated to determine which creates the most leverage for extortion. Previously, this required manual review, which limited both scale and speed. AI systems excel at systematically categorizing data by sensitivity, including PII, financial records, healthcare data, trade secrets, and regulatory-sensitive documents. These systems identify the content most likely to motivate payment. AI can also cross-reference stolen data against regulatory frameworks to identify specific notification obligations, penalties, and reputational risks the victim faces if data is disclosed. This turns raw, stolen data into actionable leverage for extortion.
Once sensitive data is identified, AI manages the extortion lifecycle from demand pricing through payment collection. The Anthropic August 2025 threat intelligence report documents cases in which AI analyzed victims' financials and generated "profit plans" with multiple monetization paths for each target: direct organizational extortion, data sales to third parties, individual targeting of people whose data was compromised, and regulatory threat leverage. [18] Ransom demands in the documented case ranged from $75,000 to $500,000, calibrated to each victim’s organizational size, industry, and regulatory exposure.
AI handles operational execution across concurrent campaigns as well, crafting psychologically targeted communications with incremental penalty structures, generating victim-specific ransom notes with exact financial figures and regulatory citations, and adapting strategy based on victim responses. A single actor can manage customized extortion campaigns against many organizations simultaneously, where previously this level of personalization required a dedicated team.
AI-Generated Ransomware Development
AI is democratizing the RaaS market by enabling actors without traditional development skills to create functional ransomware with advanced capabilities. Documented cases describe actors who cannot independently implement encryption algorithms or understand Windows system call (syscall) mechanics, yet produce and sell functional ransomware packages priced between $400 and $1,200. [19] These packages include ChaCha20 encryption, EDR evasion techniques such as FreshyCalls and RecycledGate, and anti-analysis capabilities. [20] [21]
AI allows attackers to iteratively refine their tooling through continued interaction with models, introducing new features and capabilities over time. Ransomware tooling progresses from basic encryption to advanced delivery and evasion as directed by the threat actor. As development barriers are eliminated, the RaaS ecosystem expands, increasing both the volume and variety of ransomware families that organizations will encounter.
Attribution complexity also increases as AI-generated code reflects patterns specific to the language model (e.g., Claude Sonnet 4.6 vs. GPT-5.3-Codex) rather than distinctive human coding styles. This makes it harder for analysts to link ransomware families to specific developers or groups based solely on code characteristics.
| Attribution is always challenging in ransomware, but AI-generated code adds new layers of complexity. |
AI for Defenders
The same AI capabilities that accelerate attackers can also accelerate defenders' actions. As we saw in Accelerating Incident Response with AI, AI can assist with preparation activities, accelerate the detection of IOCs, support containment and evidence collection, and facilitate the generation of recovery actions. AI tools grounded in organizational context, through playbooks supplied as skills or through Retrieval Augmented Generation (RAG), can assist analysts with response guidance tailored to the organization’s specific practices, procedures, and infrastructure.
The acceleration of ransomware capabilities through AI makes the preparation investments described throughout this chapter more important, not less. Organizations that build strong foundational defenses, including identity protection, backup resilience, and detection capabilities, create environments where AI-enhanced attacks are harder to execute, regardless of the attacker’s tooling. Preparation remains the most effective response to an evolving threat landscape.
Recovery Is Not the End
Technical recovery is an important milestone, but the impact on an organization following a ransomware incident often extends well beyond system restoration. When systems come back online and business operations resume, organizations often discover that the broader consequences continue across regulatory, legal, financial, and reputational dimensions.
Regulatory and Legal Exposure
Breach notification obligations trigger timelines that continue regardless of recovery status. Regulatory inquiries may extend for months as agencies evaluate the organization’s security practices and incident handling. If litigation follows, discovery and depositions can span years. Organizations should expect ongoing engagement with legal counsel well after technical teams have moved on to other priorities.
Insurance Resolution
Cyber insurance claims require extensive documentation and often involve negotiation over coverage scope. Carriers may dispute costs, question response decisions, or require additional evidence before approving claims. The claims process typically extends months beyond incident closure, requiring continued access to incident documentation and personnel who can speak to response decisions.
Stakeholder Confidence
Customers, partners, and board members who witnessed operational disruption will often want more than assurances that systems are restored. Demonstrating improved security posture through concrete investments, third-party assessments, or enhanced monitoring capabilities helps rebuild confidence over time. Organizations that communicate transparently about improvements often recover stakeholder trust more effectively than those that minimize the incident.
| The Blackbaud case illustrates the cost of understating breach severity. Initial notifications that downplay impact may seem protective in the moment, but when the full scope emerges later, stakeholders feel misled. Transparent communication, even when the news is difficult, builds more durable trust than optimistic messaging that later requires correction. |
Ongoing Extortion Risk
In double extortion scenarios, attackers retain copies of stolen data regardless of whether the organization pays. Ransom payment purchases a promise, not a guarantee. Threat actors may leak data despite receiving payment due to internal group conflicts, operational errors, or simple dishonesty. Data may also resurface months or years later when attackers sell access to other criminal groups, when group infrastructure is seized and data becomes public, or when former affiliates splinter into new operations.
Organizations that pay ransom should not assume the transaction closes the matter. Threats to release data may resurface if attackers believe additional pressure might yield further payment, or if the data finds its way to other criminal actors through underground marketplaces. Even when attackers honor their commitments initially, the organization has no way to verify that all copies of stolen data have been destroyed.
| An extortion payment purchases a promise from criminals, not a guarantee. Organizations have no way to verify that all copies of stolen data have been destroyed, and data may resurface months or years later. |
For these reasons, organizations should prepare communications plans and legal strategies for potential future data exposure regardless of whether ransom was paid. Stakeholder notification templates, regulatory response procedures, and customer communication strategies developed during the initial incident should remain accessible for potential reactivation. Legal counsel familiar with the incident should be available to advise if stolen data surfaces publicly months or years later.
Prevention Remains Essential
This chapter has focused on response to ransomware incidents, but prevention remains the most effective defense. Organizations that implement strong access controls, maintain current patching, deploy effective endpoint protection, and train employees to recognize social engineering are less likely to face a ransomware incident in the first place. The response capabilities described in this chapter are valuable, but they represent a fallback when prevention fails rather than a substitute for preventive controls.