The Colonial Pipeline Wasn't the Wake-Up Call — Your Last Backup Test Was
In February 2021, the Cybersecurity and Infrastructure Security Agency (CISA) issued renewed guidance on ransomware after a string of attacks against hospitals, schools, and local governments. The FBI's Internet Crime Complaint Center reported that ransomware complaints surged in 2020, with adjusted losses exceeding $29.1 million — and those are just the cases that got reported. If you're reading this, you either got hit or you're smart enough to plan before you do. These ransomware recovery steps are drawn from real incidents I've worked and studied, not theoretical frameworks gathering dust on a shelf.
This isn't a feel-good overview. It's a sequenced playbook — the specific actions you take in the first hours, first days, and first weeks after ransomware detonates in your environment. Every step matters. The order matters. Let's get into it.
Step 1: Isolate Everything — Speed Beats Perfection
The single most important thing you do in the first five minutes is contain the blast radius. Every second you delay, the ransomware encrypts more files, jumps to more shares, and touches more endpoints.
Here's what that looks like in practice:
- Disconnect infected machines from the network — pull the Ethernet cable, disable Wi-Fi. Don't power them off yet.
- Isolate network segments. If you have VLANs, use them. If you don't, unplug switches connecting affected departments.
- Disable shared drives and mapped network folders at the server level.
- Suspend any site-to-site VPN connections to prevent spread to branch offices or cloud environments.
I've seen organizations lose their entire backup infrastructure because the ransomware traversed a flat network and encrypted the NAS device sitting on the same subnet. Isolation isn't optional — it's the difference between recovering in days and recovering in months.
Don't Power Off — Here's Why
Your instinct will be to shut machines down. Resist it. Volatile memory (RAM) holds encryption keys, process lists, and network connection data that forensic teams need. Power off and you lose that evidence forever. Disconnect from the network, but leave the machines running until your incident response team advises otherwise.
Step 2: Assess the Scope and Identify the Variant
Once containment is underway, you need answers to three questions fast: What variant hit you? How far did it spread? What data is affected?
Check the ransom note filename and extension. Most variants leave identifiable artifacts — .ryuk, .lockbit, .conti, or custom extensions. Upload a sample of an encrypted file and the ransom note to No More Ransom, a project backed by Europol and major security firms. They maintain a database of known variants and, in some cases, decryption tools.
Map the damage:
- Which endpoints are encrypted?
- Which file servers and shares were affected?
- Are domain controllers compromised?
- Is Active Directory intact?
- Were backups touched?
This assessment drives every decision that follows. Document everything — screenshots, timestamps, file paths. Your cyber insurance carrier and law enforcement will want this.
Step 3: Activate Your Incident Response Plan (You Have One, Right?)
If you have a documented incident response plan, now is when it earns its keep. If you don't, you're improvising under pressure — and that's when expensive mistakes happen.
Key actions at this stage:
- Notify your incident response team — internal or external retainer.
- Contact your cyber insurance carrier immediately. Many policies have strict notification windows.
- Report the incident to the FBI's IC3 and your local FBI field office. They track threat actor infrastructure and may have decryption keys or intelligence on your specific attacker.
- Loop in legal counsel. If personal data was encrypted or exfiltrated, you may have breach notification obligations under state law or HIPAA.
The "Should We Pay?" Question
Every organization asks it. The FBI's official position is clear: don't pay. Payment funds criminal operations, doesn't guarantee decryption, and may violate OFAC sanctions if the threat actor is on the Treasury Department's sanctions list. In October 2020, the Treasury Department issued an advisory warning that facilitating ransomware payments to sanctioned entities could result in civil penalties.
That said, I've seen organizations with no viable backups and existential business pressure make the opposite choice. This is a decision for your executive team, legal counsel, and insurance carrier — not your IT department alone.
Step 4: Determine Backup Integrity — The Make-or-Break Moment
This is where your ransomware recovery steps either accelerate or grind to a halt. Your backups are either clean and accessible, or they're not. There's no middle ground.
Check these things immediately:
- Are backup repositories intact and unencrypted?
- Were backups stored offline or air-gapped?
- When was the last verified backup? Not scheduled — verified.
- Can you restore a test system from backup right now?
The Verizon 2020 Data Breach Investigations Report found that ransomware was involved in 27% of malware incidents. Yet in my experience, fewer than half of small and mid-size organizations regularly test their restores. Having backups is meaningless if you've never confirmed they actually work.
If your backups are clean, you have a path forward. If they're compromised or outdated, your options narrow dramatically.
Step 5: Eradicate the Threat Before You Restore Anything
Here's a mistake I see repeatedly: organizations rush to restore from backup before eliminating the attacker's foothold. The ransomware re-detonates within hours.
Before any restoration begins:
- Identify the initial access vector. Was it a phishing email? An exposed RDP port? A compromised VPN credential? The 2020 DBIR data showed that credential theft and phishing remain the dominant initial access methods for ransomware.
- Reset all compromised credentials — and assume more are compromised than you know. Reset domain admin passwords, service accounts, and any account with privileged access.
- Patch the vulnerability or close the access point that the threat actor exploited.
- Scan the environment with updated endpoint detection tools. Look for persistence mechanisms — scheduled tasks, registry run keys, secondary payloads.
If the attacker used a phishing email to gain initial access, your entire organization needs to understand what happened and why. Enroll your team in phishing awareness training for organizations before you finish recovery. The same vector will be used again — often within weeks.
Step 6: Restore Systems in Priority Order
Don't restore everything at once. Prioritize based on business impact:
- Tier 1: Active Directory, DNS, authentication infrastructure. Nothing works without identity.
- Tier 2: Email, core business applications, databases that drive revenue.
- Tier 3: File shares, secondary applications, user workstations.
Restore to clean hardware or freshly imaged machines when possible. Restoring to the same compromised hardware risks reinfection from boot-level or firmware-level persistence — rare but devastating when it happens.
Validate each restored system before connecting it back to the production network. Run integrity checks. Verify logs. Confirm that multi-factor authentication is enforced on every account before that system goes live.
What If You Don't Have Clean Backups?
Your options are limited but not zero. Check No More Ransom for decryptors. Contact the FBI — they sometimes obtain keys during investigations. Some incident response firms have relationships with threat actors and can negotiate (though this carries the ethical and legal risks mentioned above). As a last resort, some data may be reconstructable from shadow copies, cloud sync services, or email attachments.
Step 7: Harden Your Environment — This Is Not Optional
Recovery without hardening is just preparation for the next attack. The threat actor who hit you likely spent days or weeks inside your network before deploying ransomware. They mapped your environment, escalated privileges, and disabled security controls. You need to assume they know your infrastructure intimately.
Post-recovery hardening checklist:
- Implement network segmentation. Flat networks are ransomware playgrounds.
- Deploy multi-factor authentication on every remote access point — VPN, RDP, cloud admin portals, email.
- Adopt a zero trust posture: verify every user, every device, every session.
- Move to a 3-2-1 backup strategy: three copies, two different media types, one offsite and offline.
- Enable endpoint detection and response (EDR) on all endpoints, not just servers.
- Restrict administrative privileges ruthlessly. No user should have domain admin rights for daily work.
What Are the Most Critical Ransomware Recovery Steps?
The most critical ransomware recovery steps are, in order: (1) immediate network isolation to stop encryption spread, (2) assessment of the variant and scope of damage, (3) verification of backup integrity, (4) complete eradication of the threat actor's access before restoring, and (5) prioritized system restoration with post-recovery hardening. Skipping any of these steps — especially eradication before restoration — dramatically increases the chance of reinfection.
The Human Factor: Where Recovery Plans Actually Fail
I've reviewed dozens of post-incident reports. The technical recovery steps are rarely where things fall apart. It's the human layer. An employee clicks a phishing link. An admin reuses a password. A help desk technician disables MFA for a VIP who complained about the extra step.
The CISA Ransomware Guide emphasizes that security awareness training is a foundational control. Not because it stops every attack — no single control does — but because it reduces the probability of initial compromise through social engineering. And that initial compromise is where 90% of ransomware incidents begin.
Build cybersecurity awareness training into your recovery plan as a mandatory post-incident action. Run phishing simulations quarterly. Measure click rates over time and hold departments accountable. Security awareness isn't a checkbox — it's a continuous program that directly reduces your ransomware risk.
Your 72-Hour Ransomware Recovery Timeline
Here's a compressed timeline based on incidents I've studied and NIST's incident response framework:
- Hours 0-4: Isolate affected systems. Preserve volatile evidence. Activate incident response team. Notify insurance carrier and legal counsel.
- Hours 4-12: Identify the ransomware variant. Map the scope of encryption. Assess backup integrity. Report to FBI IC3.
- Hours 12-24: Begin eradication — close the initial access vector, reset credentials, scan for persistence. Make the pay/don't-pay decision with full stakeholder input.
- Hours 24-48: Begin prioritized restoration from verified clean backups. Validate each system before reconnecting.
- Hours 48-72: Restore secondary systems. Begin hardening measures. Schedule organization-wide security awareness briefing and phishing simulation.
This timeline compresses or expands based on your organization's size and preparedness. The point is sequencing — every phase depends on the one before it.
The Recovery Starts Before the Attack
The organizations that recover fastest from ransomware aren't the ones with the biggest IT budgets. They're the ones that tested their backups last month, trained their employees last quarter, and documented their incident response plan before they needed it.
Your ransomware recovery steps are only as strong as the preparation behind them. Test your restores. Segment your network. Train your people. And when — not if — ransomware hits your environment, you'll execute instead of panic.