Blogs

8 Steps To Take During A Ransomware Attack

How To Handle Ransomware

Youโ€™re just sitting at your desk, working hard, minding your own business when bam! An alarming red background takes over your screen. A message written in a threatening font tells you all your files are locked and demands you pay a hefty ransom in cryptocurrency, or your files are gone forever. Because your attackers were feeling extra dramatic, the message is signed with a skull and crossbones at the bottom. As soon as you see this, you will be tempted to panic, but try to take a deep breath and remain calm and collected. Yes, a ransomware attack can be devastating, but if you act immediately, you can mitigate some damage.

What exactly is Ransomware?

Ransomware is a malicious attack of malware that infects a computer or computer system and leaves your data locked (or encrypted) by anonymous cybercriminals. The attackers hold your locked data hostage until you pay the ransom for an encryption key that unlocks your files and restores your access.

Despite rising awareness of the risk, ransomware is a growing billion-dollar business and hackers have attacked nearly every industry, often with large ransoms and huge restoration costs. Even government agencies and entire countries arenโ€™t immune. In April 2022, cybercriminals attacked thirty government agencies in Costa Rica with ransomware, forcing the country to essentially shutdown and declare a state of emergency. It was a disaster they are still rebuilding from.

But itโ€™s not just the big guys at risk. Ransomware attacks affect small businesses too. Small businesses are often targeted because they do not budget for adequate security and backup measures.

The best defense against todayโ€™s advanced security threats is a good offense that outsmarts emerging threats while theyโ€™re still just threats. Ineffective firewalls, unmanaged email, and unprotected devices are behind most security breaches.

The attack typically starts at one workstation, which geeks like us call endpoints. Maybe you click unknowingly on an infected website or malicious email. The ransomware begins silently running in the background, looking for files to encrypt or other targets on your network. Once the ransomware encrypts everything it can, you will see that terrifying message letting you know they locked your files until you pay. So how should your company handle a ransomware attack?

 

Here are eight steps to take following a ransomware attack:

  1. Record the Attack

Take a photo of the ransomware note with your smartphone or camera. If possible, take a screenshot on the affected machine as well. This will help in filing police and insurance reports and maybe even help restore your data.

  1. Quarantine to Stop the Spread

Itโ€™s important to isolate the affected systems as soon as possible.ย  Disconnecting the affected computer helps stop the ransomware in its tracks. While it may have already infiltrated your network, you reduce the damage by isolating the system. Ransomware typically scans the target network and propagates laterally to other systems. If an infected computer is powered off and unplugged, itโ€™s not talking to anything else. This, of course, gets more complicated if multiple devices or servers are compromised.

  1. Call for Help

* Call your IT Department or MSP immediately and alert them to the attack. They will take care of the next steps.

* Call your Legal Counsel

* Call Law Enforcement. Ransomware is a crime and should be reported to local law enforcement authorities or the FBI. * Call your insurance company. You may be covered in this kind of situation.

If you do not have an IT department that is taking care of the remaining steps, you can call Liberty Technology to assist you in disaster recovery, or you can take care of the following steps:

  1. Disable Maintenance Tasks

You should immediately disable automated maintenance tasks on affected systems, such as temporary file removal and log rotation. This will prevent these tasks from interfering with files that might be useful for forensics and investigation analysis.

  1. Secure Backups

Most modern ransomware strains immediately go after backups to thwart recovery efforts. Secure your backups by disconnecting them from the rest of the network. You should also lock down access to backup systems until after the infection gets removed.

  1. Identify the Ransomware Strain & Look for Decryption tools.

To determine the ransomware strain, you can use free services such as Emsisoftโ€™s online ransomware identification tool or ID Ransomware. These services allow users to upload a sample of the encrypted file, any ransom note left behind, and the attackerโ€™s contact information, if available. The analysis of this information can identify the type of ransomware strain that has affected the userโ€™s files.

There are many decryption tools available online, such as No More Ransom. Once you know the strain you are dealing with, you can plug it into a website and search for the matching decryption. You may get a free key, and there is a slim chance that your files are not encrypted. Some ransomware attacks are merely an attempt to scare you into paying a ransom, even though the data is not actually encrypted.

  1. Clean the Slate

Once you have disconnected the affected systems from the network, change all online and account passwords. After the ransomware gets removed, you should once again change all the system passwords. Once a network has been infected, there is no way to guarantee that the ransomware is completely gone unless all devices are wiped clean. This includes virtual devices as well. Make sure all your devices are professionally wiped clean before using them again.

  1. Decide Whether or Not to Pay

Deciding to pay for ransomware is not a simple decision. Only pay for ransomware if you have exhausted all other options and losing data damages you or your company more than paying the ransom. Remember, youโ€™re dealing with criminals. There is no guarantee that you will recover your data; paying them only encourages more attacks. If you decide to pay the ransom, ask the attackers to prove that they can decrypt the files and negotiate a lower ransom if possible. Keep a cool head, and donโ€™t be rash. Again, your IT team or MSP can help you determine the severity of the attack and provide guidance on the best way to move forward.

Our Solution

As we said before, prevention is the best strategy. Liberty Technologyโ€™s approach to security is an aggressive risk-reduction strategy, giving you the visibility and insight you need to shut down security threats wherever they appear. Youโ€™ll also have peace of mind knowing that we are with you every step of the way to mitigate a ransomware attack.

While Liberty Technology provides IT disaster recovery and stands ready to assist you in a moment of crisis, we hope that day never comes. Taking preventative measures can drastically increase the probability that it never will. We provide state-of-the-art IT security for government organizations and companies across the healthcare, financial, manufacturing, retail, and education industries. Call us today!ย 

Back Next

Recent Blogs

How To Handle Ransomware

Windows 10 End of Support: What It Means for Your Business (and How DaaS + Section 179 Helps)

Microsoft has officially announced that Windows 10 will reach end of support on October 14, 2025. After that date, Microsoft will stop providing security updates, bug fixes, and technical support for Windows 10 devices. While your PCs wonโ€™t immediately stop working, continuing to use Windows 10 after that point exposes your organization to growing security, […]
Oct 1st, 2025
How To Handle Ransomware

AI, Compliance, & Cybersecurity

Artificial intelligence (AI) is no longer a futuristic idea. Itโ€™s here, and itโ€™s already transforming how businesses operate. From automation to analytics, AI can supercharge productivity and improve decision-making. But with this power comes a new layer of complexity, especially when it comes to compliance and cybersecurity risk management. Today, business leaders are not only […]
Sep 1st, 2025
How To Handle Ransomware

Are Your Employees Ready for AI-Powered Threats?

In todayโ€™s fast-evolving digital landscape, artificial intelligence (AI) is transforming industries โ€” and unfortunately, it’s also empowering cyber criminals. AI-powered threats are smarter, faster, and more sophisticated than ever, putting businesses of all sizes at greater risk. The question is: Are your employees ready to face these new challenges? At Liberty Technology, we understand that […]
Aug 4th, 2025
How To Handle Ransomware

AI & Cybersecurity: Friends or Foes?

Artificial Intelligence (AI) is changing the cybersecurity world faster than ever before. AI can be both a powerful defense tool and a potential new threat for businesses. To stay protected, itโ€™s important to understand how AI impacts your cybersecurity risk management strategy. AI can strengthen security by: Detecting threats and unusual activity in real-time, identifying […]
Aug 4th, 2025
How To Handle Ransomware

What Is Cybersecurity Risk Management?

In todayโ€™s digital landscape, cyber threats are more advanced and persistent than ever. Businesses must take proactive measures to protect their data, systems, and operations. Thatโ€™s where cybersecurity risk management comes in. If your business is looking for reliable cybersecurity risk management solutions, partnering with experts can help your business make informed, risk-based decisions around […]
Jun 1st, 2025
How To Handle Ransomware

What Is Network Security, and Why Is It Important?

In todayโ€™s digital landscape, protecting your business from cyber threats is no longer optional – itโ€™s critical. Network security refers to the tools, policies, and practices that keep your systems, data, and users safe from unauthorized access, misuse, and breaches. From small businesses to large enterprises, securing your network is foundational to safeguarding sensitive information […]
May 1st, 2025
How To Handle Ransomware

Liberty Technologyโ€™s CEO, Ben Johnson, Named a 2025 Webex Insider

Liberty Technology is proud to announce that our CEO, Ben Johnson, has been named a 2025 Webex Insider, an exclusive recognition awarded by Webex to IT leaders and collaboration experts driving innovation in the field. The Webex Insider program highlights professionals dedicated to shaping the future of hybrid work through cutting-edge communication and collaboration solutions. […]
Apr 10th, 2025
How To Handle Ransomware

What Is an MSP and How Does It Work?

In todayโ€™s fast-paced business world, managing IT infrastructure can be challenging, especially for small to mid-sized businesses. Thatโ€™s where a managed service provider (MSP) comes in. If youโ€™re a business in Georgia, looking for reliable IT solutions, partnering with a trusted MSP can help you streamline operations, enhance security, and reduce downtime.ย  What Is a […]
Apr 4th, 2025
How To Handle Ransomware

Cyber Insurance: What's Covered, What's Not, and How to Stay Protected

With cyber threats on the rise, businesses are increasingly turning to cybersecurity insurance to protect themselves from cyber incidents’ financial and operational impact. This type of insurance can be essential for organizations of all sizes, offering a safety net in case of data breaches, ransomware attacks, and other cyber risks. Liberty Technology works with businesses […]
Mar 3rd, 2025
How To Handle Ransomware

What to Expect During a Cybersecurity Risk Assessment

In todayโ€™s digital landscape, protecting your business from cyber threats is more critical than ever. A cybersecurity risk assessment (CSRA) is a crucial step in identifying vulnerabilities and strengthening your organizationโ€™s defenses. Liberty Technology offers comprehensive CSRA services to help businesses uncover risks and implement tailored solutions. Hereโ€™s what you can expect when partnering with […]
Jan 2nd, 2025
How To Handle Ransomware

2024 Highlights and Whatโ€™s Next

As we complete the last chapter of 2024, Liberty Technology is proud to reflect on a year of growth, community engagement, and exciting innovations. This year has been one for the books, from strengthening IT services to giving back to the communities we serve. Here’s a look back at what weโ€™ve accomplished and how weโ€™re […]
Dec 11th, 2024
How To Handle Ransomware

What is a vCIO?

In today’s fast-paced business world, having the right technology strategy can make all the difference. This is where a Virtual CIO (vCIO) comes into play. But what exactly is a vCIO, and how can virtual CIO services benefit your business?   Understanding the Role of a vCIO A vCIO, or Virtual Chief Information Officer, is […]
Nov 1st, 2024