HOW-TO GUIDE | SECURITY OPERATIONS
Active Threat12 min read

Ransomware Recovery Plan: How to Respond and Recover Without Paying

46%
Of organizations that pay ransom recover all their data
80%
Of payers are attacked again — often by the same group
$1.54M
Average ransomware recovery cost in 2024 (excluding ransom)
22 days
Average business downtime after a ransomware attack

Ransomware incidents follow a predictable playbook: initial access via phishing or exposed RDP, lateral movement to discover and compromise backup systems, exfiltration of sensitive data for double-extortion leverage, and then encryption of as many systems as possible before detection. The recovery process is similarly structured — organizations that plan and practice recovery procedures before an incident recover faster and pay less often than those that encounter ransomware for the first time during a live crisis.

This guide covers the complete recovery lifecycle: immediate response actions in the first hours, the containment and investigation phase, backup-based recovery procedures, decryption options, regulatory obligations, and the architectural changes that reduce exposure to the next attack.

Free daily briefing

Briefings like this, every morning before 9am.

Threat intel, active CVEs, and campaign alerts — distilled for practitioners. 50,000+ subscribers. No noise.

Immediate Response: The First 4 Hours

The first hours of a ransomware response determine whether the encryption spreads to additional systems or is contained. Speed and decision quality in this window matter more than any other factor.

First 30 minutes: Isolate affected systems immediately — disconnect from the network (physically if necessary) without powering off. Preserve evidence by leaving systems running; powering off destroys volatile memory that may contain encryption keys or attacker tooling. Alert your incident response team, legal counsel, and executive leadership. If you have an IR retainer, engage it now.

First 2 hours: Identify the blast radius — which systems are encrypted, which are still clean, which backups are intact or compromised. Check your most recent backup integrity before assuming recovery is possible. Preserve all logs from affected systems, network devices, and security tools before they rotate. Take forensic images of affected systems if resources allow. Identify patient zero and the initial access vector if possible.

First 4 hours: Make the containment decision — how much of the network do you isolate to stop spread versus keep operational for business continuity? Ransomware lateral movement often continues until fully detected, so default toward broader isolation if uncertain. Activate your business continuity plan for critical operations that cannot wait for full recovery.

Backup Integrity Validation and Recovery Decision

The first question that determines your recovery path is: are your backups intact? Sophisticated ransomware operators spend weeks in your environment specifically to find, corrupt, or encrypt your backup infrastructure before triggering encryption on production systems. Assuming your backups are usable without verification is a common mistake.

Backup validation checklist: Identify your most recent clean backup — check timestamps and compare with when you believe the initial compromise occurred. Verify backup integrity by attempting to restore a sample of files or a test system rather than trusting the backup catalog. Check whether backup software credentials were accessed or modified during the attacker's dwell time. Verify offline or immutable backups (tape, object-lock cloud storage, air-gapped systems) separately — these are the backups that ransomware operators cannot reach.

If backups are intact: Plan your recovery sequence (most critical systems first), validate your recovery time against your business continuity SLAs, and begin recovery from the cleanest backup environment you have — not from the compromised production environment. If backups are compromised: Check the No More Ransom project for available decryption tools before considering payment. Engage your cyber insurance carrier and legal counsel before making any payment decisions.

Decryption Options and the Ransom Payment Decision

Before considering a ransom payment, exhaust all decryption alternatives. The No More Ransom project (nomoreransom.org) maintains a database of free decryption tools for dozens of ransomware families. Ransomware variants with known decryptors include STOP/Djvu, REvil, Dharma, and many others. Check it first.

For novel ransomware families or when no decryptor is available: engage a specialist IR firm that may have insights or tools not publicly disclosed. Some firms (Emsisoft, Coveware, Mandiant) have developed private decryption capabilities for specific variants through law enforcement cooperation and ransomware group analysis.

If payment is under consideration: the decision requires legal counsel (OFAC sanctions prohibit payments to sanctioned ransomware groups including Conti, Evil Corp, and others — paying a sanctioned group creates federal legal exposure regardless of intent), your cyber insurance carrier (most policies have specific procedures that must be followed for ransom payments to remain covered), and executive/board authorization. Never pay without validating that the attacker actually has decryption capability — request a proof-of-decryption of a sample of non-sensitive files before any payment. Average ransom demands are routinely negotiable down 50–70% through intermediaries.

Recovery Sequencing and Rebuilding Securely

Recovery from backups requires more than restoring files — the environment was compromised, and restoration to the same architecture with the same vulnerabilities will result in reinfection, often within hours. Attackers frequently leave backdoors specifically for this purpose.

Secure recovery sequence: (1) Rebuild core infrastructure first — domain controllers, DNS, authentication systems — from known-good backups or fresh installations with hardened configurations. (2) Reset all credentials before bringing systems back online — every service account, every user account, every API key that existed during the attacker's dwell period. (3) Restore data (not entire system images) where possible — restoring system images risks restoring the attacker's persistence mechanisms along with legitimate data. (4) Validate each restored system against your baseline before reconnecting it to the network — endpoint security agents, patch levels, no unexpected startup items or scheduled tasks.

For systems that cannot be restored from backup, clean installation is safer than disinfection. Ransomware operators routinely install multiple persistence mechanisms; attempting to identify and remove them all is less reliable than a clean rebuild. Rebuild from a hardened baseline image, not from your pre-incident standard build that may reflect years of configuration drift.

Regulatory Obligations and Post-Incident Hardening

Ransomware incidents that involve personal data exfiltration trigger breach notification obligations in most jurisdictions. GDPR requires notification to the supervisory authority within 72 hours of becoming aware of a breach if the breach is likely to result in risk to individuals. US state laws vary — California, New York, and most other states have breach notification timelines ranging from 30 to 90 days. SEC rules (for public companies) require material cybersecurity incident disclosure within 4 business days.

Document the timeline of the incident from initial compromise to containment — this documentation is required for regulatory responses and litigation defense. Preserve all forensic evidence and logs. Engage privacy counsel as part of your incident response team from day one if personal data is potentially exposed.

Post-incident hardening priorities (based on most common ransomware entry and propagation paths): patch and disable RDP if not required, implement phishing-resistant MFA on all external-facing authentication, segment backup infrastructure to a network unreachable from workstations, implement network monitoring for lateral movement indicators, and review and restrict domain admin privileges to the minimum required accounts.

Subscribe to unlock Remediation & Mitigation steps

Free subscribers unlock full IOC lists, remediation steps, and every daily briefing.

The bottom line

Ransomware recovery without paying is achievable for organizations with intact, tested, offline backups. The organizations that recover fastest are those that practiced recovery before the incident — backup restoration drills and tabletop ransomware scenarios are not optional. If your backup strategy cannot survive a ransomware attack (no offline copies, no immutability, backups accessible from the same credentials as production), that gap is your highest-priority security investment before the next attack.

Frequently asked questions

Should I pay the ransom?

The decision requires legal counsel (OFAC sanctions may prohibit payment to specific groups), your cyber insurance carrier, and executive authorization. From a purely practical standpoint: 46% of organizations that pay recover all their data, 80% of payers are attacked again within a year, and payment does not prevent attackers from using exfiltrated data for extortion or sale. Exhaust free decryption options (No More Ransom project) and specialist IR firm assistance before considering payment.

How do ransomware groups typically access networks?

The most common initial access vectors are phishing emails with malicious attachments or links (approximately 40% of cases), exposed Remote Desktop Protocol (RDP) on internet-facing systems (approximately 30%), and exploitation of vulnerabilities in internet-facing software like VPNs, firewalls, and web applications (approximately 20%). The remaining 10% includes insider threats, supply chain compromises, and other vectors. Addressing these three vectors eliminates the majority of ransomware entry points.

How long does ransomware recovery take?

Average business downtime after a ransomware attack is 22 days, but this varies dramatically based on the scope of impact and backup integrity. Organizations with tested, offline backups for critical systems and documented recovery procedures recover in days rather than weeks. Organizations without prepared recovery plans, or whose backups were compromised, often face 3–6 weeks of partial operations followed by months of remediation work.

What is double extortion ransomware?

Double extortion is the practice of exfiltrating data before encrypting it, then threatening to publish the stolen data if the ransom is not paid. This approach (pioneered by Maze ransomware in 2019 and now standard practice) undermines the 'I have good backups so I do not need to pay' defense — even with perfect backups, organizations face data exposure risk if sensitive data was exfiltrated during the attacker's dwell period. This is why detecting and evicting attackers during the pre-encryption dwell phase is critical.

Sources & references

  1. CISA Ransomware Guide
  2. No More Ransom Project
  3. FBI Ransomware Prevention and Response

Free resources

25
Free download

Critical CVE Reference Card 2025–2026

25 actively exploited vulnerabilities with CVSS scores, exploit status, and patch availability. Print it, pin it, share it with your SOC team.

No spam. Unsubscribe anytime.

Free download

Ransomware Incident Response Playbook

Step-by-step 24-hour IR checklist covering detection, containment, eradication, and recovery. Built for SOC teams, IR leads, and CISOs.

No spam. Unsubscribe anytime.

Free newsletter

Get threat intel before your inbox does.

50,000+ security professionals read Decryption Digest for early warnings on zero-days, ransomware, and nation-state campaigns. Free, weekly, no spam.

Unsubscribe anytime. We never sell your data.

Eric Bang
Author

Founder & Cybersecurity Evangelist, Decryption Digest

Cybersecurity professional with expertise in threat intelligence, vulnerability research, and enterprise security. Covers zero-days, ransomware, and nation-state operations for 50,000+ security professionals weekly.

Daily Briefing

Get briefings like this every morning

Actionable threat intelligence for working practitioners. Free. No spam. Trusted by 50,000+ SOC analysts, CISOs, and security engineers.

Unsubscribe anytime.

Get tomorrow's threat briefing before your inbox does.