Back to BlogCybersecurity

What to Do Immediately After a Ransomware Attack: A Step-by-Step Guide

April 4, 2026

Discovered ransomware on your business network? Follow this step-by-step incident response guide to contain the attack, minimize damage, and recover your systems safely. Time is critical.

You've just discovered ransomware on your business network. Your files are encrypted, systems are locked, and a ransom note demands payment in cryptocurrency. Your heart is racing, and you're wondering: What do I do right now?

The next 24 hours are critical. The actions you take immediately after discovering a ransomware attack will determine whether you recover quickly with minimal damage—or face weeks of downtime, data loss, and regulatory penalties.

This guide walks you through the exact steps to take, in order, when you're under attack.

Step 1: Isolate Infected Systems Immediately (Within 5 Minutes)

Time is your enemy. Modern ransomware spreads laterally across your network in minutes. Your first priority is containment.

What to do:

Critical: Many ransomware variants specifically target backups. If your backups are already encrypted, you've lost your primary recovery option.

Step 2: Activate Your Incident Response Team (Within 15 Minutes)

A ransomware attack is not a one-person job. You need a coordinated response across IT, management, legal, and potentially law enforcement.

Who to contact immediately:

If you don't have an incident response plan in place, contact Cloud Vanguard IT immediately. We provide emergency incident response services and can be on-site or remote within hours.

Step 3: Document Everything (Start Immediately)

From the moment you discover the attack, start documenting:

This documentation is critical for insurance claims, law enforcement investigations, and regulatory compliance reporting.

Step 4: Identify the Ransomware Variant (Within 1 Hour)

Knowing which ransomware strain hit you is crucial for understanding your options.

How to identify it:

  1. Look at the ransom note – Many variants identify themselves
  2. Check file extensions – Encrypted files often have unique extensions (.lockbit, .ryuk, .conti)
  3. Use ID Ransomware – Upload the ransom note and an encrypted file to id-ransomware.malwarehunterteam.com

Why this matters:

Check No More Ransom to see if a free decryption tool exists for your variant.

Step 5: Determine the Extent of Data Breach (Within 4 Hours)

Modern ransomware isn't just about encryption – it's also about data theft. Over 70% of ransomware attacks now involve data exfiltration before encryption (double extortion).

Investigate:

Critical: If regulated data (PII, PHI, financial records) was potentially exfiltrated, you have strict reporting deadlines:

Step 6: Assess Your Recovery Options (Within 6 Hours)

Now that you understand what you're dealing with, evaluate your recovery paths:

Option 1: Restore from Backups

This is always the preferred option if available.

Option 2: Free Decryption Tools

For certain ransomware variants, security researchers have developed free decryption tools.

Option 3: Pay the Ransom (Last Resort)

Payment should only be considered when:

Important: Paying doesn't guarantee decryption (about 20% of victims who pay never get working decryption keys). It also funds criminal operations and makes you a target for future attacks.

Step 7: Eradicate the Threat (Before Restoration)

Do not restore systems until the threat is completely removed. Ransomware actors often maintain persistent access even after initial deployment.

Eradication steps:

  1. Identify the initial access vector – Phishing email? RDP brute force? Vulnerability exploit?
  2. Find and remove all malware – Don't just remove the ransomware executable; look for backdoors, trojans, and other tools
  3. Reset all credentials – Every password, API key, and service account
  4. Patch vulnerabilities – Update all systems and close security gaps
  5. Rebuild compromised systems from clean images – In many cases, reimaging is safer than trying to clean infected systems
  6. Review and harden security controls – Implement lessons learned

Step 8: Restore Operations Carefully

Once the threat is eradicated, begin restoration in phases:

  1. Restore critical systems first – Prioritize based on business impact
  2. Test each system before bringing it online – Verify functionality and absence of malware
  3. Monitor intensively – Watch for signs of reinfection or persistent access
  4. Keep backups of encrypted data – Store offline for at least 6-12 months in case issues arise

Expect the restoration process to take days or weeks, not hours.

Step 9: Report to Authorities and Learn from the Incident

File a report with law enforcement:

Law enforcement reporting helps:

Conduct a post-incident review:

What NOT to Do During a Ransomware Attack

Prevention: Essential Protections for Your Business

The best ransomware response is prevention. Here are the seven essential protections every business needs:

  1. Immutable, offline backups – Following the 3-2-1 rule (3 copies, 2 different media, 1 offsite)
  2. Multi-factor authentication (MFA) – On all accounts, especially administrative access
  3. Email security and anti-phishing training – Most ransomware enters via email
  4. Endpoint Detection and Response (EDR) – Advanced threat detection beyond traditional antivirus
  5. Network segmentation – Limit lateral movement if attackers get in
  6. Regular patching and updates – Many attacks exploit known vulnerabilities
  7. Incident response plan – Tested and updated annually

Need Help Right Now? We're Here.

If you're currently dealing with a ransomware attack, contact Cloud Vanguard IT's emergency response team immediately. We provide:

Not currently under attack but want to ensure you're protected? Schedule a free ransomware risk assessment to identify your vulnerabilities before attackers do.

Related Resources

Get Started Today

Have an IT Question?

Our Ajax-based team is happy to help. No pressure, no sales pitch.

No commitment required — average response under 1 business hour.