Ransomware Attack: What Happens Next?
Your screen shows a ransom demand. Your files are encrypted. Here's the step-by-step reality of ransomware recovery.
It's 9 AM on a Tuesday. You open your laptop and instead of your desktop, you see a red screen demanding Bitcoin payment to unlock your files. Every document, spreadsheet, and photo is now encrypted with a random extension like '.locked' or '.crypted'. Welcome to a ransomware attack.
This guide explains exactly what happens during recovery - the timeline, the decisions, and the costs involved.
Hour 0-1: Discovery and Containment
What's happening:
- Users report they can't open files
- IT discovers ransom notes across network shares
- Panic sets in
What should happen:
- Disconnect affected devices from the network immediately
- Do NOT turn them off (forensic evidence may be in memory)
- Isolate backup systems if they're network-connected
- Alert your IT provider (or us) immediately
- Document everything - screenshot ransom notes, note which systems are affected
Critical decision: Do NOT pay the ransom yet. Many attackers lie about decryption, and payment may violate sanctions laws if the attackers are in certain countries.
Hours 1-4: Assessment
What we're doing:
- Identifying the ransomware variant (determines if decryption is possible)
- Checking if backups are intact and unencrypted
- Determining the scope of encryption (one PC? The whole network?)
- Looking for the entry point (how did they get in?)
Questions we'll ask:
- When were your last verified backups?
- Were any users working from unusual locations?
- Has anyone clicked suspicious links or attachments recently?
- Do you have cyber insurance?
Hours 4-24: Decision Time
Scenario A: You Have Good Backups
If backups are recent, verified, and stored offline (or immutable cloud storage), recovery is straightforward:
- Wipe affected systems completely
- Reinstall operating systems from scratch
- Restore data from backup
- Reset all passwords
- Implement additional security controls
Expected timeline: 2-5 business days for full recovery, depending on data volume.
Scenario B: Backups Are Missing or Encrypted
This is the nightmare scenario. Options become limited:
- Check for free decryption tools at No More Ransom
- Engage a professional negotiator (some reduce demands by 50-80%)
- Accept data loss and rebuild from scratch
- Pay the ransom (last resort, no guarantees)
Expected timeline: Weeks to months. Some businesses never fully recover.
Days 2-7: Recovery Operations
For good backup scenarios:
*Day 2:* New hardware arriving, systems being rebuilt *Day 3:* Core systems restored (email, primary applications) *Day 4:* User workstations being re-imaged *Day 5:* Data restoration from backup (this takes time for large volumes) *Days 6-7:* Testing, verification, user acceptance
What users experience:
- Working from personal devices or temporary laptops
- Limited access to historical data during restoration
- Frustration and productivity loss
- Password resets for every system
The Hidden Costs
The ransom is often the smallest cost. Real expenses include:
- Downtime: Average 21 days of significant disruption
- IT response: Emergency rates for recovery work
- Lost revenue: Can't process orders, invoice clients, or access customer data
- Reputation damage: Clients lose trust
- Regulatory fines: If personal data was exfiltrated (increasingly common)
- Increased insurance premiums: Some policies don't renew after a claim
Average total cost for UK SMBs: £150,000 - £500,000 (including downtime)
The Prevention Checklist
Every item on this list would have helped:
- ā Offline/immutable backups tested regularly
- ā Email filtering to catch phishing
- ā Endpoint Detection & Response (EDR) not just antivirus
- ā Multi-Factor Authentication on all accounts
- ā Staff training on phishing awareness
- ā Patching within 14 days of critical updates
- ā Network segmentation to limit lateral movement
- ā Cyber insurance with incident response coverage
This is exactly what our Managed IT Support with Cyber Security provides.
Should You Pay the Ransom?
This is a business decision, not an IT decision. Factors to consider:
Arguments against paying:
- No guarantee of decryption (30% of payments don't result in working keys)
- Funds criminal organisations
- May violate sanctions (OFAC/HM Treasury) depending on attacker origin
- Makes you a target for repeat attacks
- May not delete stolen data anyway
Arguments for paying (as last resort):
- Business survival depends on data
- No viable backup alternative
- Insurance covers the payment
- Professional negotiators can verify attacker credibility
Our advice: The best ransomware recovery is one you never need. Invest in prevention and backup infrastructure today.
Next Steps
If you're reading this before an attack:
- Test your backups - can you actually restore from them?
- Review our Cyber Security services
- Consider Cyber Essentials certification
If you're reading this during an attack:
- Call us immediately: 01584 517 234
- Don't turn off affected computers
- Don't pay anything without professional advice
Is Your Email a Security Risk?
90% of cyber attacks start with email. Where do you stand?
True story: A local business lost £42,000 when a staff member replied to a fake "invoice" email that looked like it came from their regular supplier. The email had bypassed their basic spam filter.
Answer 8 questions to find out how protected you really are against email-based attacks.
Real Performance Stats
Live data from our helpdesk right now.
Worried About Your Security?
Get a free security review. We'll check your vulnerabilities and show you exactly what needs fixing.
You May Also Like
The Backup Test 60% of Businesses Fail
Your backups are running. Green lights everywhere. But when did you last test a restore? The answer often reveals an uncomfortable truth.

Cyber Essentials vs Cyber Essentials Plus: Which Do You Actually Need?
Standard or Plus? One is a self-assessment, the other is a technical audit. Here's how to decide which certification is right for your business.

Christmas IT Survival Guide 2025
It's 9 PM on Boxing Day. You've had a sherry. You check your work email. Big mistake. Here is why the 'Sherry Scroll' is a security nightmare, and how to fix it.
