{"id":19478,"date":"2022-10-25T20:00:00","date_gmt":"2022-10-25T20:00:00","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=19478"},"modified":"2023-03-20T20:51:42","modified_gmt":"2023-03-20T20:51:42","slug":"how-to-recover-from-a-ransomware-attack","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/threats\/how-to-recover-from-a-ransomware-attack\/","title":{"rendered":"How to Recover From a Ransomware Attack"},"content":{"rendered":"\n<p>Ransomware response and recovery can broken down into four steps:<\/p>\n\n\n\n<p>1. Isolate, Assess, Call for Help:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Call professionals and stakeholders:\n<ul class=\"wp-block-list\">\n<li>Call your<a href=\"https:\/\/www.esecurityplanet.com\/products\/cyber-insurance-companies\/\" target=\"_blank\" rel=\"noreferrer noopener\"> cybersecurity insurance provider<\/a>. They often require specific steps and vendors that supersede any other steps on this list or even the preferences of the victim organization.<\/li>\n\n\n\n<li>Call expert<a href=\"https:\/\/www.esecurityplanet.com\/products\/ransomware-removal-and-recovery-services\/\" target=\"_blank\" rel=\"noreferrer noopener\"> ransomware response professionals<\/a>. Most organizations do not have incident response or forensic staff and will need to call in expertise to stop the attack and recover systems and data.<\/li>\n\n\n\n<li>Call executives, attorneys, and law enforcement that may need to authorize or document the next steps.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>Stop the attack:\n<ul class=\"wp-block-list\">\n<li>Break the access of the attackers to the device under attack.<\/li>\n\n\n\n<li>Stop the processes executing the ransomware (if still active).<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>Determine the type of attack to determine the options for recovery.<\/li>\n<\/ul>\n\n\n\n<p>2. Recover what can be recovered, replace what cannot be recovered.<\/p>\n\n\n\n<p>3. Apply lessons-learned and block future attacks.<\/p>\n\n\n\n<p>4. Revise (or create) the ransomware incident response plan.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>1. Isolate, Assess, Call for Help<\/strong><\/h2>\n\n\n\n<p>The initial incident response requires the team to perform several tasks nearly simultaneously. Not only must the attack be contained and assessed, the team might also need to let stakeholders, executives, authorities, and insurance companies know about the attack.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Insurance Evaluation and Insurer Notification<\/h3>\n\n\n\n<p>Organizations with insurance policies need to first consider if they will involve their insurance company. Insurers often will require specific steps to be followed to fulfill the claims process.<\/p>\n\n\n\n<p>If lucky, the attack may be small enough that no cyber insurance claim may need to be filed. For example, an attack on a single machine or a simple ransomware attack involving a limited number of users. An attack of such minor impact may not even need to involve executives or other stakeholders because of the limited damage to the organization.<\/p>\n\n\n\n<p>However, in the case of a broad, sophisticated or<a href=\"https:\/\/www.esecurityplanet.com\/threats\/advanced-persistent-threat\/\" target=\"_blank\" rel=\"noreferrer noopener\"> Advanced Persistent Threat (APT)<\/a> attack, damages will be significant. Cybersecurity insurers often strictly outline the steps permitted in order to qualify for reimbursement and in larger attacks, the insurance company should be one of the first calls.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Professional Assistance<\/h3>\n\n\n\n<p>Few internal IT and security teams maintain expertise in incident response and forensics. Internal teams can usually handle recovery from limited attacks, but sophisticated attacks require professional help. Engineers from incident response,&nbsp; forensic, <a href=\"https:\/\/www.esecurityplanet.com\/products\/mssp\/\" target=\"_blank\" rel=\"noreferrer noopener\">managed IT security services<\/a>, and <a href=\"https:\/\/www.esecurityplanet.com\/products\/top-mdr-solutions\/\" target=\"_blank\" rel=\"noreferrer noopener\">managed detection and response<\/a> specialists can determine the full extent of the attack, stop the attack, and aid in recovery..&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Isolate the Attack<\/h3>\n\n\n\n<p>Assuming no instructions to the contrary from insurers, the first step is to contain the damage. Whether using internal specialists or professional assistance, the incident response team will cut off network and internet access for the affected devices (computer, server, etc.), network segment, or office. If necessary, the organization can shut down all networks for the organization to stop the spread.<\/p>\n\n\n\n<p>Shutting down all networks is an extreme step and should not be taken lightly. Not only will normal operations suffer, but full shutdown can lead to other consequences such as:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Lost Business<\/li>\n\n\n\n<li>Reputational damage<\/li>\n\n\n\n<li>Organization-specific risks such as:\n<ul class=\"wp-block-list\">\n<li>Disabled refrigeration monitoring for a seafood distributor<\/li>\n\n\n\n<li>Impaired service for a emergency call center<\/li>\n\n\n\n<li>Impaired health outcomes for a hospital<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<p>Also keep in mind that isolating either specific devices or the organization as a whole will prevent remote access so responding IT teams will need to go onsite \u2013 which will increase time and money required for the recovery.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Ransomware Assessment<\/h4>\n\n\n\n<p>Next, assess the direct damage from the ransomware and evaluate the potential reach of the attack. Some ransomware attacks automatically launch when someone clicks a<a href=\"https:\/\/www.esecurityplanet.com\/threats\/phishing-attacks\/\" target=\"_blank\" rel=\"noreferrer noopener\"> phishing<\/a> link and will be more simple to remediate because the source of the attack can be quickly identified and the extent of the damage rapidly assessed.<\/p>\n\n\n\n<p>Other attacks only launch after attackers have significantly penetrated the environment, accessed many different systems, downloaded company information, and deleted backups. In the latter case, the <a href=\"https:\/\/www.esecurityplanet.com\/threats\/advanced-persistent-threat\/\" target=\"_blank\" rel=\"noreferrer noopener\">advanced persistent threat<\/a> (APT) nature of the attack will not be stopped by isolating affected devices and more advanced methods will be required to eliminate the threat.<\/p>\n\n\n\n<p>Also see:<a href=\"https:\/\/www.esecurityplanet.com\/products\/best-backup-solutions-for-ransomware-protection\/\" target=\"_blank\" rel=\"noreferrer noopener\"> <strong>Best Backup Solutions for Ransomware Protection<\/strong><\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>2. Recover What Can Be Recovered<\/strong><\/h2>\n\n\n\n<p>Once the active attacks are contained, the team can then turn to recovery of the systems and the data. Some simple ransomware cases can be handled by in-house teams because of their limited scope and damage.<\/p>\n\n\n\n<p>Larger attacks involve exponentially more complexity and variance, and unwinding an APT attack will require deep forensic investigation of the systems, logs, and possibly even the backups. Most organizations need to reach out to service providers to obtain suitable experts for this type of recovery.<\/p>\n\n\n\n<p>The high variance of ransomware attacks and response easily exceeds what we can cover in an article, so we will limit the rest of this article\u2019s focus to a limited, manageable scope involving automated ransomware striking only a handful of endpoint computers. This example will still provide an overview of the basic steps of ransomware recovery at a high level without going into the more technical details involved in broader threat hunting processes necessary for sophisticated attacks.<\/p>\n\n\n\n<p><strong>Also read:<\/strong><a href=\"https:\/\/www.esecurityplanet.com\/threats\/how-one-company-survived-ransomware\/\" target=\"_blank\" rel=\"noreferrer noopener\"> How One Company Survived a Ransomware Attack Without Paying the Ransom<\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>How Long Does it Take to Recover from Ransomware?<\/strong><\/h3>\n\n\n\n<p>Short answer: It depends. The high variance of the types of attacks and the characteristics of the environment prevent easy estimation of ransomware recovery time.<\/p>\n\n\n\n<p>However, the variables that affect recovery time consist of:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Available Backups<\/strong>: The&nbsp; better an organization protects their backups,&nbsp; the faster the recovery of the data can be performed.&nbsp;<\/li>\n\n\n\n<li><strong>Backup Quality and Scope:<\/strong> The more frequent the backups occur can minimize how much data will be lost from an attack. However, in APT attacks, data corruption might be extensive and long term and require restoration from older recovery dates. System backups (operating systems, installed software, etc.) can also speed up recovery time for instances where APT actors corrupted local settings and software.<\/li>\n\n\n\n<li><strong>Ransomware Attack Sophistication<\/strong>: Complex, long-term attacks might open persistent back doors on unaffected systems or even in backups. The more sophisticated the attack, the longer it takes to unroot them from the systems.<\/li>\n\n\n\n<li><strong>Extent of the Damage<\/strong>: The more systems affected, the more time it takes to recover. Additionally, the deeper ransomware attackers penetrate into each system, the faster costs will escalate for investigation and recovery.\n<ul class=\"wp-block-list\">\n<li>If only data is affected, reloading data can be simple (although time consuming).&nbsp;<\/li>\n\n\n\n<li>If the ransomware infects the operating system and the registry the system software may need to be entirely reloaded.&nbsp;<\/li>\n\n\n\n<li>If the ransomware infects memory on the motherboard, recovery may not be possible and the entire system, including hardware, may need to be replaced.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Incident Response Team<\/strong>: The quality (skill, experience, familiarity with ransomware incident response, etc.) of a team can affect the speed of stopping the attack and the recovery time. The size of the team also matters for extensive attacks involving a high number of devices.<\/li>\n\n\n\n<li><strong>Recovery Tools<\/strong>: Some<a href=\"https:\/\/www.esecurityplanet.com\/products\/best-ransomware-removal-tools\/\" target=\"_blank\" rel=\"noreferrer noopener\"> ransomware recovery tools<\/a> can speed up the recovery process, but it depends upon the type of ransomware attack.<\/li>\n\n\n\n<li><strong>Outside Influence<\/strong>: Recovery can be straightforward, but cybersecurity insurance providers and law enforcement may require evidence to be gathered, which can delay recovery processes. Internal payment and approval procedures can also take time away from recovery if these processes are not approved in advance. Lastly, active attackers can further disrupt recovery if they continue to have access to the network or use<a href=\"https:\/\/www.esecurityplanet.com\/networks\/how-to-stop-ddos-attacks-tips-for-fighting-ddos-attacks\/\" target=\"_blank\" rel=\"noreferrer noopener\"> Distributed Denial of Service (DDoS)<\/a> attacks to distract the incident response teams.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Simple Ransomware Recovery<\/strong><\/h3>\n\n\n\n<p>Ransomware typically announces its presence by locking the victim\u2019s computer with a message screen with the ransom instructions. This will provide information regarding the type of ransomware infecting the computer and provide some guidance regarding the next steps.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Ransomware Decryption<\/h4>\n\n\n\n<p>If we are lucky, a google search for the specific ransomware on the screen may yield free <a href=\"https:\/\/www.esecurityplanet.com\/threats\/free-ransomware-decryption-site-threats-emerge\/\" target=\"_blank\" rel=\"noreferrer noopener\">decryption tools<\/a>, but beware of&nbsp; or through <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-ransomware-removal-tools\/\" target=\"_blank\" rel=\"noreferrer noopener\">anti-ransomware tools<\/a> that remove the ransomware and fully restore the system and files. Unfortunately, as covered in<a href=\"https:\/\/www.esecurityplanet.com\/networks\/decrypt-ransomware-encrypted-files\/\" target=\"_blank\" rel=\"noreferrer noopener\"> <strong>How to Decrypt Ransomware Files<\/strong><\/a>, the recovery of ransomware encrypted files has a low success rate.&nbsp;<\/p>\n\n\n\n<p>The decryption difficulty stems from:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>poor encryption that garbles files<\/li>\n\n\n\n<li>unavailable decryption algorithms<\/li>\n\n\n\n<li>attacks that intentionally corrupt or delete files&nbsp;<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\">Ransom Payment (Not Recommended)<\/h4>\n\n\n\n<p>Some organizations may be tempted to pay a ransom. Organizations that depend on uptime such as hospitals, law enforcement, or emergency services have mandates to be available and responsive that go beyond simple financial considerations. Deaths associated with ransomware are rare, but <a href=\"https:\/\/www.washingtonpost.com\/politics\/2021\/10\/01\/ransomware-attack-might-have-caused-another-death\/\" target=\"_blank\" rel=\"noreferrer noopener\">at least one death<\/a> is directly associated with a ransomware attack and roughly 25% of healthcare providers noted <a href=\"https:\/\/www.healthcaredive.com\/news\/quarter-providers-mortality-rates-rise-after-ransomware-attack\/607095\/\" target=\"_blank\" rel=\"noreferrer noopener\">an increase in mortality rates<\/a> following ransomware attacks.<\/p>\n\n\n\n<p>Unfortunately, there are three big <strong>reasons not to pay a ransom<\/strong>.<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>The <a href=\"https:\/\/www.fbi.gov\/scams-and-safety\/common-scams-and-crimes\/ransomware\" target=\"_blank\" rel=\"noreferrer noopener\">FBI discourages payment<\/a>. If we need law enforcement cooperation later, it may not help to have gone against their published advice.<\/li>\n\n\n\n<li><a href=\"https:\/\/home.treasury.gov\/system\/files\/126\/ofac_ransomware_advisory.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">U.S. Treasury sanction violations<\/a>: The Office of Foreign Assets Control (OFAC) issued an advisory reminding companies that payments to entities under sanction may trigger significant penalties. Some ransomware actors operate within sanctioned countries (Iran, North Korea, etc.) and others have been sanctioned as separate entities (terrorists, organized crime, etc.).<\/li>\n\n\n\n<li><a href=\"https:\/\/nakedsecurity.sophos.com\/2021\/04\/27\/ransomware-dont-expect-a-full-recovery\/\" target=\"_blank\" rel=\"noreferrer noopener\">It doesn\u2019t work<\/a>. Sophos conducted a survey and found that of victims who paid the ransom:\n<ol class=\"wp-block-list\">\n<li>4% paid and received no decryption keys<\/li>\n\n\n\n<li>8% paid and were able to fully recover<\/li>\n\n\n\n<li>92% of those who paid did not fully recover their systems.<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n\n\n\n<h4 class=\"wp-block-heading\">Restoration from Backups<\/h4>\n\n\n\n<p>Full recovery of our systems will test the quality and thoroughness of our backup processes. We will need to go back far enough to locate data and OS system backups free of malware, but the further back we need to go, the more work product that could be lost. Our preparation prior to the attack will be critical to our data recovery success.<\/p>\n\n\n\n<p>Hopefully, backups can be accessed through System Restore. If we know the date of the infection, we can roll back the computer to a system restore point prior to the infection, which should automatically remove the ransomware, clean the registry, and restore the operating system.<\/p>\n\n\n\n<p>If we are unlucky, a sophisticated ransomware attack encrypted or deleted any backup files and system restore points. In this case, we may need to completely wipe the system and reinstall all software.<\/p>\n\n\n\n<p>While it is possible to manually restore systems instead of wiping them, this time-consuming process requires a deep understanding of Windows Registry to carefully examine it to remove any lingering infections. Generally, this option consumes too much time to be practical and will be much more expensive than wiping the computers.<\/p>\n\n\n\n<p>Once the system has been cleaned, we still have to restore the data itself from backup. Keep in mind that some backups may be of corrupted data so incident response teams may need to go through multiple backups until they find clean data. Any changes made since the last clean backup will probably be lost.<\/p>\n\n\n\n<p><em>Further reading on ransomware protection and recovery<\/em>:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.esecurityplanet.com\/products\/ransomware-removal-and-recovery-services\/\" target=\"_blank\" rel=\"noreferrer noopener\">Best Ransomware Removal and Recovery Services<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.esecurityplanet.com\/products\/best-ransomware-removal-tools\/\" target=\"_blank\" rel=\"noreferrer noopener\">Best Ransomware Removal Tools<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.esecurityplanet.com\/products\/best-backup-solutions-for-ransomware-protection\/\" target=\"_blank\" rel=\"noreferrer noopener\">Best Backup Solutions for Ransomware Protection<\/a><\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>3. Conduct Post-Attack Tasks<\/strong><\/h2>\n\n\n\n<p>Whether we can restore our systems ourselves or we must hire incident response specialists, fully recovering our systems from an attack only marks the start of the process. We will also need to:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Deal with other ransomware attack issues<\/li>\n\n\n\n<li>Report to regulators and stakeholders<\/li>\n\n\n\n<li>Apply lessons learned<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Deal With Other Ransomware Attack Issues<\/strong><\/h3>\n\n\n\n<p>Many ransomware gangs have adopted the tactic of exporting sensitive data prior to triggering the ransomware attack and extorting the victim company with the threat of publicly releasing their data. If exfiltration has occurred, what types of data was stolen?<\/p>\n\n\n\n<p>Depending upon the type of data affected, a full <a href=\"https:\/\/www.esecurityplanet.com\/products\/digital-forensics-software\/\" target=\"_blank\" rel=\"noreferrer noopener\">forensic investigation<\/a> of the attack may need to be performed to gather evidence for criminal prosecution or to defend the organization from civil and regulatory action. Complex attacks involving more than one ransomware attacker or more than one exfiltration will increase the time and headaches involved in resolving the issues.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Report to Regulators and Stakeholders<\/strong><\/h3>\n\n\n\n<p>The theft of regulated data<a href=\"https:\/\/www.esecurityplanet.com\/networks\/security-compliance\/\" target=\"_blank\" rel=\"noreferrer noopener\"> protected by law<\/a> will trigger reporting requirements regarding the full extent of personal information, credit card data, healthcare information, or other protected data accessed, breached, or publicly released. Once the type of breached data is known, legal counsel will determine what types of internal and external reports may be required.<\/p>\n\n\n\n<p>IT teams also need to work with legal counsel and executives to determine the required internal reports and the timing and content of information released to authorities, affected parties, or the public. Even if not required by law, breached customer data may trigger contractual and moral obligations to report the extent of the breach to the affected parties.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Apply Lessons Learned<\/strong><\/h3>\n\n\n\n<p>Once the recovery is complete and required reports are delivered, our incident response teams need to perform a post mortem analysis. The method of attack must be reviewed to determine how to prevent such attacks in the future.<\/p>\n\n\n\n<p>Often this will be referred to as a Lessons Learned report and it should cover:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>What security was bypassed to allow the ransomware attack, such as<a href=\"https:\/\/www.esecurityplanet.com\/products\/best-secure-email-gateways\/\" target=\"_blank\" rel=\"noreferrer noopener\"> email screening<\/a> or<a href=\"https:\/\/www.esecurityplanet.com\/products\/top-ngfw\/\" target=\"_blank\" rel=\"noreferrer noopener\"> firewall<\/a> security<\/li>\n\n\n\n<li>What adjustments have been made or could be made to existing security<\/li>\n\n\n\n<li>What additional security controls must be added or what new security tools may need to be installed.<\/li>\n<\/ul>\n\n\n\n<p>Some organizations may not have the budget or time to immediately address all issues, so unaddressed issues will also need to be evaluated for risk to the organization. For example, it may not be practical to prevent <a href=\"https:\/\/www.esecurityplanet.com\/threats\/phishing-attacks\/\" target=\"_blank\" rel=\"noreferrer noopener\">phishing attacks<\/a> from leading to future ransomware attacks, but the organization may decide to<a href=\"https:\/\/www.esecurityplanet.com\/trends\/exfiltration-data-in-use-encryption\/\" target=\"_blank\" rel=\"noreferrer noopener\"> encrypt<\/a> more data or block email access from critical systems to limit the future risk to the organization.<\/p>\n\n\n\n<p>Additionally, the team will want to analyze their response to the attack to determine if improvements need to be made to the incident response plan (or to create an incident response plan). Common issues encountered in this process are incorrect phone numbers, obsolete IP addresses, or broken recovery processes.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>4. Create or Revise the Ransomware Incident Response Plan<\/strong><\/h2>\n\n\n\n<p>Preparation remains the key to successful ransomware recovery. An organization must:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Prepare a good backup policy and procedure<\/li>\n\n\n\n<li>Prepare a good good incident response policy and procedure<\/li>\n\n\n\n<li>Install layered ransomware security<\/li>\n\n\n\n<li>Test security and policies for effectiveness<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Prepare Policies to Protect Against Ransomware<\/strong><\/h3>\n\n\n\n<p>Some IT professionals dismiss policies as words on paper that protect nothing. The validity of that complaint depends upon the organization. Organizations that use the policies to enact procedures and to set the tone of the organization will enjoy more benefits from policies than organizations that just go through the motions for compliance check boxes.<\/p>\n\n\n\n<p>Backup policies should include the type of backup (full data, changed data, full system), frequency (daily, monthly, quarterly), retention period (60 days, six months, etc.), and the location of the backup (on the device, in connected network repositories, offline, etc.). Best practices recommend three backups with at least one backup offsite and offline to prevent an attacker\u2019s access.<\/p>\n\n\n\n<p>For an <a href=\"https:\/\/www.esecurityplanet.com\/networks\/incident-response-how-to-prepare-for-attacks-and-breaches\/\" target=\"_blank\" rel=\"noreferrer noopener\">incident response plan<\/a> or policy, we must be honest about our valuable assets, our security capabilities, and our team\u2019s ability to respond to an incident. The key is functionality. A robust plan that cannot be executed by our team is worthless.<\/p>\n\n\n\n<p>The plan does not require sophistication or even technical ability. It could simply be a list of different types of incidents (power outage, ransomware attack, etc.) and important numbers to call for each type of incident such as incident response experts, an attorney, key executives, insurance contacts, and so on.<\/p>\n\n\n\n<p>Some attorneys will recommend specific processes that require their involvement. These recommendations hope to extend the protection of privilege to the work product and communication of the process so that it cannot be introduced as evidence in future lawsuits.<\/p>\n\n\n\n<p>The incident response plan may also need to involve the CFO. Purchasing limitations that may normally require extended processes with multiple signatures may need to be bypassed with pre-approved budgets and vendors that would be triggered in the event of an attack.<\/p>\n\n\n\n<p>Ideally, any cybersecurity insurance policy requirements should also be determined and added to the incident response plan. The more accurate the information, the smoother the process will be executed and the less risk of mistakes during an incident.<\/p>\n\n\n\n<p>All policies should be reviewed periodically as well as after an event to revise or update the policies as needed.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Install Layered Ransomware Security<\/strong><\/h3>\n\n\n\n<p>When installing layered security we need to focus on the most likely target and the most likely attack paths.<\/p>\n\n\n\n<p>We must cover the basics. A <a href=\"https:\/\/www.esecurityplanet.com\/networks\/how-to-implement-zero-trust\/\" target=\"_blank\" rel=\"noreferrer noopener\">zero-trust architecture<\/a> with continuous authorization might be the preferred option for some, but a traditional security framework can provide adequate security for many.<\/p>\n\n\n\n<p>The classic approach of a <a href=\"https:\/\/www.esecurityplanet.com\/products\/top-ngfw\/\" target=\"_blank\" rel=\"noreferrer noopener\">modern firewall<\/a>, robust <a href=\"https:\/\/www.esecurityplanet.com\/threats\/how-to-recover-from-a-ransomware-attack\/\" target=\"_blank\" rel=\"noreferrer noopener\">network security<\/a>, and advanced <a href=\"https:\/\/www.esecurityplanet.com\/products\/edr-solutions\/\" target=\"_blank\" rel=\"noreferrer noopener\">endpoint security<\/a> would be reasonable. We should <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-encryption-software\/\" target=\"_blank\" rel=\"noreferrer noopener\">encrypt<\/a> data at rest. We should use <a href=\"https:\/\/www.esecurityplanet.com\/mobile\/multi-factor-authentication\/\" target=\"_blank\" rel=\"noreferrer noopener\">multi-factor authentication<\/a>.<\/p>\n\n\n\n<p>Budgets and IT capabilities may limit how much security we can afford to deploy, but not all security costs a fortune. Many of us ignore the embedded options and features of our current operating systems and software that can significantly reduce the effectiveness of attacks.<\/p>\n\n\n\n<p>This is particularly true of server protection, where, as Symantec Endpoint Security VP and General Manager Adam Bromwich notes, \u201ctraditionally IT has not turned on all the protection technologies available to them. They have become a weak point that attackers are exploiting.\u201d<\/p>\n\n\n\n<p>\u201cLay of the land\u201d attacks that exploit legitimate tools, such as <a href=\"https:\/\/www.esecurityplanet.com\/threats\/powershell-source-of-third-of-critical-security-threats\/\" target=\"_blank\" rel=\"noreferrer noopener\">PowerShell<\/a>, WMI and PsExec, add to that insecurity. Symantec has added <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-user-and-entity-behavior-analytics-ueba-tools\/\" target=\"_blank\" rel=\"noreferrer noopener\">behavioral blocking<\/a> around such tools and <a href=\"https:\/\/www.esecurityplanet.com\/endpoint\/sandboxing-advanced-malware-analysis\/\" target=\"_blank\" rel=\"noreferrer noopener\">sandboxing<\/a>, and the Broadcom company\u2019s new Adaptive Protection tool shuts down processes that aren\u2019t in use, further hardening systems and disrupting the attack chain.<\/p>\n\n\n\n<p>\u201cBy the time you can react to an EDR alert, it is too late,\u201d Bromwich told <em>eSecurity Planet<\/em>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Planning and Testing<\/strong><\/h3>\n\n\n\n<p>Testing involves periodic checks of our security, processes, and procedures.<\/p>\n\n\n\n<p>First, we must verify that our security has been correctly installed and is functioning. Internal assessments are okay, but can miss critical issues our team did not consider.<\/p>\n\n\n\n<p>Paying for third-party assessments and <a href=\"https:\/\/www.esecurityplanet.com\/networks\/penetration-testing\/\" target=\"_blank\" rel=\"noreferrer noopener\">penetration tests<\/a> can provide fresh thinking and a level of assurance for stakeholders such as customers, the board of directors, and the cybersecurity insurance company. Penetration tests and vulnerability scans may also be required to comply with various regulations (PCI DSS, etc.).<\/p>\n\n\n\n<p>Our processes and procedures will often be planned in advance, but may overlook critical data or steps. Tabletop exercises and drills to go through the processes and procedures ensure our staff confidently can smoothly execute them should a ransomware attack or other incident occur.<\/p>\n\n\n\n<p>It can also be wise to ensure that all employees in the company receive and understand the incident response policy. Intermedia surveyed employees and estimated that <a href=\"https:\/\/www.intermedia.com\/press-release\/as-ransomware-attacks-grow-in-sophistication-both-employees-and-employers-are-paying-ransoms-in-record-numbers\" target=\"_blank\" rel=\"noreferrer noopener\">59% personally paid<\/a> to recover from ransomware rather than admit to becoming a victim. However, our IT teams need to make sure that the malware has been removed from the system and we can only do that if we are informed about the attack.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Bottom Line<\/h2>\n\n\n\n<p>The best way to recover from a<a href=\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-protection\/\" target=\"_blank\" rel=\"noreferrer noopener\"> ransomware<\/a> attack is to execute a carefully practiced<a href=\"https:\/\/www.esecurityplanet.com\/networks\/incident-response-how-to-prepare-for-attacks-and-breaches\/\" target=\"_blank\" rel=\"noreferrer noopener\"> incident response plan<\/a>. However, many organizations have no plan at all. Instead, they not only have to conduct recovery steps with no planning or preparation, they also need to figure out those steps under immense pressure.<\/p>\n\n\n\n<p>While the recovery steps are the same, a written plan enables a security team to be much better prepared. A security team that practices a plan gains even more benefits because they can respond to attacks faster, with fewer mistakes, and with better results.<\/p>\n\n\n\n<p>All organizations should take steps to prepare for future ransomware attacks so that when an attack arrives, they will be prepared and react quickly, effectively, and comprehensively to limit damage.<\/p>\n\n\n\n<p><strong>Read next:<\/strong><a href=\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-protection\/\" target=\"_blank\" rel=\"noreferrer noopener\"> Ransomware Prevention: How to Protect Against Ransomware<\/a><\/p>\n\n\n<div id=\"ta-campaign-widget-66d6f8fae0f40-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6f8fae0f40\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6f8fae0f40\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6f8fae0f40\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6f8fae0f40\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6f8fae0f40\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6f8fae0f40\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Ransomware response and recovery can broken down into four steps: 1. Isolate, Assess, Call for Help: 2. Recover what can be recovered, replace what cannot be recovered. 3. Apply lessons-learned and block future attacks. 4. Revise (or create) the ransomware incident response plan. 1. Isolate, Assess, Call for Help The initial incident response requires the [&hellip;]<\/p>\n","protected":false},"author":271,"featured_media":25571,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[15],"tags":[2478],"b2b_audience":[33,35],"b2b_industry":[],"b2b_product":[394,383,378,395,31790,392],"class_list":["post-19478","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-threats","tag-ransomware","b2b_audience-awareness-and-consideration","b2b_audience-implementation-and-support","b2b_product-email-security","b2b_product-encryption-data-loss-prevention","b2b_product-endpoint-security","b2b_product-firewalls-and-intrusion-prevention-and-detection","b2b_product-ransomware","b2b_product-web-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to Recover From a Ransomware Attack: Recover Your Data<\/title>\n<meta name=\"description\" content=\"Ransomware is a type of malware that encrypts your files and holds them hostage until you pay a ransom. Here&#039;s what to do if you&#039;re a victim.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/threats\/how-to-recover-from-a-ransomware-attack\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Recover From a Ransomware Attack: Recover Your Data\" \/>\n<meta property=\"og:description\" content=\"Ransomware is a type of malware that encrypts your files and holds them hostage until you pay a ransom. Here&#039;s what to do if you&#039;re a victim.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/threats\/how-to-recover-from-a-ransomware-attack\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-25T20:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-20T20:51:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/REvil-screen-message.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1502\" \/>\n\t<meta property=\"og:image:height\" content=\"343\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Chad Kime\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chad Kime\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"15 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/how-to-recover-from-a-ransomware-attack\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/how-to-recover-from-a-ransomware-attack\/\"},\"author\":{\"name\":\"Chad Kime\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/86e8ee2d3bc71af07dbe303d16f17dc9\"},\"headline\":\"How to Recover From a Ransomware Attack\",\"datePublished\":\"2022-10-25T20:00:00+00:00\",\"dateModified\":\"2023-03-20T20:51:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/how-to-recover-from-a-ransomware-attack\/\"},\"wordCount\":3305,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/how-to-recover-from-a-ransomware-attack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/REvil-screen-message.png\",\"keywords\":[\"ransomware\"],\"articleSection\":[\"Threats\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/how-to-recover-from-a-ransomware-attack\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/threats\/how-to-recover-from-a-ransomware-attack\/\",\"name\":\"How to Recover From a Ransomware Attack: Recover Your Data\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/how-to-recover-from-a-ransomware-attack\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/how-to-recover-from-a-ransomware-attack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/REvil-screen-message.png\",\"datePublished\":\"2022-10-25T20:00:00+00:00\",\"dateModified\":\"2023-03-20T20:51:42+00:00\",\"description\":\"Ransomware is a type of malware that encrypts your files and holds them hostage until you pay a ransom. Here's what to do if you're a victim.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/how-to-recover-from-a-ransomware-attack\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/threats\/how-to-recover-from-a-ransomware-attack\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/how-to-recover-from-a-ransomware-attack\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/REvil-screen-message.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/REvil-screen-message.png\",\"width\":1502,\"height\":343},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/how-to-recover-from-a-ransomware-attack\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Recover From a Ransomware Attack\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/86e8ee2d3bc71af07dbe303d16f17dc9\",\"name\":\"Chad Kime\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/2023-Kime-HeadShot-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/2023-Kime-HeadShot-150x150.jpg\",\"caption\":\"Chad Kime\"},\"description\":\"eSecurity Planet lead writer Chad Kime covers a variety of security, compliance, and risk topics. Before joining the site, Chad studied electrical engineering at UCLA, earned an MBA from USC, managed 200+ ediscovery cases, and helped market a number of IT and cybersecurity products, then transitioned into technical writing policies and penetration test reports for MSPs and MSSPs. In his free time, Chad enjoys walks on the beach with his wife, annoying his children, and trying to carve out time for movies, books, video games, and bike rides.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/chad-kime\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Recover From a Ransomware Attack: Recover Your Data","description":"Ransomware is a type of malware that encrypts your files and holds them hostage until you pay a ransom. Here's what to do if you're a victim.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/threats\/how-to-recover-from-a-ransomware-attack\/","og_locale":"en_US","og_type":"article","og_title":"How to Recover From a Ransomware Attack: Recover Your Data","og_description":"Ransomware is a type of malware that encrypts your files and holds them hostage until you pay a ransom. Here's what to do if you're a victim.","og_url":"https:\/\/www.esecurityplanet.com\/threats\/how-to-recover-from-a-ransomware-attack\/","og_site_name":"eSecurity Planet","article_published_time":"2022-10-25T20:00:00+00:00","article_modified_time":"2023-03-20T20:51:42+00:00","og_image":[{"width":1502,"height":343,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/REvil-screen-message.png","type":"image\/png"}],"author":"Chad Kime","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Chad Kime","Est. reading time":"15 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/threats\/how-to-recover-from-a-ransomware-attack\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/how-to-recover-from-a-ransomware-attack\/"},"author":{"name":"Chad Kime","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/86e8ee2d3bc71af07dbe303d16f17dc9"},"headline":"How to Recover From a Ransomware Attack","datePublished":"2022-10-25T20:00:00+00:00","dateModified":"2023-03-20T20:51:42+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/how-to-recover-from-a-ransomware-attack\/"},"wordCount":3305,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/how-to-recover-from-a-ransomware-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/REvil-screen-message.png","keywords":["ransomware"],"articleSection":["Threats"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/threats\/how-to-recover-from-a-ransomware-attack\/","url":"https:\/\/www.esecurityplanet.com\/threats\/how-to-recover-from-a-ransomware-attack\/","name":"How to Recover From a Ransomware Attack: Recover Your Data","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/how-to-recover-from-a-ransomware-attack\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/how-to-recover-from-a-ransomware-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/REvil-screen-message.png","datePublished":"2022-10-25T20:00:00+00:00","dateModified":"2023-03-20T20:51:42+00:00","description":"Ransomware is a type of malware that encrypts your files and holds them hostage until you pay a ransom. Here's what to do if you're a victim.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/how-to-recover-from-a-ransomware-attack\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/threats\/how-to-recover-from-a-ransomware-attack\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/threats\/how-to-recover-from-a-ransomware-attack\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/REvil-screen-message.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/REvil-screen-message.png","width":1502,"height":343},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/threats\/how-to-recover-from-a-ransomware-attack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"How to Recover From a Ransomware Attack"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/86e8ee2d3bc71af07dbe303d16f17dc9","name":"Chad Kime","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/2023-Kime-HeadShot-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/2023-Kime-HeadShot-150x150.jpg","caption":"Chad Kime"},"description":"eSecurity Planet lead writer Chad Kime covers a variety of security, compliance, and risk topics. Before joining the site, Chad studied electrical engineering at UCLA, earned an MBA from USC, managed 200+ ediscovery cases, and helped market a number of IT and cybersecurity products, then transitioned into technical writing policies and penetration test reports for MSPs and MSSPs. In his free time, Chad enjoys walks on the beach with his wife, annoying his children, and trying to carve out time for movies, books, video games, and bike rides.","url":"https:\/\/www.esecurityplanet.com\/author\/chad-kime\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/19478"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/271"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=19478"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/19478\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/25571"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=19478"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=19478"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=19478"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=19478"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=19478"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=19478"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}