Guide
Respond to a ransomware attack
Emergency response guide for ransomware attacks. Covers immediate containment, recovery options, reporting requirements, and ransom payment decisions. For businesses currently under attack or preparing for potential incidents.
- Disconnect affected systems from the network - pull cables, disable Wi-Fi
- Do NOT turn off computers - preserves forensic evidence
- Do NOT pay the ransom - payment does not guarantee recovery
- Report immediately to Report Fraud (0300 123 2040) or Police Scotland (101)
- Report to NCSC at report.ncsc.gov.uk for technical guidance
Ransomware encrypts your files and demands payment for their return. It is the most acute cyber threat facing UK businesses - the NCSC responds to 35-40 incidents per week, with 71% targeting small businesses.
Speed matters. The first hours determine whether you can recover your business.
1. Contain the attack immediately
Stop ransomware spreading to more systems. Every minute of delay means more encrypted files.
-
Disconnect affected computers from the network
Unplug ethernet cables and disable Wi-Fi on systems showing ransomware signs (ransom message, encrypted files, unusual file extensions). Do NOT turn computers off - this preserves evidence.
-
Disconnect shared drives and cloud storage
Network drives, NAS devices, and cloud sync services (OneDrive, Dropbox) are prime targets. Disconnect them immediately.
-
Isolate backup systems
Disconnect backup storage from the network immediately. Many ransomware variants target backups to prevent recovery.
-
Alert IT support and warn staff
Contact IT immediately. Tell all staff to stop using computers until given the all-clear.
2. Assess and report
Identify what is affected and report to the relevant authorities.
-
Document affected systems
Check each computer and server for ransom notes, files with unusual extensions (.locked, .encrypted), or files that will not open.
-
Check whether backups are intact
Test backups using a clean computer - do NOT connect backup drives to potentially infected systems.
-
Identify the ransomware variant
The ransom note often identifies the strain. Check nomoreransom.org for free decryption tools.
-
Preserve evidence
Photograph ransom messages. Keep logs of what happened and when. Do not delete files.
Report data breaches to the ICO
Ransomware encrypting personal data is a breach under UK GDPR. You may need to notify the ICO within 72 hours.
3. Recovery options
In order of preference:
Option A: Restore from backups (preferred)
- Verify backups are clean before restoring
- Rebuild systems from scratch - ransomware may have left backdoors
- Patch systems before reconnecting to the network
Option B: Use a free decryption tool
- Check nomoreransom.org - a legitimate project providing free tools for many ransomware families
- Do not pay for tools from unknown sources - many are scams
Option C: Rebuild without data recovery
- Wipe systems and reinstall. Rebuild data from paper records and other sources
- Painful but sometimes faster than waiting for decryption
4. The ransom payment decision
The NCSC and law enforcement strongly advise against paying. Understand the risks:
- No guarantee of recovery: Criminals may not provide working keys or may demand more
- Funds crime: Payment finances future attacks
- Makes you a target: Paying organisations are often attacked again
- May be illegal: Paying groups on UK sanctions lists is a criminal offence
- Data may still be sold: Attackers often copy data before encrypting
Sanctions risk
Many ransomware groups are linked to sanctioned entities. Before any payment, check the UK sanctions list and seek legal advice.
5. Recovery and prevention
After the crisis, focus on safe recovery and preventing recurrence.
-
Rebuild properly
Ensure systems are clean. Change all passwords. Enable multi-factor authentication. Apply all security updates before reconnecting.
-
Monitor for reinfection
Watch for unusual activity. Attackers may have established persistent access.
-
Conduct post-incident review
How did they get in? What failed? Document lessons and implement improvements.
-
Strengthen backups
Implement offline or immutable backups. Test restoration regularly.
Financial services firms
FCA/PRA-regulated firms must notify regulators of material cyber incidents. Follow your operational resilience procedures.
NHS organisations
Notify NHS England and your Caldicott Guardian. NIS-designated organisations must report within 72 hours.
6. Getting help
Consider professional support if you lack IT security expertise, the attack affects critical systems, or you need help with evidence preservation.
The NCSC maintains a list of Cyber Incident Response (CIR) Assured Service Providers - vetted companies for incident response. Your cyber insurance may also provide incident response services.
Before an attack happens
If reading this guide proactively:
- Implement offline or immutable backups and test restoration
- Enable multi-factor authentication for remote access and admin accounts
- Keep systems patched - apply updates within 14 days
- Train staff on phishing (90% of attacks start this way)
- Create an incident response plan