0 Comments

By Joe Seanor, CISSP | Cyber Investigator & Network Security Expert.

Most people think a ransomware attack starts with a lock screen and ends with a ransom note.

The truth? That’s step six in a much longer, more dangerous game.

When I respond to ransomware incidents, I don’t just look at the files that were encrypted. I look at the entire path the attackers took to get there. And what I find is always the same: a systematic, strategic process that follows a disturbingly predictable playbook.

Today, I’m going to show you exactly what cybercriminals do once they get into your network—so you can recognize the warning signs before it’s too late.

Step 1: Initial Access – The Quiet Entry

Attackers don’t kick down the door. They slip in quietly.

Common methods include:

  • Phishing emails with malicious attachments or links
  • Stolen credentials bought on the dark web
  • Exploiting vulnerabilities in VPNs, RDP, or unpatched servers

Once inside, they plant a backdoor or remote access tool (like Cobalt Strike or AnyDesk) to stay connected.

Step 2: Reconnaissance – Map the Network

Before making a move, attackers learn everything they can about the environment.

They:

  • Scan for open ports, shares, and admin accounts
  • Locate key systems: backups, domain controllers, file servers
  • Identify antivirus or EDR solutions to avoid detection

Think of this as building the blueprint for an inside job.

Step 3: Privilege Escalation & Lateral Movement

Now they start moving from machine to machine, collecting more access.

Tactics include:

  • Harvesting admin passwords from memory (via Mimikatz)
  • Using RDP to jump between systems
  • Leveraging Group Policy or PowerShell to deploy tools silently

In many cases I’ve investigated, attackers roamed undetected for weeks, preparing for maximum impact.

Step 4: Data Exfiltration – Steal Before You Lock

Here’s what most victims don’t realize:
Hackers steal your sensitive data before encrypting it.

They upload it to external servers or cloud drives:

  • HR files, financials, client contracts
  • Email archives and source code
  • Legal and compliance records

This is the “double extortion” phase—they’ll threaten to publish your data if you don’t pay

Step 5: Ransomware Deployment – Game Over?

Once they’ve taken everything they need, they trigger the encryption payload.

This is often done late at night or on a weekend to avoid detection.

Key actions:

  • Encrypt data across the network
  • Delete backups or snapshots
  • Drop ransom notes on every system

Suddenly, everything grinds to a halt—and the business faces a critical decision.

Step 6: The Ransom Demand

Now comes the shakedown.

Ransom demands can range from a few thousand to millions of dollars, payable in cryptocurrency. Attackers often:

  • Offer a “support line” via chat
  • Provide proof of decryption capabilities
  • Threaten to leak stolen data on public sites

Some even negotiate, lowering the price if you respond quickly.

The Psychological Game

It’s not just a technical attack—it’s psychological warfare.

Victims are:

  • Panicked about downtime
  • Afraid of reputational damage
  • Unsure what was taken or what’s safe

Hackers exploit this fear to pressure victims into paying quickly.

How to Disrupt the Ransomware Playbook

Stopping ransomware is about breaking the chain before the payload drops.

Protect Your Entry Points

  • Use strong email security and phishing training
  • Patch VPNs, RDP, and public-facing systems

Monitor for Recon and Lateral Movement

  • Deploy EDR/XDR tools with behavioral detection
  • Watch for unusual account logins or PowerShell activity

Segment Your Network & Secure Backups

  • Limit access to sensitive systems
  • Keep offline, immutable backups

Have an Incident Response Plan

  • Test your ransomware playbook—before you need it
  • Know who to call, what to isolate, and how to communicate

Final Thoughts: It’s Not Just Malware—It’s a Business

Modern ransomware groups operate like companies:

  • They outsource access to affiliates
  • They use help desks and SLAs
  • They invest in tooling and negotiation strategies

You need to treat ransomware like a hostile business takeover—and prepare accordingly.

Stay secure,

Joe Seanor

CISSP | Private Cyber security Consultant

Leave a Reply

Related Posts