Blog ยท Engineering & Security
๐Ÿ”ง Engineering & Security

Inside Ransomware: Lessons from the Defense Industry

I worked for over seven years in the ransomware defense industry. I've sat across the table from companies who lost decades of operational data. I've watched FBI agents take notes while CEOs cried. I've also watched companies who'd done the boring work survive incidents that would have ended a less prepared business.

Most public writing about ransomware oversimplifies it as "they clicked a bad link, then everything got encrypted." That's not quite right. Modern ransomware is a multi-stage, multi-week operation. Understanding the stages is the first step to defending against it.

Anatomy of a modern ransomware attack

Four stages, in roughly this order: initial access โ†’ lateral movement โ†’ exfiltration โ†’ detonation. Each can take days or weeks. The encryption everyone fears is the final 30 minutes of a 4-week operation. By the time you see the ransom note, the attacker has been in your network so long they could find your CEO's mistress in the email archives.

Stage 1: Initial access

Three vectors dominate:

  1. Phishing with credential theft (still #1)
  2. Unpatched perimeter appliances โ€” VPN concentrators, firewalls, Exchange servers
  3. Compromised credentials from previous breaches, sold on dark-web marketplaces

The attackers don't need to find your credentials specifically. They run scripts that try every leaked credential against every common service. If you reused a password from a 2019 breach, you're already on a list.

Stage 2: Lateral movement

Once inside one machine, the attacker pivots. Standard moves:

This is where flat networks die. If every server can talk to every other server on every port, lateral movement is trivial. Network segmentation alone slows attackers by days.

Stage 3: Data exfiltration

Modern ransomware groups practice double extortion: they encrypt your files and steal a copy first. Even if you have perfect backups, they leak your data unless you pay.

This stage is often visible in your network traffic. A typical attack might exfiltrate 200GBโ€“2TB to a cloud storage service over 1โ€“3 days. If you have egress monitoring on your firewall and a baseline of normal traffic, this anomaly is detectable. Most companies don't, so it isn't.

Stage 4: Detonation

The encryption itself takes minutes to hours per host, run in parallel across the network. Modern ransomware encrypts only file headers (not full contents) to spread fast. By morning, every machine you own is locked, and the same ransom note is on every screen.

Detonation is timed for maximum business pain โ€” Friday at 6pm, the night before a holiday, the eve of a quarterly close. They've researched you. They know your fiscal calendar.

The 90-minute rule
In most incidents I worked, the time between "first weird log entry" and "every file encrypted" was 4โ€“14 days. The time between "someone noticed something weird" and "everything was encrypted" was usually under 90 minutes. Speed of detection matters more than anything else.

Why backups fail

Companies who think they're protected because they have backups discover, mid-incident, that:

Immutable backups (write-once, read-many) on a separate authentication realm are the only kind of backup that survives a modern attack. This is now a baseline expectation, not a luxury.

Should you pay?

Three perspectives:

The right answer is "you should never have to make this decision" โ€” which means doing the prevention work in advance. By the time the question comes up, you've already lost.

Prevention playbook

The prevention list overlaps heavily with the cybersecurity fundamentals:

Response playbook

You will know within the first 10 minutes whether your team has done this drill. If they haven't, the first hour will look like every other unprepared response โ€” panicked phone calls, conflicting decisions, lost time. Have this written down before you need it:

  1. Don't power off encrypted machines. Forensics needs memory.
  2. Isolate at the network level (pull the upstream switch, not the workstation cable).
  3. Call your cyber insurance carrier. They have an approved IR firm ready and will pay for it.
  4. Call legal counsel. Notification timelines start now.
  5. Preserve logs from anywhere they exist โ€” domain controllers, firewalls, EDR consoles, cloud audit logs.
  6. Do not communicate with attackers until your IR firm tells you to.
  7. Engage law enforcement via IC3.gov or your local FBI field office.

The companies who survived ransomware events with their business intact almost always had a written plan, drilled twice a year, with everyone's role clear. The companies who didn't survive were improvising while their phones rang nonstop.


djEnterprises offers tabletop drills, network architecture review, and incident-response plan authoring as part of consulting โ€” directly informed by years inside the industry. Book a call if you want a security-focused engagement.

Sources & References
  1. CISA โ€” Ransomware Guide
  2. FBI IC3 โ€” Internet Crime Complaint Center
  3. MITRE โ€” ATT&CK Framework
  4. OFAC โ€” Ransomware-related sanctions
  5. Sophos โ€” State of Ransomware Report