Network

Home / ACC Tip / Ransomware immediate steps

Victim of cybercriminals? Report your incident to help prevent further attacks.

Ransomware immediate steps

Ransomware is one of the most disruptive types of cyberattacks. It locks files, blocks access to systems, or threatens to leak stolen data unless a payment is made.

When ransomware appears, the first minutes matter. Quick, structured action can reduce damage and prevent the attack from spreading.

Follow these immediate steps if you suspect ransomware on a device or network.


Step 1: Disconnect the Device Immediately

The first priority is stopping the spread.

Disconnect the affected device from all networks:

  • Turn off Wi Fi
  • Unplug Ethernet cables
  • Disable Bluetooth connections
  • Disconnect external drives if possible

Ransomware can spread to shared folders and network devices. Isolation is critical.


Step 2: Do Not Shut Down Immediately

In many cases, investigators need system data to understand what happened.

Avoid:

  • Restarting repeatedly
  • Attempting random fixes
  • Deleting files without documentation

Instead, pause and preserve the system state.

If the device is actively encrypting files, then shutting it down may be necessary.


Step 3: Identify the Scope of the Infection

Determine what is affected.

Check:

  • Other computers on the network
  • Shared storage drives
  • Cloud sync folders
  • Backup systems

If multiple devices show ransom messages or locked files, the attack may have spread.


Step 4: Document What You See

Before taking further action, capture evidence.

Record:

  • Screenshots of ransom messages
  • File extensions added to encrypted files
  • Folder structures affected
  • The ransom note file

Do not edit or modify the files.

This information can help security teams identify the ransomware strain.


Step 5: Disconnect Backup Systems

If backups are connected to the infected system, disconnect them immediately.

Some ransomware attempts to encrypt:

  • External backup drives
  • Network attached storage
  • Cloud synced folders

Protect backups before the infection spreads further.


Step 6: Notify the Appropriate Team

If the device belongs to an organization:

  • Contact your IT or security team immediately
  • Report the incident internally
  • Follow company incident response procedures

If it is a personal device, consider contacting cybersecurity support services.

Early reporting improves containment.


Step 7: Do Not Pay the Ransom Immediately

Paying does not guarantee recovery.

Some attackers:

  • Never provide decryption keys
  • Demand additional payment
  • Leak data anyway

Recovery options may exist through backups or security research.

Evaluate options carefully before considering payment.


Step 8: Check Available Backups

If clean backups exist:

  • Verify they are not infected
  • Confirm backup timestamps
  • Restore only after the system is confirmed clean

Never connect backups to an infected system before containment.


Step 9: Scan and Rebuild Systems

After containment:

  • Perform full security scans
  • Remove malicious software
  • Reinstall affected systems if necessary
  • Restore data from verified backups

A clean rebuild is often the safest recovery path.


Step 10: Review How the Attack Started

Ransomware usually enters through:

  • Phishing email attachments
  • Compromised remote access services
  • Malicious downloads
  • Software vulnerabilities

Understanding the entry point helps prevent repeat incidents.


Final Thoughts

Ransomware is designed to create urgency and pressure.

A calm, structured response is the best defense.

Disconnect the device.
Preserve evidence.
Contain the spread.
Restore from clean backups when possible.

Preparation and awareness reduce the long term impact of ransomware attacks.

Back
Report a Scam
Contact Us
Get Help

Support the Fight Against Cybercrime

One-time contribution. No subscriptions.
 
Awareness Support
Helps educate people to recognize scams and digital threats.
$15
Builder
Supports
Supports educational tools and scam-prevention resources.
$35
Mission Accelerator
Directly strengthens the fight against cybercrime worldwide.
$50
Donate a Custom Amount
Choose an amount that matches the impact you want to make.

*Your contribution supports education, awareness, and community-driven cybercrime prevention

;