The ransomware playbook
Modern ransomware attacks aren't smash-and-grabs. They’re surgical operations that follow a cold, calculated script:
-
Break in. Phishing emails, compromised credentials, or unpatched vulnerabilities let them inside.
-
Set up shop. Attackers plant backdoors and map out your network like they own the place.
-
Steal first, lock later. Sensitive data is exfiltrated before encryption, setting up a double-extortion play.
-
Paralyze everything. Files get locked down, operations grind to a halt, and the ransom note arrives.
-
Apply pressure. Countdown clocks, threats to leak data, and public humiliation tactics force your hand.
It's like watching a team of professional bank robbers case the joint, disable the alarms, take hostages, clean out the vault, and then demand ransom—except they can do it to dozens of targets simultaneously while sitting safely behind their keyboards. Understanding this attack sequence is your first step to implementing effective protection from ransomware.
Average Activity Before Ransomware Takes Hold
Average number of actions taken before triggering ransomware
- 18
Of incidents observed by Huntress in 2024 saw data exfiltration as the top action taken before ransomware dropped
- 71%
Pre-ransomware notifications sent by the Cybersecurity Infrastructure and Security Agency (CISA) in 2024 (as of Nov. of same year)
- 2,131
Number of pre-ransomware notifications CISA sent in 2024 over 2023
- 2x
Before Ransomware Strikes: Attack Playbook