With decades of combined experience in emergency ransomware response, the Recon IR team has repeatedly witnessed the same frustrating patterns unfold time and time again. While victims are often shocked by the suddenness of the ransomware attack and bewildered by how it happened, as incident responders, we’re rarely surprised. These attacks almost always follow a predictable script over a number of days and weeks, exploiting well-known vulnerabilities and common security oversights that could have been addressed earlier. The reality is that without the right defenses, your organization is practically rolling out the red carpet for attackers.
We’ve seen it all before, but you don’t have to. That’s why we’re sharing what we’ve learned from these unfortunately common but devastating incidents—so you can avoid becoming yet another victim who wonders how this could have happened.
If you can't answer the following questions confidently in the affirmative, your organization is at risk of becoming a victim of an entirely predictable ransomware incident. Answering “maybe” isn’t good enough; attackers thrive on exceptions, misconfigurations, and sloppy defenses.
Read on to understand why your answers to those questions matter and how they influence how a ransomware incident is likely to unfold. By implementing the fundamental security controls in this article, aligned with best practices and frameworks, you will dramatically reduce the likelihood of a falling victim to the most frustratingly prevalent and predictable ransomware threats.
Ransomware attacks begin with gaining unauthorized access to your network. Here’s how it usually happens:
The critical controls to defend yourself:
Once inside your network, attackers will want to understand the lay of the land. Attackers use tools like Advanced IP Scanner and nmap to map your network (T1016). They will run enumeration tools like Bloodhound (S0521) to deep dive into your Active Directory structure, map your account roles & privileges, and begin to plot a path to take over the rest of your environment. Without proper monitoring, this activity can go unnoticed over the course of several days.
The critical controls to quickly identify malicious discovery activity:
To fully compromise your network, attackers often need to escalate their privileges beyond what they gained access to during the initial access stage. Attackers can leverage techniques like Kerberoasting (#T1558), where they extract and crack service account passwords that are linked to Service Principal Names (SPNs) in Active Directory. Without strong, unique passwords—ideally 32 characters or more—these accounts become easy prey. Or, rather than attacking Active Directory, they may target built-in local administrator accounts that have the same password across multiple systems. Once they gain access to that built-in administrator account, attackers can move fast using techniques like Pass-the-Hash (T1550) or Token Stealing (T1134) to move laterally across the network and cause widespread damage.
You can make it harder for attackers to escalate privileges in your environment:
Once attackers have discovered valuable resources within your network, their next objective is to maintain access and expand their foothold. To do this, they often employ a combination of legitimate remote management tools and malicious software (T1219). Legitimate tools like AnyDesk or TeamViewer, which are commonly used for remote IT support, can be misused by attackers to maintain persistence (TA0003) within your environment. These tools are particularly insidious because they blend in with legitimate activity, making them difficult to detect without careful scrutiny. On the more overtly malicious side, attackers might deploy software like Cobalt Strike (S0154), a commercial penetration testing tool often repurposed by cybercriminals to establish command and control (C2) channels, execute payloads, and move laterally within the network. Without continuous, active monitoring, these unauthorized activities can go unnoticed for weeks or even months—a period known as dwell time.
The attacker is on the move! Without active defenses and monitoring you won’t be able to see them.
Shrink the attacker's dwell time and find breaches faster:
Attacks frequently have two goals: data exfiltration and data encryption. Before locking you out of your own systems, attackers typically prioritize stealing as much valuable data as possible. This process, known as exfiltration, involves transferring sensitive data out of your network to external servers controlled by the attackers. Common tools and services like MEGA (T1567), FTP (S0095), or other cloud storage services are often used for this purpose.
The final stage sees the attackers tip their hand and begin causing overt damage. Using the access and knowledge they’ve gained over the last several days and weeks, they deploy ransomware to encrypt your data and demand payment for the decryption key (T1486). In most cases, they will deliberately target any unprotected backups and inhibit your ability to recover (T1490). The impact of this action can be catastrophic. You are then left with a double extortion threat: one to stop the release of stolen information and another to regain access to your systems and data.
This is your last line of defense. Are you prepared?
The landscape of ransomware is continually evolving, but the fundamental tactics remain the same. By understanding the likely paths attackers will take and implementing these critical controls today, you can significantly reduce the risk of a successful ransomware attack on your organization. Proactivity in cybersecurity is not just about deploying tools; it’s about understanding the threats, ensuring your defenses are always one step ahead, and having 24/7 expertise to effectively utilize the technology you deploy.
Recon's Managed Security Operations (MSO) solution not only provides the technology but also the experienced professionals who monitor, detect, and respond to ransomware threats before they impact your business. Don’t leave your organization’s security to chance—partner with us to build a proactive and resilient defense strategy. Contact Recon today to talk through any of these controls or learn how we can help you stay ahead of cybercriminals and protect what matters most.