Know the 5 stages of a ransomware attack

Of all the malware circulating in cyberspace, ransomware attacks are the most profitable for cyber criminals and have thus become commonplace. Cyber experts say it’s not a matter of if but when a company like yours will be hit.

Knowing the stages of a ransomware attack can help you recognise the indicators and defend yourself more easily against – or at least lessen the effect – of one.

Let’s have a look at the five stages, and where the ransomware can be intercepted.

Stage 1: Infection

Phishing emails and exploit kits are common routes to gaining entry to a computer network. With phishing, attackers rely on you to click on an executable file that will infect your computer and gain access to the network. With exploit kits, attackers without much technical know-how can use automated threats to scan for vulnerable browser-based apps, divert web traffic and run the ransomware.

Stage 2: Installation and execution

During this phase, the ransomware needs to install itself on your system and identify vulnerable files. If the ransomware has arrived by email, it needs you to activate it, by clicking on it.

Note: With cyber security in place, it’ll likely disrupt the process at either Stage 1 or Stage 2.

Stage 3: Backup hijacking

If the ransomware isn’t intercepted it first hijacks your backup process and removes the backup files and folders. This doesn’t matter too much if you have automated backup in place as your files will all be safely stored on a remote backup server.

Stage 4: Encryption

Once your backups have been removed, the ransomware encrypts your vulnerable or most valuable files. The ransom demand is supposed to “unlock and decrypt” your data, but according to The State of Ransomware 2021 survey recent attacks show that only 8% got their data back when the victims paid the ransom!

Stage 5: Notification and cleanup

With the backup files removed and the encryption complete, the demand instructions for the ransom demand are sent.

Sometimes you’re given a few days to pay before the ransom goes up. If you have automated backup in place, you have the choice of paying the ransom and possibly not getting your data back, or using your trusted backup to restore your system and return to normal.

Do you have proper data protection in place?

New all-in-one cyber security and backup product gives more peace of mind


Get a 14-day free trial

"*" indicates required fields

Hidden
Keep me up to date

I have read and understand IronTree Internet Services (Pty) Ltd's privacy notice.

Does your business send bulk emails?

Learn all you need to know about Google & Yahoo’s new requirements for bulk email senders.

"*" indicates required fields

Hidden
Keep me up to date

I have read and understand IronTree Internet Services (Pty) Ltd's privacy notice.

"*" indicates required fields

Hidden
Keep me up to date

I have read and understand IronTree Internet Services (Pty) Ltd's privacy notice.

"*" indicates required fields

Hidden
Keep me up to date

I have read and understand IronTree Internet Services (Pty) Ltd's privacy notice.

"*" indicates required fields

Hidden

I have read and understand IronTree Internet Services (Pty) Ltd's privacy notice.

This field is for validation purposes and should be left unchanged.

"*" indicates required fields

Hidden

Training

We also offer certified training packages The training will cover POPIA in general. We have two options available. Once off costs. Employee Awareness Training - R490 per candidate Senior Employees Awareness Training - R650 per candidate All prices exclude VAT

Company Structure

Are you part of a group structure?*
IronTree is committed to protecting and respecting your privacy, and we'll only use your personal information to administer your account and to provide the products and services you requested. From time to time, we'd like to contact you about our products and services, as well as any other content that may be of interest to you. If you consent us contacting you for this purpose please tick the checkbox below*

"*" indicates required fields

Hidden
Keep me up to date

I have read and understand IronTree Internet Services (Pty) Ltd's privacy notice.

"*" indicates required fields

Hidden

I have read and understand IronTree Internet Services (Pty) Ltd's privacy notice.

"*" indicates required fields

Hidden
Keep me up to date

I have read and understand IronTree Internet Services (Pty) Ltd's privacy notice.

Give us a call:

+27 87 943 2278

Send us a WhatsApp:

+27 66 372 4061

Drop us an email:

After hours support:

+27 72 595 1066

After hours hosting support:

+27 76 102 9813

Log a support request

The reseller zone is currently out getting a facelift as we look to integrate it with our backup platform, as it stands you can overview your clients on our new backup console. If you don't know what console that is, please reach out to us.

"*" indicates required fields

Hidden

I have read and understand IronTree Internet Services (Pty) Ltd's privacy notice.

This field is for validation purposes and should be left unchanged.
One of our team members will be happy to help answer any questions you have!
Just click the chat icon in the right-hand corner.