Skip to content
Cybersecurity | | | 19 min read

Ransomware - what it is, how it works, and how to protect yourself

Ransomware - a guide for organizations: attack types, incidents 2017-2025 (Colonial Pipeline, Change Healthcare), protection, incident response plan, statistics.

Łukasz Dudkowski Łukasz Dudkowski
Łukasz Drążek Łukasz Drążek
ransomwareincident responsebackupphishingOT security
Ransomware - what it is, how it works, and how to protect yourself
)}

Ransomware is one of the greatest operational threats facing organizations today - not merely a technical issue, but a business risk with measurable cost: production downtime, customer data leaks, regulatory fines, and loss of trust among business partners.

The scale of the problem is growing. In the first half of 2025, Poland ranked first in the world for detected ransomware attacks - 6% of all global incidents according to the ESET report. This increase points to active targeting of the region by RaaS groups. An average of 9 confirmed attacks per day - and those are only the ones reported to CERT Polska (Poland’s national computer emergency response team).

From floppy disks to organized crime

How it started

The first ransomware appeared in 1989. The AIDS Trojan, also known as PC Cyborg, was distributed on 5.25-inch floppy disks - disguised as a survey about HIV infection risk. After 90 computer reboots, it encrypted file names on the C drive and demanded 189 dollars be sent by mail to a PO box in Panama. The ransom message printed on the printer connected to the computer.

For the next dozen or so years, ransomware remained a curiosity. Everything changed in 2013, when CryptoLocker appeared - the first ransomware to use RSA-2048 asymmetric cryptography and Bitcoin payments. Within the first hundred days, it infected over 250,000 devices. The mechanism was simple: an email with an attachment posing as an invoice, a click, encryption. Although few victims paid, the criminals earned over 3 million dollars.

Six generations of ransomware

Each successive generation raised the stakes - both in terms of technical sophistication and demanded amounts.

GenerationPeriodWhat changedKey example
1. Physical distribution1989-2005Floppy disks, simple symmetric encryptionAIDS/PC Cyborg (1989) - $189 ransom by mail
2. Asymmetric cryptography2006-2015RSA, Bitcoin payment, mass distributionCryptoLocker (2013) - 250,000 victims, $3M
3. Network worms2016-2018Automatic propagation without user interactionWannaCry (2017) - 200,000 computers in 100 countries
4. Big Game Hunting2018-2021Targeted attacks, weeks of reconnaissance, manual operationsRyuk / Conti - average ransom >$1M
5. Double/triple extortion2020-presentData theft + encryption + publication blackmail + DDoSLockBit, ALPHV/BlackCat
6. RaaS + attacks on OT2023-presentRansomware-as-a-Service, attacks on physical infrastructureBlackSuit, attacks on manufacturing and energy sectors

The transition from generation 3 to 4 was a turning point. WannaCry in 2017 infected 200,000 computers in 100 countries - including the UK’s National Health Service (NHS), Russian banks, and Nissan factories. But WannaCry was “dumb” - it spread automatically, exploiting the EternalBlue vulnerability in SMB, for which Microsoft had released a patch a month earlier. The ransom was only 300 dollars. The criminals collected approximately $100,000 total - a fraction of the damage caused.

Ryuk changed the rules of the game. Instead of mass bombardment, Ryuk operators spent weeks infiltrating the victim’s network - identifying key servers, stealing data, destroying backups, disabling antivirus. Only when they controlled the entire infrastructure did they launch encryption. The first attack yielded 705 BTC (approximately $10 million PLN at the time). This was the beginning of the “Big Game Hunting” era - hunting for large targets.

Incidents that defined the industry

Some ransomware attacks changed not only the victims, but the entire cybersecurity industry - forcing new regulations, investments, and approaches to protection.

NotPetya (2017) - when ransomware is actually a weapon

In June 2017, a program masquerading as ransomware attacked Ukrainian companies through an infected update of the M.E.Doc accounting software. Within hours, it spread globally. Maersk - the world’s largest shipping company - lost its entire IT infrastructure and operated “on paper” for 10 days. Merck, FedEx, Mondelez - combined losses exceeded 10 billion dollars.

Key takeaway: NotPetya was not ransomware - it was a wiper disguised as ransomware. Even paying the ransom did not restore data, because the decryption mechanism never existed. This demonstrated that not every attack that looks like ransomware actually is one.

Colonial Pipeline (2021) - one password, one pipeline

In May 2021, the DarkSide group encrypted the IT systems of the operator of the largest fuel pipeline on the US East Coast. The entry vector? A compromised password for an old VPN account without multi-factor authentication. Colonial Pipeline paid 4.4 million dollars in ransom.

But the real problem was elsewhere. The ransomware affected only IT systems - not the pipeline control systems. The operator shut down the pipeline preemptively because it was uncertain whether the attack had impacted the MES (Manufacturing Execution System) responsible for fuel transfer accounting. Without a functioning MES, the company could not determine how much of what product it was transporting, to whom, and at what price. An IT incident turned into a critical infrastructure crisis - gas station queues and a state of emergency in several states.

Change Healthcare (2024) - the largest medical data breach

In February 2024, the ALPHV/BlackCat group attacked Change Healthcare - a company processing medical billing for most hospitals and pharmacies in the United States. The entry vector: compromised credentials for a Citrix portal without MFA. The attackers moved through the network for 9 days before launching encryption.

UnitedHealth Group (owner of Change Healthcare) paid 22 million dollars in ransom. The data was not recovered - an ALPHV affiliate leaked it on the dark web, attempting additional extortion. The total cost of the incident exceeded 2.5 billion dollars. Data of 100 million people was compromised - the largest medical data breach in US history.

Other key incidents

IncidentYearVictimRansom / costKey takeaway
WannaCry2017NHS, Nissan, FedEx (100 countries)~$100K collected ransomThe patch had existed for a month - updates save
Norsk Hydro2019Aluminum manufacturer (Norway)$35-41M in lossesLockerGoga - production paralysis, company did not pay
JBS Foods2021Meat producer (global)$11M (REvil)Plant closures in the US, Australia, Canada
MOVEit20232,700 organizations globally93M people affected (Cl0p)Supply chain - one vulnerability = thousands of victims
Renewable energy attack in Poland202530+ wind farms, combined heat and power plantRTU firmware damageWiper on OT - destruction, not ransom

Sources: CISA advisories, FBI IC3 Annual Reports, UnitedHealth Group SEC filings, CERT Polska (Poland’s national CERT), Mandiant and Dragos reports.

Ransomware in industrial environments

Ransomware in operational technology (OT) networks is a distinct and growing problem. The 2025 Dragos report documents an 87% increase in attacks on industrial organizations and a 60% increase in the number of groups targeting the OT/ICS sector. Manufacturing is the most frequently attacked industry - 1,466 attacks in 2025, a 56% increase over the previous year. The average ransom demanded from manufacturers doubled to $1.16 million.

The difference between ransomware in IT and in OT is fundamental. In IT, ransomware encrypts data - painful but reversible with a good backup. In OT, ransomware can halt a production line, damage physical equipment, or - in the worst-case scenario - endanger human safety. The attack on Polish renewable energy infrastructure in December 2025 showed that attackers can damage RTU controller firmware using wiper malware - this was not about ransom, but about destruction.

Colonial Pipeline illustrates the indirect impact mechanism: ransomware affected only IT, but uncertainty about the integrity of the MES system (fuel transfer accounting) forced the pipeline shutdown. The company could not conduct business because it did not know how much of what product it was transporting. Network segmentation and isolation of business systems from OT could have limited this domino effect.

The RaaS ecosystem - how the ransomware “industry” works

Modern ransomware is not the work of lone hackers. It is an organized ecosystem with a clear division of roles, revenue models, and specialization comparable to the legitimate software market. Understanding this ecosystem is essential - because it enables defenders to identify points where they can disrupt the attack chain.

Division of roles

The Ransomware-as-a-Service (RaaS) model operates like a franchise. Malware developers build and maintain the software, while affiliates - independent operators - carry out the actual attacks. But the ecosystem is much broader than the operator-affiliate relationship:

RoleWhat they doHow they earnScale in 2025
Operator/DeveloperBuilds ransomware, C2 infrastructure, negotiation panel, leak site20-40% of each ransom85 active groups in Q3 2025 (record)
AffiliateCarries out the attack end-to-end - reconnaissance, access, exfiltration, encryption60-80% of ransomMigrate between platforms after takedowns
Initial Access Broker (IAB)Sells ready-made network access (VPN, RDP, stolen credentials)$500-50,000 per access~$14M revenue in 2025
NegotiatorNegotiates ransom with the victim, manages communicationsPercentage of negotiated amountDedicated “call centers”
Money launderingCryptocurrency conversion, bridge services, mixersPercentage of transactionBridge +66% YoY, mixers -37%

The cartel model - 2025 evolution

The ransomware market has undergone a significant shift. After the takedowns of LockBit and ALPHV/BlackCat by law enforcement in 2024, the market fragmented - no single group controls more than 11% of the market (compared to LockBit’s 34% in 2023). In 2025, TRM Labs identified 93 new ransomware variants - a 94% increase year-over-year.

An interesting evolution is the cartel model. In March 2025, the DragonForce group launched a platform where affiliates can create their own ransomware brands, using DragonForce infrastructure (C2 servers, negotiation panel, leak site). DragonForce takes only 20% of the ransom - significantly less than the typical 30-40%. This lowered barrier to entry means that increasingly less technically skilled operators can run effective ransomware campaigns.

Attack chain and detection windows

Every ransomware attack goes through the same phases - regardless of the group. Reconnaissance and access purchase (IAB) can take weeks before the actual attack. Social engineering, infrastructure scanning, and purchasing stolen credentials is the phase where threat intelligence and dark web monitoring provide an opportunity for early warning.

After gaining access, an affiliate spends an average of 5-14 days in the network (Mandiant M-Trends 2026) on internal reconnaissance, privilege escalation, and data exfiltration - before launching encryption. This window is critical for defenders.

Impact of law enforcement actions

Enforcement operations achieve real results. The takedowns of Hive (2023), LockBit (2024), and ALPHV/BlackCat (2024) caused market fragmentation and short-term activity decline. The RAMP forum - the main RaaS affiliate recruitment platform - was seized by US authorities in January 2025.

At the same time, the ecosystem demonstrates resilience. Affiliates migrate to new platforms within weeks, and new groups (Qilin, Akira, DragonForce) quickly fill the vacant space. The decline of the ransom payment rate to 23-25% (a historic low) forces groups to change tactics - hence the growing emphasis on triple extortion (encryption + data theft + DDoS) and attacks on smaller organizations that have lower security budgets but a higher propensity to pay.

How to monitor the ecosystem

Tracking ransomware group activity enables early warning - especially when a new campaign targets a client’s industry or region. Tools such as RIFFSEC Ransomware Monitor track group activity on leak sites and allow monitoring whether an organization’s data or its contractors’ data has appeared in a leak. Other sources: ransomware.live (real-time attack map), Ransom-DB (group and victim tracking), quarterly reports from Check Point Research and Dragos (for the OT sector).

Protection against ransomware

Three dominant entry vectors

Before we discuss defense, it is worth understanding how ransomware reaches organizations. Three vectors account for over 90% of successful attacks:

Phishing and spearphishing (~45% of attacks) remains the most effective vector. Attackers impersonate well-known companies - banks, telecom operators, courier services - and persuade victims to open an attachment or click a link. In the spearphishing variant, the message is personalized - for example, posing as a CV sent to the HR department or an invoice from an actual supplier.

Public service exploits (~30%) - exploiting vulnerabilities in VPN, RDP, and web applications exposed to the internet. Colonial Pipeline (VPN without MFA), Change Healthcare (Citrix without MFA), Volt Typhoon (Fortinet and Ivanti vulnerabilities) - the pattern repeats.

Stolen credentials (~20%) - login data purchased on the dark web. Initial Access Brokers sell network access to organizations for 500 to 50,000 dollars. Without MFA, a single stolen password is sufficient.

Anatomy of an attack - from access to encryption

Between gaining initial access and launching encryption, an average of 5-14 days passes (Mandiant M-Trends 2026). This is a critical window in which an organization with good detection can interrupt the attack. Below is a typical Big Game Hunting attack chain mapped to MITRE ATT&CK:

PhaseWhat the attacker doesATT&CK techniqueHow to detect
Day 1Logs in with stolen credentials via VPNValid Accounts (T1078)Login from unusual location/time
Day 2-3Scans the network, identifies Active DirectoryNetwork Discovery (T1046)Scanning anomalies in NDR
Day 3-5Escalates privileges to Domain AdminPrivilege Escalation (T1068)EDR, process monitoring
Day 5-8Steals data, packages and exfiltrates itArchive + Exfiltration (T1560, T1041)DLP, outbound traffic monitoring
Day 8-12Deletes Volume Shadow Copy, disables backupInhibit Recovery (T1490)Alert on VSS deletion, immutable backups
Day 12-14Launches encryption and demands ransomData Encrypted (T1486)Canary files, EDR behavioral

Five layers of protection

Protection against ransomware requires a layered approach. No single mechanism is sufficient - but a combination of five layers dramatically raises the bar for attackers.

Layer 1: Backups - the last line of defense, but it must work. The 3-2-1-1 strategy means: 3 copies of data, on 2 different media types, 1 copy offsite, 1 copy immutable. Critical: regularly test your restores. A backup from which data cannot be recovered is a false sense of security. And isolate backups from the production network - Ryuk systematically searched for and destroyed backups before launching encryption.

Layer 2: Access control - MFA on every remote access point (VPN, RDP, cloud, email). Colonial Pipeline, Change Healthcare - both attacks started from a lack of MFA. Add the principle of least privilege and privileged access management (PAM).

Layer 3: Hardening - critical updates within 48 hours (WannaCry had a patch available for a month), disabling unnecessary services (RDP, SMBv1, PowerShell remoting where not needed), and network segmentation - separating IT from OT, internal segmentation, DMZ.

Layer 4: Detection - EDR on all endpoints with behavioral detection, network monitoring (NDR), SIEM with rules for known ransomware patterns. Canary files - decoy files in key locations that generate an alert when modified - are a simple and effective early warning mechanism.

Layer 5: People - regular training and phishing simulations (including controlled phishing campaigns as part of penetration testing), a documented and practiced incident response plan, and cyber insurance to cover forensics and recovery costs. Verifying the effectiveness of layers 1-4 requires regular penetration testing and Red Team operations.

What to do when an attack has already occurred

When a ransom demand appears on screen, time and the order of actions matter.

The first 60 minutes are critical. Confirm the incident (EDR alert, user report, canary file), but do not shut down infected machines - disconnect them from the network. Shutting down causes loss of RAM, which may contain decryption keys or forensic evidence. In parallel, block compromised accounts in Active Directory and isolate network segments via VLAN/firewall.

The next 4-24 hours should be spent on assessment. How many systems are affected? What data was stolen? Is the backup safe? Identify the ransomware variant - services like NoMoreRansom.org and ID Ransomware (malwarehunterteam.com) can help determine whether a free decryptor exists. Notify the board, legal counsel, and insurer.

Paying the ransom guarantees nothing. Change Healthcare paid 22 million dollars and did not recover the data - an ALPHV affiliate leaked it despite the payment. This is a typical double extortion scenario. Paying funds further attacks, creates legal risk (OFAC/EU sanctions against certain groups), and does not protect against data publication. CERT Polska (Poland’s national CERT), CISA, and Europol all unequivocally recommend: do not pay.

Legal obligations - report to CERT Polska (Poland’s national computer emergency response team) within 24 hours, to UODO (Poland’s data protection authority, equivalent to a DPA) within 72 hours (if personal data breach), to the sectoral CSIRT (if critical infrastructure). Under NIS2/KSC (Poland’s National Cybersecurity System Act), these deadlines are binding.

Incident response plan - 6 phases

The following plan is worth printing out and practicing before it is needed. A tabletop exercise every six months is the minimum.

PhaseActionsResponsibleTime
1. DetectionConfirm the incident - EDR/SIEM alert, canary file, user reportSOC / IT0-15 min
2. IsolationDisconnect systems from the network, block accounts, VLAN isolationIT / SOC / Network15-120 min
3. AssessmentScope, variant identification, backup status, notificationsIR / Forensics / CISO1-4h
4. EradicationRemove malware, close attack vectors, reset passwords, revoke tokensIR / IT4-48h
5. RecoveryRestore from backup, rebuild systems, monitor for reinfectionIT / SOC1-14 days
6. Lessons learnedPost-mortem with ATT&CK mapping, update procedures and rulesIR / CISO2-4 weeks

NIST SP 800-53 control mapping

For organizations subject to regulatory requirements (NIS2, KSC, DORA) - below is a mapping of key protection mechanisms to NIST SP 800-53 Rev. 5 controls:

Protection mechanismNIST SP 800-53 controlsDescription
3-2-1-1 backupsCP-9, CP-10System backup and recovery
MFAIA-2(1), IA-2(2)Multi-factor authentication
Patch managementSI-2, RA-5Updates and vulnerability scanning
Network segmentationSC-7, AC-4Boundary protection, information flow control
EDR / monitoringSI-3, SI-4Malware protection, system monitoring
Incident response planIR-1, IR-4, IR-8IR policy, incident handling, IR plan
TrainingAT-2, AT-3Security awareness
Account managementAC-2, AC-6Account management, least privilege

Source: NIST SP 800-53 Rev. 5.

Frequently asked questions

What is ransomware? Ransomware is malicious software that encrypts a victim’s data and demands a ransom for its release. Modern variants additionally steal data before encryption and threaten to publish it (double extortion). Ransomware targets both individuals and organizations - from small businesses to critical infrastructure.

Is it worth paying a ransomware ransom? No. CERT Polska (Poland’s national CERT), CISA, and Europol all unequivocally recommend against paying. Change Healthcare paid $22M and did not recover the data. Paying does not guarantee data recovery, funds further attacks, and creates legal risk (OFAC/EU sanctions against certain groups). Instead, restore from backups and report the incident to the appropriate authorities.

How much does a ransomware attack cost? Costs far exceed the ransom itself. The average ransom demanded in 2025 is $1.09M, but total costs (downtime, forensics, recovery, regulatory fines, customer loss) are many times higher. Change Healthcare incurred costs of approximately $2.5B. Norsk Hydro suffered $35-41M in losses despite not paying the ransom.

How does ransomware encrypt files? Ransomware uses hybrid cryptography: it encrypts files with a fast symmetric cipher (e.g., AES-256), then encrypts the symmetric key with the attacker’s RSA-2048 public key. Without the private key (which only the attacker possesses), decryption is practically impossible. Some older variants have known weaknesses - the NoMoreRansom.org service provides free decryptors for over 170 variants.

How can I protect my organization against ransomware? Key mechanisms include: backups following the 3-2-1-1 model (including immutable copies), multi-factor authentication (MFA) on all remote access points, up-to-date software (patch management), IT/OT network segmentation, and monitoring (EDR, NDR). Regular verification of security effectiveness through penetration testing helps identify gaps before attackers do.

How can I recover data after a ransomware attack? The best option is restoring from backup. If no backup exists or it is compromised, check NoMoreRansom.org and ID Ransomware - free decryption tools may be available. Do not shut down infected machines (RAM may contain decryption keys). Report the incident to your national CERT within 24 hours.

Ransomware in numbers - 2025

The figures below illustrate the scale of the problem - and two warning signals for Poland: first place globally in attack frequency and a growing share of the industrial sector.

MetricValueSource
Global ransomware attacks (2025)7,419VikingCloud
YoY attack increase+32%industrialcyber.co
Poland - global ranking (H1 2025)1st place (6% of global)ESET
Average ransom demanded$1.09MVaronis
Average ransom payment$1.0M (-50% YoY)Varonis
Manufacturing sector - number of attacks1,466 (+56% YoY)industrialcyber.co
Increase in OT/ICS attacks+87%Dragos
Time from access to encryption5-14 days (median)Mandiant M-Trends 2026
Change Healthcare cost$2.5BUnitedHealth Group
Groups dismantled (2023-2025)LockBit, ALPHV/BlackCat, HiveEuropol, FBI

Sources

Omówimy zakres, metodykę i harmonogram.