What happens if your business gets ransomware?
All dispatches
Cyber Security7 May 20257 min read

What happens if your business gets ransomware?

🐑
Rodney
Head of Tech Realism · Black Sheep Support
Share this dispatch

The digital landscape for UK SMEs has shifted dramatically over the past few years. It is no longer a question of "if" a business will be targeted by cybercriminals, but "when." Among the various threats lurking in the digital shadows, ransomware remains the most disruptive and financially damaging. Ransomware is a form of malicious software (malware) that encrypts your business files, rendering your data inaccessible until a ransom—usually demanded in untraceable cryptocurrency—is paid. For a small or medium-sized enterprise, this isn't just an IT headache; it is an existential threat. When your operational data is locked, your productivity grinds to a halt, your reputation suffers, and your legal obligations under UK GDPR come sharply into focus. Understanding the anatomy of a ransomware attack and the immediate, practical steps you must take is the difference between a minor service interruption and a total business collapse.

The Immediate Impact: What You Will Experience

When a ransomware attack hits, the first symptom is rarely a dramatic red screen. It often begins with subtle anomalies: files failing to open, applications crashing, or employees reporting that their folders are suddenly filled with strange, unreadable file extensions. Once the encryption process completes, a ransom note—typically a text file or an altered desktop wallpaper—appears, providing instructions on how to pay the attackers to regain access to your systems.

The immediate impact is total operational paralysis. You lose access to your CRM, your financial software, your email archives, and your client databases. For many UK businesses, this means the inability to process invoices, ship orders, or communicate with customers. The psychological toll on your team is equally significant, as staff members find themselves unable to perform their duties, leading to a state of panic that often results in poor decision-making.

Step 1: Containment and Isolation

The moment a ransomware infection is suspected, your primary goal is to stop the spread. Ransomware is designed to move laterally across your network, seeking out backups, cloud storage, and connected devices.

How to execute an emergency shutdown

  1. Disconnect from the network: Immediately unplug the network cable (Ethernet) from the affected machine and disable its Wi-Fi.
  2. Isolate the segment: If your IT infrastructure is segmented, disconnect the affected VLAN or subnet from the rest of the company network.
  3. Do not power off (unless instructed): While it sounds counter-intuitive, shutting down a machine completely can sometimes wipe the volatile memory (RAM) that may contain the encryption keys needed for recovery. Instead, disconnect it from the internet and wait for professional guidance.
  4. Notify your Managed Service Provider (MSP): If you partner with a firm like Black Sheep Support, alert our emergency response team immediately. We can initiate a remote lockdown of your network to prevent the malware from reaching your critical servers.

Step 2: The Assessment and Legal Obligations

Once the environment is contained, you must assess the scope of the damage. You need to identify which machines are encrypted and, crucially, whether sensitive personal data has been exfiltrated.

Under the UK General Data Protection Regulation (UK GDPR), if the ransomware attack resulted in a personal data breach that is likely to result in a risk to the rights and freedoms of individuals, you have a legal obligation to report the incident to the Information Commissioner’s Office (ICO) within 72 hours of becoming aware of it.

Your legal and ethical checklist

  • Document everything: Maintain a detailed log of when the attack was discovered, the steps taken to contain it, and the systems affected.
  • Check for data exfiltration: Modern ransomware groups don't just encrypt data; they steal it. This is known as "double extortion." You must determine if your customer or employee data has been leaked to the dark web.
  • Consult legal counsel: If sensitive data is involved, engage with a cyber-insurance provider or a legal firm specializing in data protection immediately to navigate your regulatory reporting requirements.

Step 3: To Pay or Not to Pay?

The question of paying the ransom is the most difficult decision a business owner will face. The UK government, the National Cyber Security Centre (NCSC), and law enforcement agencies like the National Crime Agency (NCA) strongly advise against paying ransoms.

Why payment is a dangerous gamble

  • No guarantee of recovery: Paying does not ensure that the cybercriminals will provide a working decryption tool.
  • You become a target: Once you pay, you are marked as a "willing payer," making you a prime target for future attacks.
  • Funding criminal activity: Your payment directly funds the development of more advanced malware, perpetuating the cycle of cybercrime.
  • Legal risks: Depending on the specific threat actor, paying a ransom could potentially violate UK sanctions laws if the group is linked to restricted regimes or sanctioned entities.

Instead of paying, focus your resources on clean restoration from immutable backups—backups that cannot be altered or deleted by the ransomware.

Step 4: The Recovery Process

Recovery is a methodical process. You cannot simply restore a backup to the same environment that was just compromised, as the attackers may still have "backdoors" (hidden access points) waiting to trigger a second wave of encryption.

The "Clean Room" restoration strategy

  1. Sanitize the environment: Wipe the infected hardware entirely. Reinstall operating systems from known-good, original sources.
  2. Patch all vulnerabilities: Before bringing systems back online, ensure all software, firewalls, and operating systems are patched to the latest versions to close the security holes the hackers exploited.
  3. Restore from verified backups: Use the most recent "clean" backup. Ensure that the backup itself has been scanned for malware before it is integrated back into the network.
  4. Reset all credentials: Assume all passwords, service accounts, and administrative keys have been compromised. Force a company-wide password reset and implement Multi-Factor Authentication (MFA) on every single account.

Step 5: Building Resilience for the Future

After the dust settles, the focus must shift to hardening your defenses. Cyber Essentials—a UK government-backed scheme—provides the perfect framework for this. Achieving Cyber Essentials or Cyber Essentials Plus certification ensures that you have the baseline technical controls in place to protect your SME against the vast majority of common cyber threats.

  • Immutable Backups: Ensure your backups are stored off-site and in a format that cannot be modified by the primary network.
  • Endpoint Detection and Response (EDR): Move beyond traditional antivirus. EDR solutions monitor behavior on your network 24/7, identifying and stopping malicious activity as it happens.
  • Staff Training: The most common entry point for ransomware is a phishing email. Regular, realistic phishing simulations ensure your employees are your first line of defense, not your weakest link.

Key Takeaways

  • Ransomware is an operational emergency: Treat it with the same urgency as a physical fire in your office.
  • Containment is priority one: Isolate the infected systems immediately to stop the spread.
  • Do not pay: Payment is a gamble that rarely pays off and fuels the criminal ecosystem.
  • Regulatory compliance: Remember your 72-hour window for reporting data breaches to the ICO.
  • Prevention is cheaper than recovery: Investing in robust backups, MFA, and Cyber Essentials certification costs a fraction of what a ransomware recovery project will cost your business.
  • Partner with experts: You don't have to navigate a cyber crisis alone. Having a trusted IT partner ensures you have an incident response plan ready before a crisis hits.

To take the next step

Book a Discovery Call

Back to all dispatchesEnd of Intelligence · BSS Digital Dispatch