Return to overview
5 min read

Inside a Ransomware Attack: What a Real-World Incident Can Teach Us

5 min read
July 10, 2025
By: Eye Security Incident Response Team
incident response
By: Eye Security Incident Response Team
10 July 2025

“All systems went dark. We are locked out of everything. We don’t know how far it’s spread.”

This is the typical call that our Incident Response hotline receives from a company in crisis. By the time they reach out, key systems are usually encrypted, operations had come to a standstill, and the full impact remains unclear.

The ransomware attack: what happens when it’s already late?

The harsh reality of modern ransomware: it starts weeks earlier, quietly, while attackers map out your network, escalate privileges, and wait for the right moment to strike. Despite the best efforts of IT and security teams worldwide, most organisations discover the breach only when it is already too late.

At Eye Security, we have supported dozens of organisations through the critical first days. In this case walkthrough, we take you inside a real-world attack, from the moment we were contacted through to investigation, ransom negotiations, and full recovery.

The story lifts the curtain on the events behind the scenes of a ransomware investigation. It shows the anatomy of modern ransomware campaigns, how they operate, where organisations falter, and how a well-prepared response can mitigate long-term damage.

What happens when ransomware hits?

 

 Get behind the scenes of a ransomware attack.

 

 

The statistics already point to a crushing reality. According to Cybercrime Magazine, ransomware damage will cost the world $57b in 2025. This translates into  $4.8b per month, $1.1b weekly, $156m per day, $6.5m per hour, $109,000 per minute, and $2,400 every second.

The Global Cost of Ransomware Study, recently conducted by the Ponemon Institute and based on a survey of 2,547 IT and cybersecurity professionals, reveals that 88% of the responding organisations were hit by ransomware in the last year. Of these, 58% had to shut down operations after an attack for an average of 12 hours.

For mid-sized businesses, the average ransom demand was at $1.2m, with 55% of organisations paying the ransom. Some 44% of organisations said that they were not prepared to quickly detect and respond to an incident. In 2024, the average ransomware attack cost $5.13m, a 574% increase over six years. That includes the ransom payment, recovery costs, as well as costs associated with reputational damage and loss of trust.

Part I. The call no company wants to make

It was a regular weekday afternoon when Eye Security’s Incident Response (IR) hotline rang. On the other end was the IT lead of a European mid-sized company in crisis. They had never worked with us before. Their operations were at a standstill. Order processing halted, employees locked out, and all critical systems non-functional. They had just been hit by a ransomware attack and it was severe.

Their team had done what they could but they quickly realised they were outmatched. Beyond technical recovery, they were in urgent need for strategic crisis management.

Part II: Day 0. Impact and immediate damage

Upon engagement, it became evident the organisation had been targeted by a ransomware group known for its high-impact attacks. Since emerging in early 2023, the ransomware group had claimed responsibility for over 700 incidents globally and was estimated to have extorted more than $42m.

The group’s modus operandi includes exploiting VPN vulnerabilities, frequently using leaked credentials or brute-force techniques to bypass defences.

Once inside the environment, they conducted reconnaissance, escalated privileges, and methodically mapped out the network. By the time the ransomware was deployed, the threat actor had already:

  • Deleted backup repositories, ensuring data recovery would be difficult;
  • Encrypted over 300,000 files across systems; and
  • Exfiltrated sensitive data, setting the stage for a double-extortion attempt.

For the company, this resulted in operational paralysis. All signs pointed to a well-prepared, highly motivated adversary.

 

incident readiness checklist

 

Know how you would respond. 

Download the incident readiness checklist.

 

 

 

 

Part III: A breakdown of the response timeline

Here is how the attack progressed, starting from day 1 of our engagement.

Day 1. Rapid triage and forensics initiated

Initial containment actions were taken to isolate infected endpoints and preserve forensic evidence. A data recovery specialist was engaged, particularly since the company's local backups had been wiped by the attackers.

At this point, the focus was on:

  • Confirming the attack vector
  • Assessing what data was encrypted or exfiltrated
  • Determining how long the attacker had been inside the environment

Day 2. Ransom negotiation begins

Once secure communication with the attacker was established, the adversary made their presence clear. A formal ransom note was issued, and early discussions began. While no specific figure was shared initially, the attack’s scale suggested that the demand would be in the high six-figure range.

Simultaneously, our team began preparing a multi-scenario response strategy, including:

  • Data recovery planning without paying the ransom
  • Legal and compliance preparations
  • Communication and containment protocols

Day 3. Regulatory and legal implications

Due to the General Data Protection Regulation (GDPR), the company had 72 hours to report the data breach to the supervisory authority. The exfiltration of personal and potentially sensitive data triggered mandatory disclosure obligations.

Our legal advisors collaborated with the company’s counsel to:

  • File the breach notification in accordance with GDPR
  • Begin communication planning with stakeholders and employees
  • Review cyber insurance coverage and claim readiness

In parallel, encrypted drives were physically shipped to a data recovery lab to explore decryption or salvage possibilities.

Day 4. Root cause identified: VPN exploit

Detailed analysis revealed the exact point of entry: a vulnerable VPN solution.

Log analysis indicated that the threat actor had likely maintained covert access for 26 days before rolling out the ransomware. The dwell time gave them a comprehensive understanding of the environment, allowing for a highly targeted attack.

Part IV: Stabilisation and recovery

Day 6. Restoration of critical systems

After several days of intense effort, the first significant breakthrough occurred: a partial backup of a critical application server had survived the attack due to being stored off-site. It was successfully restored, kickstarting recovery. While not complete, it was enough to fully restore key business systems.

This discovery shifted the decision calculus significantly.

Day 7. Internal crisis communication launched

With initial recovery in progress, the leadership team formally notified staff. Using pre-planned messaging aligned with the legal team, the company aimed to balance transparency and reassurance while avoiding panic or premature media exposure.

Day 15. Operational reboot

Two weeks post-incident, the company began restoring online operations. Network connectivity was re-established, user accounts were gradually re-enabled, and environments were re-secured.

Day 16. Ransom demand finalised

The adversary formally demanded $900,000 USD in Bitcoin in exchange for the decryption key and a “guarantee” not to leak or sell the stolen data.

At this stage, a critical decision had to be made.

Part V: Risk decisions and negotiation strategy

From Day 26 to Day 42, negotiation efforts intensified. Ransom payments are seldom encouraged, but in real-world scenarios, organisations must evaluate:

  • The likelihood of sensitive data being leaked
  • Whether paying would prevent reputational or legal fallout
  • The reliability of the attacker’s claims

By Day 41, the business had returned to near-normal operations without needing the decryption key.

Finally, on Day 56, a reduced payment of $270,000 was made: not for decryption, but in hopes of preventing the public release of sensitive data.

ransomware attack progression

Part VI: Lessons learned

This case illustrates not only the complexity of ransomware attacks, but also the strategic and technical missteps that often precede them. Key takeaways for cybersecurity professionals include:

1. Patch management is non-negotiable

The vulnerability exploited was known and documented. Organisations must treat patching and vulnerability management as foundational.

2. Backups must be immutable and isolated

The attackers deleted backups with ease. Had the company used immutable or air-gapped backup solutions, their recovery would have been faster and less reliant on ransom-driven negotiations.

3. Dwell time is deadly

The attacker maintained stealthy access for weeks. 24/7 detection and response capabilities are critical for early threat detection and containment.

4. Cyber insurance is not a luxury

Insurance coverage made a tangible difference in this case, helping cover IR costs, legal fees, and part of the ransom payment.

5. You must assume breach

Zero-trust principles are no longer theoretical. Every external-facing service is a potential entry point. Every organisation must operate from an assume breach mindset.

How can Eye Security help?

Eye Security delivers enterprise-grade cybersecurity tailored to the actual risks and budgets of mid-sized businesses. This includes:

When ransomware hits, you need a team that is battle-tested and ready to act.

Find out how we do Incident Response.

If you suspect an incident, contact our incident response hotline immediately:

Emergency Incident Response Germany: +49 203 6688 1900 

Emergency Incident Response the Netherlands: +31 88 644 4898

Let's talk

Curious to know how we can help?

Get in touch
GET IN TOUCH
Share this article.