Ransomware - What to Do When Your Data Is Encrypted?
Step by step guide on how to respond to a ransomware attack. What to do, what to avoid, and how to recover data without paying ransom.

You turn on your computer and see a message: "Your files have been encrypted. Pay $5000 in Bitcoin to recover them." What now?
Don't panic. This article will guide you through the proper response to a ransomware attack.
First 15 Minutes - What to Do Immediately
1. Disconnect from Network
This is the most important step. Ransomware often spreads to other devices on the network.
- Unplug the network cable
- Turn off WiFi
- Disconnect external drives (if not already encrypted)
2. DON'T Turn Off the Computer
Counterintuitively - leave the computer on. RAM memory may contain encryption keys needed for data recovery.
3. Take a Photo of the Screen
Photograph the ransomware message with your phone. It will be needed for:
- Identifying the type of ransomware
- Police report
- Contact with specialists
4. Note the Encrypted File Extension
Check what the encrypted files are named (e.g., .locky, .crypted, .encrypted). This helps identify the ransomware type.
What Absolutely NOT to Do
DON'T Pay the Ransom
- No guarantee you'll get the key
- You're funding criminals
- You might become a "regular customer"
- In ~30% of cases data isn't decrypted despite payment
DON'T Try to Remove Ransomware Yourself
Without knowledge you might:
- Destroy keys in memory
- Delete files needed for recovery
- Trigger additional encryption
DON'T Format the Drive
That's a last resort. First check if data can be recovered.
How to Identify Ransomware
Identification Tools:
- ID Ransomware (id-ransomware.malwarehunterteam.com) - upload an encrypted file
- No More Ransom (nomoreransom.org) - Europol project with free decryptors
Why Is This Important?
For many types of ransomware, free decryption tools exist. Criminals make mistakes, keys leak, authorities seize servers.
Data Recovery Options
1. Check Backup
Do you have a backup? That's the best option:
- Cloud backup (if not connected during attack)
- External drive disconnected from computer
- Backup on another device
2. Shadow Copies (Windows)
Windows sometimes keeps previous file versions:
- Right-click folder → Properties → Previous Versions
- Use ShadowExplorer tool
Note: many ransomware delete shadow copies, but worth checking.
3. Free Decryptors
Check No More Ransom - they have decryptors for 150+ types of ransomware.
4. Professional Recovery
If data is critical - contact specialists. Sometimes it's possible to:
- Recover data from damaged sectors
- Find encryption vulnerabilities
- Use forensic techniques
Reporting the Incident
Report to Local Authorities
- Contact your local cybersecurity agency
- They'll help identify the ransomware
- They'll warn others
File a Police Report
- It's a crime
- Even if they don't catch the perpetrators - statistics help fight cybercrime
How to Protect Yourself in the Future
3-2-1 Rule
- 3 copies of data
- 2 different media types
- 1 copy offline (disconnected from network)
Updates
90% of attacks exploit known vulnerabilities. Update:
- Operating system
- Browser
- Office software
Training
Most ransomware arrives through:
- Email attachments
- Fake websites
- Pirated software
For Businesses - Additional Steps
Response Plan
Prepare in advance:
- Who makes decisions?
- Who contacts IT?
- How to communicate with clients?
Network Segmentation
Separate critical systems from the rest of the network - limits spread.
Backup Testing
Regularly test if backup works and if data can be restored from it.
Summary
A ransomware attack is a stressful situation, but not hopeless:
- Disconnect from network - immediately
- Don't pay - look for alternatives
- Identify - there might be a free decryptor
- Check backup - best option
- Report - help others
The best defense is prevention: backup, updates, caution.
Victim of ransomware? Contact us - we'll help assess the situation and plan data recovery.
Related articles
How to Protect Your Business from Cyberattacks
Learn about the most important cyber threats and proven methods to protect your business. A practical guide for small and medium enterprises.
Read morePhishing - How to Recognize Fake Emails and SMS
Learn to recognize phishing - fake messages impersonating banks, courier companies, or government agencies. Practical examples and tips.
Read moreVPN - What Is It and Do You Need It?
Simple guide to VPN. How it works, when it's needed, and when it's a waste of money. For individuals and businesses.
Read more