In the first hour of a ransomware incident, most organisations focus on the wrong things. They run forensics. They call their cyber insurance broker. They try to figure out who did it. What they should be doing is figuring out whether they can avoid paying anything at all — and building the negotiating position that makes that possible.
I've spent years in ransomware response rooms, on both sides of the table. What follows is what actually happens in those rooms, what the public discussions miss, and what organisations should understand before they find themselves in that situation.
The First Call Nobody Talks About
Before any negotiation starts, there is a window of roughly 24 to 48 hours where the victim's leverage is highest. This is when the attacker has confirmed the infection, assessed the environment, and is ready to begin talking — but hasn't yet activated their pressure mechanisms: data publication threats, secondary victim notifications, DDoS threats. The clock is already ticking, but it hasn't been visible to the victim.
During this window, a victim's primary goal should be extending it. Every hour of silence is an hour the attacker hasn't yet deployed their leverage. The organisations that navigate ransomware incidents best are the ones that treat this window as a strategic asset, not a delay.
The mistake most IR firms make is treating this as a purely technical phase — scope the infection, contain it, restore from backups. That's necessary but not sufficient. Simultaneously, someone should be assessing the negotiation landscape: What group is this? What have they published before? What's their typical discount behaviour? Do they actually have exfiltrated data or is the "we've stolen your data" claim a bluff?
What the Ransom Note Actually Tells You
Most people focus on the ransom demand. The more useful intelligence is embedded in the note itself — not just what it says, but how it says it.
Professional ransomware groups have customer support. They have escalation procedures. They have standardised pricing models. The note will typically include a deadline, a proof pack (a sample of exfiltrated files), and instructions for first contact. The tone, the language, the precision of the demands — these tell you a great deal about who you're dealing with.
LockBit operators were methodical and businesslike. Their affiliates were given negotiation playbooks. Groups like BlackCat/ALPHV were more volatile. Knowing which you're dealing with changes the entire negotiation calculus.
One of the most underappreciated skills in ransomware negotiation is reading a group's psychology in real time. Some groups respond to pressure; some respond to flattery; some will walk away from a negotiation if they sense bad faith, then publish data within hours. The negotiator's job is to manage the relationship in a way that keeps the window open.
The Exfiltration Bluff
A significant proportion of ransomware cases involve groups claiming to have exfiltrated data when they haven't — or claiming more data than they actually have. This is one of the most important leverage points available to a victim, but it requires the victim to actually understand their environment well enough to know what was genuinely accessed.
During initial IR engagement, a priority technical investigation should establish the volume and nature of any egress. If the group claims 2TB of exfiltrated data and the logs show 200MB of outbound traffic over the relevant period, that's a significant negotiating counter that can reduce the ransom demand substantially — or eliminate the data publication threat entirely if the bluff can be called.
This is also where pre-incident preparation matters enormously. Organisations that have data classification, network segmentation, and egress monitoring in place have a much clearer picture of what actually happened. Those that don't are flying blind and have to take the attacker's word for everything.
The Cryptocurrency Complication
Ransom demands are universally denominated in cryptocurrency — Bitcoin or, increasingly, Monero. This creates a layer of complexity that organisations are often unprepared for.
Converting fiat currency to Bitcoin in the volumes required takes time. Getting wallet addresses verified, understanding exchange rates, and executing a transfer that doesn't trigger AML alerts — these can take 24 to 48 hours. The more sophisticated ransomware groups know this and will pressure victims accordingly.
Organisations that have pre-established relationships with cryptocurrency exchanges — or have a designated intermediary such as a law firm or crypto-specialist broker — can move significantly faster. This isn't about being eager to pay. It's about not being structurally forced into accepting whatever terms are on the table because they ran out of time.
The OFAC and OFSI compliance dimension is real and non-trivial. Paying a group that is under sanctions — or that routes funds through sanctioned entities — creates serious legal exposure for the paying organisation. This screening should happen before any payment, ideally by counsel with specific sanctions experience. Ransomware groups are aware of this constraint and sometimes use it as leverage: "We know you're worried about sanctions — you should be. Pay us now and there's no issue." This is itself a pressure tactic, and a competent negotiator will know how to handle it.
What IR Professionals Don't Admit
The uncomfortable truth is that ransomware negotiation often succeeds not because of technical IR excellence, but because of patience, relationship management, and price arbitrage. The technical work — containment, forensic analysis, recovery — is necessary but rarely sufficient to resolve the situation without payment.
Most IR professionals won't tell you that they regularly recommend paying. Not because they've given up on recovery, but because they've done the cost-benefit analysis: the ransom is often cheaper than the recovery time, the business interruption, and the legal exposure from a prolonged incident. This calculation depends entirely on the organisation's backup quality, cyber insurance position, and regulatory exposure.
The other thing nobody says publicly: the "we never pay" stance is often performative. Many IR firms will privately counsel payment when the alternative is demonstrably worse. The public position of "never negotiate with terrorists" is understandable politics but poor incident response.
What Organisations Should Do Now
The time to build your ransomware negotiating position is before an incident occurs.
First, know your environment. Maintain an accurate asset inventory, understand what data you hold and where, and ensure you have meaningful egress monitoring. If you don't know what left your network, you can't challenge an attacker's exfiltration claims.
Second, have a cryptocurrency arrangement in place. Not to pay ransoms on principle — to have the option to pay quickly if necessary.
Third, build a relationship with a ransomware negotiation specialist before you need one. Not the incident response firm that will handle containment — a dedicated negotiation resource, ideally with direct experience against the major threat groups active in your sector. When you have three days to respond to a ransom demand, you do not want to be conducting a competitive tendering process at the same time.
Fourth, understand your regulatory position. Know whether your sector has mandatory incident reporting obligations that will be triggered. Understand OFAC and OFSI implications. Have legal counsel identified and on standby. The worst time to discover that your cyber insurance policy has a sanctions exclusion is when you're trying to decide whether to pay a ransom.
Ransomware incidents are not primarily technical problems. They are business continuity problems with technical dimensions. The organisations that navigate them best understand this distinction — and have built their response capabilities accordingly.
Facing an active ransomware incident?
We provide 24/7 ransomware response and negotiation support. Initial consultation is always without obligation.