Advisory

What Is Ransomware?

How ransomware works, how attacks start, and what to do if you are hit — from practitioners who respond to ransomware incidents every week.

The Definition

Ransomware is malicious software that encrypts a victim's files and demands payment in exchange for the decryption key. The name combines "ransom" and "software" — it is software designed to hold your data hostage.

In 2026, the term encompasses something more complex than simple encryption. Most ransomware attacks are double extortion operations: the attacker encrypts your files and steals a copy of your data, threatening to publish it unless a ransom is paid. Payment is demanded twice — once for decryption, once for suppression of the stolen data. Some groups have moved to pure extortion without encryption — theft and threatened publication only.

How Ransomware Works Technically

Understanding the technical mechanics helps explain why recovery is complicated.

Encryption

Ransomware typically uses a combination of asymmetric and symmetric encryption. A unique encryption key is generated for the victim (symmetric key), used to encrypt files, then itself encrypted using the attacker's public key (asymmetric). The victim cannot decrypt files without the attacker's private key — which they hold, and release only upon payment (when they choose to).

This is mathematically sound encryption — there is no way to break it without the private key. Claims from vendors that they can "decrypt without paying" are typically applicable only to specific groups whose encryption implementation had flaws, or where law enforcement seized decryption keys from infrastructure.

File Selection

Modern ransomware does not encrypt every file — it would take too long and is operationally unnecessary. Typically it targets specific file extensions (documents, databases, backups, virtual machine files), skips system files needed to keep Windows running (the ransom note needs to be displayed), and uses partial file encryption on large files to maximise speed.

This partial encryption is why some files appear intact after an attack but cannot be opened — the beginning of the file, containing format headers, has been encrypted while the remainder is unmodified.

Propagation

Ransomware spread across a network is typically not automatic worm-like propagation. In most enterprise incidents, the attacker deploys ransomware manually or via script from a compromised Domain Controller — pushing it to hundreds or thousands of systems simultaneously via Group Policy or remote management tools. This is why Active Directory compromise is the critical pivot point: once an attacker has domain admin, they can encrypt the entire estate in minutes.

How Attacks Start: Initial Access

The encryption event is usually weeks after the initial intrusion. How attackers get in:

The Ransomware-as-a-Service Model

Most major ransomware operations in 2026 are structured as Ransomware-as-a-Service (RaaS): a criminal organisation develops and maintains the ransomware platform, portal, and support infrastructure. Independent affiliates conduct the actual intrusions and deployments, earning 70–80% of ransom payments in exchange.

This industrialisation of ransomware has driven the explosion in attack volume. The barrier to entry for becoming a ransomware affiliate is access to a target — not technical capability. Affiliates purchase that access from initial access brokers or conduct their own phishing campaigns, deploy the platform they have licensed, and run negotiations through the RaaS portal.

Who Gets Hit

The short answer: everyone. The longer answer: ransomware groups prioritise victims with revenue above approximately £5–10 million and low perceived security investment relative to revenue. Healthcare, legal, professional services, and manufacturing are consistently high-frequency targets. Critical infrastructure — energy, water, transport — is targeted but with more selectivity due to law enforcement attention.

SMEs below the £5 million threshold are not immune — they are targeted by lower-tier affiliates, automated attacks, and as stepping stones to larger supply chain targets.

The Impact

Beyond the ransom demand itself, ransomware incidents typically cause:

Total incident cost, inclusive of all of the above, typically runs 3–10x the initial ransom demand in major incidents.

What to Do If You Are Hit

If you discover ransomware right now:

  1. Do not reboot or power off affected systems — isolate from the network by disconnecting cables
  2. Call an incident response firm immediately — before making any further decisions
  3. Do not use potentially compromised systems to communicate about the incident
  4. Notify your cyber insurer as soon as possible
  5. Preserve logs — export Windows event logs and firewall logs before they roll over
  6. Do not allow IT staff to "clean" systems without forensic guidance

See our full ransomware response checklist →

Prevention: What Actually Reduces Risk

Frequently Asked Questions

Can ransomware be decrypted without paying?

In rare cases — where law enforcement has seized decryption keys (as with LockBit infrastructure in 2024) or where a specific variant had encryption flaws — free decryptors are available. Check nomoreransom.org for your specific variant. For most active ransomware groups, decryption without the key is not possible.

Will my cyber insurance cover a ransomware attack?

Probably yes, partially. Most cyber policies cover ransom payments, IR costs, and business interruption — but with sublimits and conditions. Read your policy's extortion and ransom section specifically. Pre-insurer-approval of ransom payments is typically required.

Should I report ransomware to the police?

In the UK, report to Action Fraud and notify the NCSC for significant incidents. For incidents involving personal data, notify the ICO within 72 hours. Law enforcement involvement does not typically accelerate recovery but contributes to threat intelligence and may result in asset recovery in rare cases.

How long does ransomware recovery take?

For SMEs with intact backups: 2–4 weeks. For mid-market organisations with AD compromise and limited backups: 6–12 weeks. For large enterprises: 3–6 months is realistic. See our detailed recovery timeline guide →

Dealing With a Ransomware Incident?

Binary Response responds to ransomware incidents across the UK. Emergency response available now.

Contact Us Immediately