CG
SkillsRecovering from Ransomware Attack
Start Free
Back to Skills Library
Ransomware Defense🟡 Intermediate

Recovering from Ransomware Attack

Executes structured recovery from a ransomware incident following NIST and CISA frameworks, including environment isolation, forensic evidence preservation, clean infrastructure rebuild, prioritized system restoration from verified backups, credential reset.

7 min read8 code examples

Prerequisites

  • Incident declared and containment phase completed (all attacker access severed)
  • Forensic evidence preserved (disk images, memory dumps, network captures)
  • Backup integrity verified (immutable/air-gapped copies confirmed clean)
  • Clean build media available (OS installation media, golden images)
  • Recovery environment prepared (clean network segment isolated from compromised infrastructure)
  • Recovery priority list documented (Tier 1/2/3 systems in dependency order)

Recovering from Ransomware Attack

When to Use

  • After ransomware has encrypted production systems and the decision has been made to recover from backups
  • When building or validating a ransomware recovery runbook before an actual incident
  • After receiving a decryption key (paid ransom or law enforcement provided) and needing to safely decrypt
  • When partial recovery is needed alongside decryption of remaining systems
  • Conducting a recovery drill to validate RTO commitments

Do not use before completing containment and forensic scoping. Premature recovery without understanding the attacker's access and persistence mechanisms risks re-infection.

Prerequisites

  • Incident declared and containment phase completed (all attacker access severed)
  • Forensic evidence preserved (disk images, memory dumps, network captures)
  • Backup integrity verified (immutable/air-gapped copies confirmed clean)
  • Clean build media available (OS installation media, golden images)
  • Recovery environment prepared (clean network segment isolated from compromised infrastructure)
  • Recovery priority list documented (Tier 1/2/3 systems in dependency order)

Workflow

Step 1: Establish Clean Recovery Environment

Build recovery infrastructure isolated from the compromised network:

# Create isolated recovery VLAN
# No connectivity to compromised network segments
# Dedicated internet access for patch downloads only (via proxy)

# Recovery network architecture:
# VLAN 999 (Recovery) - 10.99.0.0/24
#   - Recovery workstations (10.99.0.10-20)
#   - Recovered DCs (10.99.0.50-55)
#   - Recovered servers (10.99.0.100+)
#   - Proxy for internet (10.99.0.1) - patches and updates only

# Firewall rules: DENY all from recovery VLAN to production VLANs
# Allow: Recovery VLAN -> Internet (HTTPS only, via proxy)
# Allow: Recovery VLAN -> Backup infrastructure (restore traffic only)

Step 2: Recover Identity Infrastructure First

Active Directory must be recovered before any domain-joined systems:

# AD Recovery Procedure
# Step 2a: Restore AD from known-good backup
# Use DSRM (Directory Services Restore Mode) boot

# 1. Build clean Windows Server from ISO
# 2. Promote as DC using AD restore
# 3. Restore System State from immutable backup

# Verify AD backup is pre-compromise
# Check backup timestamp against earliest known compromise date
wbadmin get versions -backuptarget:E: -machine:DC01

# Restore system state in DSRM
wbadmin start systemstaterecovery -version:02/15/2026-04:00 -backuptarget:E: -machine:DC01 -quiet

# After restore, reset critical accounts
# Reset krbtgt password TWICE (invalidates all Kerberos tickets)
# This prevents Golden Ticket persistence
Import-Module ActiveDirectory
Set-ADAccountPassword -Identity krbtgt -Reset -NewPassword (ConvertTo-SecureString "NewKrbtgt2026!Complex#1" -AsPlainText -Force)
# Wait for replication (minimum 12 hours), then reset again
Set-ADAccountPassword -Identity krbtgt -Reset -NewPassword (ConvertTo-SecureString "NewKrbtgt2026!Complex#2" -AsPlainText -Force)

# Reset all privileged account passwords
$privilegedGroups = @("Domain Admins", "Enterprise Admins", "Schema Admins", "Administrators")
foreach ($group in $privilegedGroups) {
    Get-ADGroupMember -Identity $group -Recursive | ForEach-Object {
        Set-ADAccountPassword -Identity $_.SamAccountName -Reset `
            -NewPassword (ConvertTo-SecureString (New-Guid).Guid -AsPlainText -Force)
        Set-ADUser -Identity $_.SamAccountName -ChangePasswordAtLogon $true
    }
}

# Validate AD health
dcdiag /v /c /d /e /s:DC01
repadmin /showrepl

Step 3: Validate Backup Integrity Before Restoration

# Scan backup files for ransomware artifacts before restoring
# Use offline antivirus scanning on backup mount

# Mount backup as read-only
mount -o ro,noexec /dev/backup_lv /mnt/backup_verify

# Scan with ClamAV
clamscan -r --infected --log=/var/log/backup_scan.log /mnt/backup_verify

# Check for known ransomware indicators
find /mnt/backup_verify -name "*.encrypted" -o -name "*.locked" \
    -o -name "*.lockbit" -o -name "DECRYPT_*" -o -name "readme.txt" \
    -o -name "RECOVER-*" -o -name "HOW_TO_*" | tee /var/log/ransomware_check.log

# Verify database consistency (SQL Server example)
# Restore database to temporary instance for validation
RESTORE VERIFYONLY FROM DISK = '/mnt/backup_verify/databases/erp_db.bak'
    WITH CHECKSUM

Step 4: Restore Systems in Priority Order

Follow dependency-based recovery sequence:

Recovery Order:
Phase 1 (Hours 0-4): Identity & Infrastructure
  1. Domain Controllers (AD, DNS, DHCP)
  2. Certificate Authority (if applicable)
  3. Core network services (DHCP, NTP)

Phase 2 (Hours 4-12): Critical Business Systems
  4. Database servers (SQL, Oracle, PostgreSQL)
  5. Core business applications (ERP, CRM)
  6. Email (Exchange, M365 hybrid)

Phase 3 (Hours 12-24): Important Systems
  7. File servers
  8. Web applications
  9. Monitoring and security tools (SIEM, EDR)

Phase 4 (Hours 24-48): Remaining Systems
  10. Development environments
  11. Archive systems
  12. Non-critical applications
# Veeam Instant Recovery - fastest restore for VMware/Hyper-V
# Boots VM directly from backup file, then migrates to production storage

# Instant recovery for Tier 1 system
Start-VBRInstantRecovery -RestorePoint (Get-VBRRestorePoint -Name "DC01" |
    Sort-Object CreationTime -Descending | Select-Object -First 1) `
    -VMName "DC01-Recovered" `
    -Server (Get-VBRServer -Name "esxi01.recovery.local") `
    -Datastore "recovery-datastore"

# After validation, migrate to production storage
Start-VBRQuickMigration -VM "DC01-Recovered" `
    -Server (Get-VBRServer -Name "esxi01.prod.local") `
    -Datastore "production-datastore"

Step 5: Validate Recovered Systems and Harden

Before connecting recovered systems to production:

# Check for persistence mechanisms
# Scheduled Tasks
Get-ScheduledTask | Where-Object {$_.State -ne "Disabled"} |
    Select-Object TaskName, TaskPath, State, Author |
    Export-Csv C:\recovery\scheduled_tasks.csv

# Services
Get-Service | Where-Object {$_.StartType -eq "Automatic"} |
    Select-Object Name, DisplayName, StartType, Status |
    Export-Csv C:\recovery\auto_services.csv

# Startup items
Get-CimInstance Win32_StartupCommand |
    Select-Object Name, Command, Location, User |
    Export-Csv C:\recovery\startup_items.csv

# WMI event subscriptions (common persistence)
Get-WmiObject -Namespace root\subscription -Class __EventFilter
Get-WmiObject -Namespace root\subscription -Class __EventConsumer

# Registry run keys
Get-ItemProperty "HKLM:\Software\Microsoft\Windows\CurrentVersion\Run"
Get-ItemProperty "HKLM:\Software\Microsoft\Windows\CurrentVersion\RunOnce"
Get-ItemProperty "HKCU:\Software\Microsoft\Windows\CurrentVersion\Run"

# Verify no unauthorized admin accounts
Get-LocalGroupMember -Group "Administrators"
Get-ADGroupMember -Identity "Domain Admins"

# Apply latest patches before connecting to production
Install-WindowsUpdate -AcceptAll -AutoReboot

Step 6: Phased Network Reconnection

Phase 1: Reconnect identity infrastructure
  - DCs online in production VLAN
  - Validate replication and authentication
  - Monitor for suspicious authentication patterns

Phase 2: Reconnect Tier 1 systems
  - One system at a time
  - Monitor EDR for 1 hour before proceeding to next
  - Validate application functionality

Phase 3: Reconnect remaining systems
  - Groups of 5-10 systems
  - Continue monitoring for re-infection indicators

Throughout: SOC monitoring on high alert
  - EDR in aggressive blocking mode
  - All previous IOCs loaded in detection rules
  - Canary files deployed on recovered systems

Key Concepts

TermDefinition
DSRMDirectory Services Restore Mode: special boot mode for domain controllers that allows AD database restoration
krbtgt ResetResetting the krbtgt account password twice invalidates all Kerberos tickets, defeating Golden Ticket persistence
Instant RecoveryBackup technology that boots a VM directly from backup storage for immediate availability while migrating data in background
Evidence PreservationMaintaining forensic images and logs before recovery begins, required for law enforcement and insurance claims
Clean BuildRebuilding systems from trusted installation media rather than attempting to clean infected systems
Dependency ChainThe order in which systems must be recovered based on service dependencies (e.g., AD before domain members)

Tools & Systems

  • Veeam Instant Recovery: Boots VMs directly from backup with near-zero RTO, then live-migrates to production
  • Microsoft DSRM: AD-specific recovery mode for restoring domain controllers from backup
  • DSInternals PowerShell Module: Validates AD database integrity and identifies compromised credentials post-recovery
  • Rubrik Instant Recovery: Mounts backup as live VM in seconds for rapid recovery validation
  • ClamAV: Open-source antivirus for scanning backup files before restoration

Common Scenarios

Scenario: Manufacturing Company Full Recovery After LockBit Attack

Context: A manufacturer with 300 servers has 80% of infrastructure encrypted by LockBit. Immutable backups from 48 hours ago are verified clean. Production lines are down, costing $500K/day.

Approach:

  1. Establish recovery VLAN (10.99.0.0/24) isolated from compromised network
  2. Restore 2 domain controllers from immutable backup using Veeam Instant Recovery (2 hours)
  3. Reset krbtgt password twice with 12-hour gap, reset all admin passwords
  4. Validate AD with dcdiag, scan for Golden Ticket indicators with DSInternals
  5. Restore ERP database (SAP) and verify data consistency (4 hours)
  6. Restore MES (Manufacturing Execution System) and SCADA historians (3 hours)
  7. Bring production line controllers online in isolated OT network first
  8. Phased reconnection over 48 hours with continuous EDR monitoring
  9. Total recovery: 72 hours (within 96-hour RTO commitment)

Pitfalls:

  • Rushing to reconnect systems without validating absence of persistence mechanisms, causing re-infection
  • Restoring from the most recent backup without verifying it predates the compromise (attacker may have poisoned recent backups)
  • Not resetting the krbtgt password twice, allowing attackers to maintain Golden Ticket access
  • Restoring systems in the wrong order (application servers before their database dependencies)

Output Format

## Ransomware Recovery Status Report

**Incident ID**: [ID]
**Recovery Start**: [Timestamp]
**Current Phase**: [1-4]
**Estimated Completion**: [Timestamp]

### Recovery Progress
| Phase | Systems | Status | Started | Completed | RTO Target |
|-------|---------|--------|---------|-----------|------------|
| 1 - Identity | DC01, DC02, DNS | Complete | HH:MM | HH:MM | 4 hours |
| 2 - Critical | ERP, DB01, DB02 | In Progress | HH:MM | -- | 12 hours |
| 3 - Important | FS01, Email, Web | Pending | -- | -- | 24 hours |
| 4 - Remaining | Dev, Archive | Pending | -- | -- | 48 hours |

### Validation Checklist
- [ ] AD integrity verified (dcdiag, repadmin)
- [ ] krbtgt password reset (2x with interval)
- [ ] All admin passwords reset
- [ ] Persistence mechanisms scanned
- [ ] EDR deployed and active on recovered systems
- [ ] IOCs loaded in detection rules
- [ ] Canary files deployed

Verification Criteria

Confirm successful execution by validating:

  • [ ] All prerequisite tools and access requirements are satisfied
  • [ ] Each workflow step completed without errors
  • [ ] Output matches expected format and contains expected data
  • [ ] No security warnings or misconfigurations detected
  • [ ] Results are documented and evidence is preserved for audit

Compliance Framework Mapping

This skill supports compliance evidence collection across multiple frameworks:

  • SOC 2: CC7.2 (Anomaly Detection), CC7.4 (Incident Response), CC7.5 (Recovery)
  • ISO 27001: A.12.2 (Malware Protection), A.12.3 (Backup), A.16.1 (Incident Management)
  • NIST 800-53: SI-3 (Malicious Code Protection), CP-9 (System Backup), IR-4 (Incident Handling)
  • NIST CSF: PR.IP (Information Protection), DE.CM (Continuous Monitoring), RC.RP (Recovery Planning)

Claw GRC Tip: When this skill is executed by a registered agent, compliance evidence is automatically captured and mapped to the relevant controls in your active frameworks.

Deploying This Skill with Claw GRC

Agent Execution

Register this skill with your Claw GRC agent for automated execution:

# Install via CLI
npx claw-grc skills add recovering-from-ransomware-attack

# Or load dynamically via MCP
grc.load_skill("recovering-from-ransomware-attack")

Audit Trail Integration

When executed through Claw GRC, every step of this skill generates tamper-evident audit records:

  • SHA-256 chain hashing ensures no step can be modified after execution
  • Evidence artifacts (configs, scan results, logs) are automatically attached to relevant controls
  • Trust score impact — successful execution increases your agent's trust score

Continuous Compliance

Schedule this skill for recurring execution to maintain continuous compliance posture. Claw GRC monitors for drift and alerts when re-execution is needed.

Use with Claw GRC Agents

This skill is fully compatible with Claw GRC's autonomous agent system. Deploy it to any registered agent via MCP, and every execution will be logged in the tamper-evident audit trail.

// Load this skill in your agent
npx claw-grc skills add recovering-from-ransomware-attack
// Or via MCP
grc.load_skill("recovering-from-ransomware-attack")

Tags

ransomwarerecoveryincident-responsebackupdefense

Related Skills

Ransomware Defense

Implementing Ransomware Backup Strategy

7m·intermediate
Ransomware Defense

Detecting Ransomware Precursors in Network

8m·intermediate
Ransomware Defense

Implementing Immutable Backup with Restic

3m·intermediate
Ransomware Defense

Performing Ransomware Tabletop Exercise

7m·intermediate
Ransomware Defense

Deploying Ransomware Canary Files

3m·intermediate
Ransomware Defense

Implementing Honeypot for Ransomware Detection

8m·intermediate

Skill Details

Domain
Ransomware Defense
Difficulty
intermediate
Read Time
7 min
Code Examples
8

On This Page

When to UsePrerequisitesWorkflowKey ConceptsTools & SystemsCommon ScenariosOutput FormatRansomware Recovery Status ReportVerification CriteriaCompliance Framework MappingDeploying This Skill with Claw GRC

Deploy This Skill

Add this skill to your Claw GRC agent and start automating.

Get Started Free →