What Is Ransomware?
In short: Ransomware is malicious software that encrypts your files or locks your systems and demands payment — typically in cryptocurrency — to restore access. In 2026, ransomware is present in 44% of all data breaches globally, costs victims an average of $5.08 million per disclosed incident, and attacks a new organization every few seconds. It is no longer a niche threat — it is the defining cybercrime of this era.
Key facts at a glance:
| Metric | 2026 Figure | Source |
|---|---|---|
| Ransomware protection market size | $32.6 billion (2024), growing to $123B by 2034 | Grand View Research |
| Share of breaches involving ransomware | 44% | Verizon DBIR 2025 |
| Average cost per incident | $5.08 million (disclosed) | IBM 2025 |
| U.S. attacks in 2025 | 5,010 confirmed incidents (+50% YoY) | Cyble 2025 |
| Median ransom payment | $267,500 | Palo Alto Networks 2025 |
| Estimated annual cost by 2031 | $265–$275 billion | Cybersecurity Ventures |
| SMBs hit by ransomware | 88% experienced a breach (2025) | Verizon DBIR 2025 |
| Attacks that go unreported | ~85% | BlackFog Q3 2025 |
Who is targeted: Every sector. Healthcare, manufacturing, government, education, financial services, and technology are among the hardest hit. But ransomware operators also target individuals, small businesses, and critical infrastructure utilities. No organization is too small to be a target — in fact, small and midsize businesses face the highest attack rates.
Table of Contents
What Is Ransomware? {#what-is-ransomware}
Simple version: Ransomware is a type of malware that locks your files or computer and demands money to unlock them. One day everything works fine; the next, you get a message saying pay up or lose your data forever.
Technical version: Ransomware is a category of malicious software that uses strong asymmetric cryptography (typically AES-256 for file encryption combined with RSA-2048 for key protection) to render files inaccessible on infected systems. The decryption key is held by the attacker, who demands payment — almost always in cryptocurrency — before releasing it. Modern variants also exfiltrate data prior to encryption, creating a second layer of extortion leverage.
Real-world analogy: Imagine coming home to find every room in your house padlocked, with a note on the door saying a stranger has the only keys and will sell them back to you for $50,000 in Bitcoin within 72 hours. That is exactly what ransomware does to your digital infrastructure — and the threat to “burn the house down” if you don’t pay (by publishing your data publicly) is now standard practice.
According to the Cybersecurity and Infrastructure Security Agency (CISA), ransomware is “an ever-evolving form of malware designed to encrypt files on a device, rendering any files and the systems that rely on them unusable.” What the formal definition doesn’t convey is the operational reality: modern ransomware doesn’t just encrypt files. It paralyzes business processes, disrupts mission-critical services, and can take entire hospital networks or municipal systems offline for days or weeks.
A Brief History
Ransomware is not new. The first known ransomware attack — the AIDS Trojan — was distributed via floppy disk in 1989. But the threat remained mostly theoretical until 2013, when CryptoLocker introduced Bitcoin payments and made attacks scalable and anonymous. The 2017 WannaCry attack infected over 200,000 systems across 150 countries in a single day, causing an estimated $4–8 billion in damages and signaling to criminals that ransomware was an industrial-grade business model.
By 2020, ransomware had become a mature criminal economy. Today in 2026, it is driven by Ransomware-as-a-Service (RaaS) platforms, AI-assisted phishing, and supply chain attacks — all designed to maximize reach and ransom yield while minimizing attacker risk.
Why It Matters More in 2026
Three forces have amplified ransomware’s danger in the current landscape:
- AI-powered attacks. Generative AI now writes convincing phishing emails without grammatical errors, automates reconnaissance, and accelerates the reconnaissance phase. AI-generated phishing lures increase click-through rates by up to 54% (Cybersecurity Ventures, 2026 forecast).
- The RaaS economy. Criminal developers package ransomware into subscription services, allowing even technically unskilled actors to launch enterprise-grade attacks. This has flooded the market with affiliates and new groups — Cyble tracked 57 new ransomware groups and over 350 new ransomware strains in 2025 alone.
- Multi-extortion pressure. Modern attacks layer encryption, data theft, DDoS threats, and direct contact with a victim’s clients or regulators to maximize payment pressure. Refusing to pay no longer simply means losing your files — it may mean regulatory fines, client notifications, and public data leaks.
How Ransomware Works: The Full Attack Chain {#how-ransomware-works}
Understanding how ransomware operates — step by step — is the foundation of preventing it. Attackers follow a consistent operational playbook that MITRE ATT&CK documents extensively. Here is how a modern ransomware attack unfolds:
Phase 1: Initial Access
Every ransomware attack begins by breaking into a target environment. In 2026, the most common initial access vectors are:
- Phishing emails — malicious attachments or links that execute a downloader (52% of attacks targeting managed service providers used phishing in 2025, per Hornetsecurity)
- Compromised credentials — stolen usernames and passwords purchased on dark web markets or obtained via credential stuffing (responsible for 23% of ransomware incidents in 2025, per Statista)
- Unpatched vulnerabilities — exploiting known flaws in internet-facing systems like VPNs, RDP endpoints, or web applications
- Remote Desktop Protocol (RDP) exploitation — exposed RDP ports remain one of the most abused vectors; the Dharma, Shade, and SamSam ransomware families all relied on it extensively
- Supply chain compromise — breaching a trusted software vendor or IT provider to gain access to their downstream clients at scale (the 2023 MOVEit Transfer breach and 2021 Kaseya attack are the defining examples)
Phase 2: Execution and Establishing a Foothold
Once inside, the attacker executes the initial payload — often a lightweight dropper or a remote access tool (RAT) — and establishes persistence. The goal is to remain undetected while expanding access. This stage often involves:
- Disabling security tools using techniques like “Bring Your Own Vulnerable Driver” (BYOVD) attacks that exploit legitimate drivers to disable endpoint detection and response (EDR) solutions
- Credential dumping using tools like Mimikatz to harvest stored passwords and access tokens
- Lateral movement — spreading across the network, escalating privileges, and identifying valuable systems
A critical and often overlooked step: modern ransomware operators specifically seek out and attempt to compromise backup systems at this stage. If your backups are accessible from the same network, they become a target.
Phase 3: Reconnaissance and Data Exfiltration
Before a single file is encrypted, sophisticated operators spend days or weeks mapping the environment: identifying crown-jewel data, understanding business processes, and locating backup infrastructure. In 2025, 83% of ransomware attacks compromised the identity infrastructure before deploying the encryption payload (Semperis Ransomware Risk Report).
Data exfiltration occurs next. Attackers copy sensitive data — financial records, customer PII, intellectual property, healthcare records — to attacker-controlled servers. This data becomes leverage for double or triple extortion. In 2025, 50% of attacks combined encryption with data theft rather than relying on encryption alone.
Phase 4: Encryption
With reconnaissance complete, the attacker triggers the encryption payload — often timed for weekends or holidays when IT staff are minimal. Modern ransomware can encrypt large datasets in minutes, outpacing human detection and response windows.
The encryption process typically:
- Deletes shadow copies and system restore points (removing the easiest recovery path)
- Terminates processes associated with databases, email servers, and backup agents
- Encrypts files using AES-256 or similar strong symmetric encryption
- Appends custom file extensions (.locked, .akira, .qilin, etc.) to encrypted files
- Drops a ransom note in each directory explaining payment terms
Phase 5: Extortion and Negotiation
The ransom note directs victims to a Tor-based negotiation portal — often with a countdown timer, a live chat interface, and a proof-of-decryption option (where attackers decrypt one test file to prove the key works).
Modern ransomware operations like LockBit 5.0 use private negotiation portals with individualized credentials for each affiliate — designed to manage negotiations professionally and maximize payment rates. Some groups like Dark Angels recovered $75 million in a single ransom payment in 2024.
The decision to pay is complex: 15% of victims who paid did not receive working decryption keys (Semperis, 2025), and 83% of paying victims were attacked again afterward.
Types of Ransomware {#types-of-ransomware}
Ransomware has evolved well beyond a single monolithic category. In 2026, security teams need to understand the full taxonomy of ransomware variants to deploy the right defenses.
| Type | What It Does | Who It Targets | Notable Examples |
|---|---|---|---|
| Crypto Ransomware | Encrypts files using strong cryptography | All sectors | LockBit, REvil, WannaCry |
| Locker Ransomware | Locks the entire device without encrypting files | Individuals, SMBs | WinLocker, Police Ransomware |
| Double Extortion | Encrypts data AND threatens to publish stolen data | Enterprises, healthcare | Maze, Cl0p, BlackCat |
| Triple Extortion | Adds DDoS or direct victim-client contact threats | Critical infrastructure | Vice Society, Ragnar Locker |
| Ransomware-as-a-Service (RaaS) | Criminal subscription model enabling affiliate attackers | Any sector | RansomHub, Akira, Play |
| Wiper Ransomware | Destroys data permanently, no decryption offered | Nation-state targets | NotPetya, HermeticWiper |
| Mobile Ransomware | Targets smartphones and tablets | Individuals | Simplocker, Doublelocker |
| Cloud/SaaS Ransomware | Targets cloud storage, SaaS platforms | Enterprises | Emerging, SaaS data at risk |
Crypto Ransomware
The most prevalent form. Crypto ransomware targets individual files — documents, images, databases, source code — and renders them unreadable without the attacker’s decryption key. It is designed to be surgical: the infected system continues operating, so victims can see the ransom note clearly. Crypto ransomware accounted for 85% of ransomware attacks that used encryption in 2024.
When it typically strikes: After hours or on weekends, when response times are slowest.
Locker Ransomware
Rather than encrypting files, locker ransomware blocks access to the entire device — the operating system becomes inaccessible, and a full-screen ransom note replaces the normal interface. While less technically sophisticated than crypto ransomware, it is highly effective against individuals and organizations without security tools capable of OS-level protection.
Who it targets: Primarily consumers and small businesses using unmanaged endpoints.
Double Extortion Ransomware
The standard operating model for professional ransomware groups in 2026. Attackers exfiltrate sensitive data before encrypting it, then demand payment not just for decryption but also to prevent the data from being published on leak sites on the dark web. Double extortion became baseline behavior because it provides leverage against victims who have good backups — since even with a perfect backup, the threat of data exposure remains.
Cl0p’s 2023 MOVEit Transfer campaign exemplified this model at industrial scale, compromising hundreds of organizations without deploying traditional ransomware encryption at all — pure data theft and extortion.
When to choose the right defense: Preventing exfiltration requires stopping attackers during the reconnaissance phase, not just the encryption phase. Network segmentation, data loss prevention (DLP), and early behavioral detection are the relevant controls.
Triple Extortion Ransomware
Triple extortion layers an additional threat on top of double extortion — typically either a distributed denial-of-service (DDoS) attack against the victim’s systems, or direct outreach to the victim’s clients, partners, and regulators to apply additional pressure. The Vice Society ransomware group used this model to attack the San Francisco Bay Area Rapid Transit system in 2023.
In 2024–2025, triple extortion evolved further: some groups began contacting individual employees of targeted organizations, threatening personal exposure unless the organization paid.
Ransomware-as-a-Service (RaaS)
The most consequential development in the ransomware ecosystem. RaaS transformed ransomware from a niche skill into a scalable criminal franchise model. Developers maintain the ransomware codebase, infrastructure, and negotiation portals. Affiliates — who need little technical skill — rent access and launch attacks, paying the developers a cut (typically 20–30%) of each ransom collected.
The result is an industrialized market. In Q2 2025, the top six RaaS variants — Akira, Qilin, Lone Wolf, Silent Ransom, Shiny Hunters, and DragonForce — accounted for over 50% of all tracked ransomware attacks (Coveware). Major RaaS platforms offer:
- Turnkey ransomware payloads customized per target
- Negotiation playbooks and live chat portals for managing victim communications
- Data leak sites for double extortion pressure
- Revenue-sharing models similar to legitimate affiliate programs
- Technical support and “customer service” for affiliates
Law enforcement takedowns of LockBit (February 2024) and BlackCat/ALPHV (December 2023) demonstrated that even major RaaS platforms can be disrupted — but the ecosystem always rebuilds. LockBit re-emerged with version 5.0 in September 2025 despite significant law enforcement pressure.
Wiper Ransomware
A particularly destructive variant that disguises itself as ransomware but is designed for permanent destruction rather than financial gain. NotPetya (2017) and HermeticWiper (2022) caused billions in damage without any functioning decryption mechanism — the ransom demand was a smokescreen. Wiper ransomware is predominantly associated with nation-state threat actors pursuing geopolitical objectives.
The key distinction: If there is no legitimate negotiation channel and no proof-of-decryption offered, suspect wiper ransomware. Recovery requires clean backups.
Ransomware Attack Vectors: How Attackers Get In {#attack-vectors}
Understanding initial access vectors is the most actionable intelligence for prevention. The top vectors in 2025–2026, ranked by frequency:
1. Phishing and Social Engineering (Primary Vector)
Phishing remains the most common ransomware delivery mechanism globally. In 2025, 19% of ransomware incidents involved a malicious email as the root cause (Statista), and phishing accounted for 52% of all attacks targeting managed service providers (Hornetsecurity).
Modern phishing in 2026 is AI-enhanced: generative AI creates personalized emails in perfect grammatical English, impersonates trusted colleagues or vendors, and eliminates the classic red flags (poor spelling, generic greetings) that security training taught employees to spot. Deepfake audio and video calls are used in high-value business email compromise (BEC) scenarios to impersonate executives.
The primary defense: Phishing-resistant multi-factor authentication (MFA), email filtering with sandboxing, and regular simulated phishing training.
2. Compromised Credentials (Fast-Growing)
In 2025, 23% of ransomware incidents resulted from compromised credentials (Statista). Attackers purchase stolen usernames and passwords from dark web markets (often sourced from prior data breaches), then use credential stuffing tools to test them against VPN portals, cloud services, and remote access systems.
The Change Healthcare attack — the largest healthcare data breach in U.S. history, affecting 192.7 million individuals — was traced to a single set of compromised Citrix credentials with no multi-factor authentication. Total costs exceeded $3 billion (AHA).
The primary defense: Phishing-resistant MFA on all remote access, credential breach monitoring, and enforced password hygiene. Microsoft data indicates that 99.9% of compromised accounts lacked MFA.
3. Unpatched Vulnerabilities (Fastest-Growing)
Exploitation of known vulnerabilities in internet-facing systems is the fastest-growing initial access vector. Attackers monitor CISA’s Known Exploited Vulnerabilities (KEV) catalog and race to exploit newly patched vulnerabilities before organizations can apply patches. In 2026, the window between vulnerability disclosure and active exploitation has shrunk to days or even hours for high-severity flaws.
VMware ESXi hypervisors have been a major target, with CISA confirming exploitation of CVE-2025-22225 in active ransomware campaigns in early 2026. The strategic logic: compromise a hypervisor and you can encrypt every virtual machine it hosts in a single operation.
The primary defense: Vulnerability management with priority on CISA’s KEV catalog, automated patch deployment for critical systems, and attack surface reduction.
4. Remote Desktop Protocol (RDP) Exploitation
Exposed RDP ports (TCP 3389) remain a persistent attack surface. Attackers use automated scanners like Shodan to identify internet-exposed RDP, brute-force or purchase credentials, then log in as legitimate users. RDP access allows complete interactive control of the target system with no malware required in the initial stages — making detection difficult.
The primary defense: Disable RDP where not needed; where required, restrict access behind a VPN with MFA, implement account lockout policies, and enable Network Level Authentication (NLA).
5. Supply Chain Attacks (Highest-Impact)
Rather than attacking a single target, supply chain attacks compromise a trusted vendor or software provider to access their downstream clients simultaneously. The 2021 Kaseya attack affected at least 1,500 of its MSP customers from a single compromise. The MOVEit Transfer breach in 2023 ultimately exposed data from hundreds of organizations globally.
In 2025–2026, Bitdefender observed ransomware groups scaling supply chain attacks through identity-first compromise — breaching authentication platforms and SaaS providers that serve healthcare, financial services, and manufacturing clients.
The primary defense: Third-party vendor risk management, least-privilege access for all vendor accounts, and contractual security requirements. CISA specifically advises that MSPs “should only have access to devices and servers that are within their role or responsibilities.”
6. Malvertising and Drive-By Downloads
Malicious advertisements served through legitimate ad networks can deliver ransomware payloads to visitors who simply load a web page — no click required on vulnerable browsers. Drive-by downloads exploit browser vulnerabilities or plugin flaws.
The primary defense: Keep browsers and plugins current; use ad-blocking on enterprise endpoints; disable auto-execution of scripts.
The Real Cost of a Ransomware Attack {#real-cost}
The ransom payment is frequently the smallest component of a ransomware attack’s total cost. Organizations and individuals need to understand the full financial and operational impact to make rational investment decisions about prevention.
Direct Financial Costs
Ransom payment: The median ransom payment in 2025 was $267,500 (Palo Alto Networks), down from higher peaks as more organizations refused to pay. The largest single ransom payment documented was $75 million paid to the Dark Angels group. Total global ransomware revenue tracked by Chainalysis fell from $1.25 billion in 2023 to $813 million in 2024 as more victims declined to pay — but total incident costs continued rising.
Recovery costs: Recovery consistently dwarfs ransom payments. The average total cost of a ransomware attack — including downtime, recovery, and reputational damage — ranges between $1.8 million and $5 million per incident in 2025. For healthcare organizations, the average breach cost reached $7.42 million per incident (IBM, 2025).
Operational Costs
Downtime: Organizations subject to a ransomware attack endure an average of 24 days of disruption. For healthcare organizations, downtime costs average $1.9 million per day. The Change Healthcare attack disrupted prescription processing across the United States for weeks.
Data recovery: Even when organizations pay, data restoration is not guaranteed. Only 64.8% of healthcare data was recovered even after paying. In 2025, just 16% of victims fully recovered within 24 hours of an attack.
Leadership impact: In a quarter of ransomware cases, organizational leadership was replaced following an attack (Sophos, 2025) — a statistic that reframes ransomware as a career and organizational governance risk, not just an IT problem.
Reputational and Legal Costs
- 60% of ransomware victims lost revenue beyond the direct attack costs
- 53% reported brand damage following an attack
- Regulatory fines for data breaches involving personal data (under GDPR, HIPAA, state breach notification laws) compound direct costs significantly
- Class-action litigation risk is increasing as breach notification requirements expand globally
The Cyber Insurance Gap
Cyber insurance has become the primary financial backstop for ransomware — but coverage is frequently insufficient:
- 42% of companies with cyber insurance reported that their policy compensated for only a fraction of total damages
- 23% of ransom payments are funded by cyber insurance
- Insurers are tightening requirements: proof of MFA, immutable backups, and endpoint detection and response (EDR) are increasingly mandatory for policy issuance or renewal
- Premium costs have risen dramatically as claims frequency has increased
The strategic takeaway: Cyber insurance is a supplement to prevention, not a replacement for it. Organizations that invest in prevention consistently see lower premiums and better coverage terms.
Who Gets Targeted and Why {#who-gets-targeted}
The ransomware threat landscape has democratized: every sector and organization size is now a viable target. But attackers are rational economic actors who prioritize victims by expected yield, ease of compromise, and likelihood of payment.
By Industry
| Industry | Why Targeted | Key Stat |
|---|---|---|
| Healthcare | Critical data, operational urgency, payment pressure | 238 ransomware incidents (2024); avg. $7.42M breach cost (IBM) |
| Manufacturing | Operational disruption creates maximum payment pressure | 31% of manufacturing cyber incidents used ransomware |
| Education | Underfunded IT, vast student/faculty data | 4,484 weekly attacks; double the average attack rate |
| Government | Sensitive citizen data; service disruption is politically costly | Top target for major groups including Qilin, Play |
| Financial Services | High-value data; heavily regulated creates compliance pressure | Major target for credential-based attacks |
| Technology/MSPs | Breach one MSP = access to dozens of clients | Supply chain attacks scaling rapidly in 2025–2026 |
| Energy/Utilities | Attacks on OT can cause physical outcomes | 42% YoY surge in attacks; CISA issued urgent advisory Jan 2025 |
Healthcare remains the most expensive industry for ransomware. The sector’s combination of life-critical operational dependency, vast stores of sensitive protected health information (PHI), and chronic underfunding of cybersecurity makes it uniquely vulnerable. The Change Healthcare attack in 2024–2025 — traced to compromised credentials with no MFA — affected an estimated 192.7 million individuals and cost UnitedHealth Group approximately $3 billion.
Education faces disproportionate attack volumes, with K-12 schools experiencing over 4,484 weekly attacks in 2024. Limited IT budgets, large populations of students and staff sharing networks, and minimal security tooling make educational institutions accessible targets for RaaS affiliates seeking easy payouts.
Manufacturing is increasingly targeted because operational technology (OT) disruptions translate directly into production line shutdowns — creating immediate, quantifiable financial pressure. Ransomware used in 31% of manufacturing incidents, often halting production entirely until payment.
By Organization Size
Contrary to the perception that ransomware only targets large enterprises, the data shows small and midsize businesses (SMBs) bear the greatest attack frequency:
- Micro businesses (1–10 employees) are the most commonly targeted, representing the largest share of victims
- Small businesses (11–100 employees) account for 29.7% of ransomware victims
- Enterprises ($5B+ revenue) face a 67% annual attack rate due to larger ransom potential
- 88% of SMBs experienced ransomware-driven breaches in 2025 (Verizon DBIR)
- 75% of SMBs could not continue operating if hit with ransomware (Spin.AI)
- Only 14% of SMBs are prepared to face a ransomware attack (Spin.AI)
The reason SMBs are disproportionately targeted is structural: they have valuable data and operational dependencies but lack dedicated security staff, advanced tooling, and mature incident response capabilities. RaaS affiliates treat them as high-volume, low-resistance targets.
By Geography
The United States is the single largest target for ransomware globally, accounting for 47% of tracked ransomware attacks in 2023 and recording over 1.3 million ransomware detections in 2024 (Statista). In early 2026, 53 distinct ransomware groups were actively claiming U.S. victims — a level of ecosystem fragmentation that represents a structural shift from the era of dominant mega-syndicates.
The top five most active groups targeting U.S. organizations in Q1 2026 include Qilin, Akira, Clop, INC Ransom, and Play (Bitdefender, 2026).
Ransomware in 2026: What Has Changed {#ransomware-2026}
The ransomware threat of 2026 is materially different from what it was even two years ago. Understanding these shifts is essential for defenders building or updating their security programs.
1. AI Has Entered the Attack Chain
Generative AI has removed one of the last reliable indicators of phishing: poor grammar and obvious inauthenticity. AI-powered ransomware operations in 2026 use large language models to write hyper-personalized phishing emails, generate deepfake audio and video of executives, accelerate target reconnaissance, and create polymorphic malware that evades signature-based detection.
The FBI, CISA, and cybersecurity researchers uniformly flag AI-enhanced social engineering as a top emerging threat. Practically, this means human-judgment-based phishing detection has become unreliable as a standalone control. Technical controls — phishing-resistant MFA, email authentication (DMARC/SPF/DKIM), sandbox analysis — matter more than ever.
2. Double Extortion Is Now the Baseline
As of 2025–2026, double extortion — exfiltrating data before encrypting it — is the standard operating model for professional ransomware groups, not an advanced tactic. This fundamentally changed the value of backups as a sole recovery strategy: even organizations with perfect, tested backups face data breach notification obligations, regulatory scrutiny, and client trust damage if their data is published.
The implication is that ransomware prevention must now address data exfiltration (the early-stage threat) as aggressively as it addresses encryption (the late-stage event). Network segmentation, data loss prevention, behavioral detection, and identity security are the relevant controls for this phase.
3. The RaaS Market Is Fragmenting and Accelerating
Following law enforcement takedowns of LockBit (February 2024) and BlackCat/ALPHV (December 2023), the prediction was a slowdown in ransomware activity. The opposite occurred. Cyble documented 57 new ransomware groups emerging in 2025, with nearly 6,500 total incidents — the second-highest year on record. The RaaS ecosystem absorbed the disruption and fragmented into a larger number of smaller, more agile groups.
LockBit itself re-emerged as LockBit 5.0 in September 2025. Qilin became the most active group in Q3 2025, averaging 75 victims per month. The market dynamics resemble competitive tech ecosystems: takedowns of dominant players create opportunities for competitors rather than overall market collapse.
4. Identity Infrastructure Is the New Primary Target
Ransomware groups in 2026 increasingly prioritize credential theft and identity infrastructure compromise over direct exploitation. 83% of ransomware attacks compromised identity infrastructure in 2025 (Semperis). Groups like ShinyHunters and LAPSUS$ demonstrated that breaching authentication platforms and SaaS providers creates massive downstream access at minimal cost and noise.
The practical shift: perimeter-based defenses are insufficient. The assumption must be that credentials can and will be compromised, making phishing-resistant MFA, privileged access management (PAM), and continuous identity monitoring foundational controls rather than optional enhancements.
5. Backup and EDR Systems Are Active Targets
Attackers now specifically seek out and attempt to disable backup infrastructure and endpoint detection tools during the reconnaissance phase. BYOVD (Bring Your Own Vulnerable Driver) attacks — which use legitimate, signed drivers to disable EDR and antivirus solutions — have become a standard ransomware tactic in 2026. CISA specifically warns that “an organization cannot afford to assume that any endpoint security solution provides adequate coverage against these defense-evasion methods.”
The response: immutable, air-gapped backups (inaccessible from the primary network), backup credential isolation, and layered endpoint security that doesn’t rely on a single EDR product.
6. The Extortion-Only Model Is Emerging
In 2024, just 3% of ransomware attacks involved extortion without any encryption — pure data theft followed by a pay-or-publish ultimatum. By 2025, that figure had risen to 6% (Programs.com). Skipping encryption reduces the operational complexity of an attack and removes the need to deploy and manage encryption infrastructure — while maintaining the core extortion leverage through data theft alone.
Defenders should not assume that “no encryption detected” means a ransomware attack has failed. Monitoring for data exfiltration indicators is now a critical detection capability independent of encryption activity.
What to Expect in the Next 12–24 Months
- AI-native ransomware operations that automate the full attack chain from reconnaissance through negotiation
- Cloud and SaaS platform targeting at greater scale (SaaS data already targeted in over half of ransomware attacks, Vikingcloud 2026)
- OT and critical infrastructure attacks that cause physical consequences — production line shutdowns, utility disruptions
- Tighter regulatory requirements — mandatory ransomware incident reporting, cyber insurance controls requirements, and international coordination through the Counter Ransomware Initiative
- Zero-day exploit acceleration — faster exploitation of newly disclosed vulnerabilities as automated exploit toolkits improve
Real-World Ransomware Examples {#real-world-examples}
Concrete cases illustrate what ransomware looks like in practice — and what it costs when defenses fail.
Change Healthcare (2024–2025): The Largest Healthcare Breach in U.S. History
What happened: The ALPHV/BlackCat ransomware group compromised Change Healthcare — a major U.S. healthcare payment processor — by using stolen credentials to access a Citrix portal that lacked multi-factor authentication. The breach disrupted prescription processing for pharmacies across the United States for weeks.
The impact: Approximately 192.7 million individuals had their data exposed — making it the largest healthcare data breach in U.S. history. UnitedHealth Group disclosed total costs of approximately $3 billion. The root cause: compromised credentials on a system with no MFA.
The lesson: A single missing control (MFA) on a single externally accessible system caused catastrophic, enterprise-wide consequences.
Colonial Pipeline (2021): Ransomware Hits Critical Infrastructure
What happened: The DarkSide ransomware group compromised Colonial Pipeline — a critical fuel pipeline serving the U.S. East Coast — via a compromised VPN account with no MFA. Colonial paid $4.4 million in ransom and shut down pipeline operations preemptively, causing fuel shortages across six states.
The impact: Colonial paid $4.4 million (the FBI subsequently recovered $2.3 million). The operational shutdown caused fuel shortages and a state of emergency declaration in multiple states. The attack directly triggered expanded U.S. federal cybersecurity mandates for critical infrastructure.
The lesson: Ransomware targeting operational technology (OT) environments can cause physical, real-world consequences far beyond data loss.
MOVEit Transfer / Cl0p (2023): Supply Chain at Scale
What happened: The Cl0p ransomware group exploited a zero-day vulnerability in Progress Software’s MOVEit Transfer file-sharing product to simultaneously access sensitive data from hundreds of organizations that used the software — including government agencies, financial institutions, and healthcare providers globally.
The impact: Hundreds of organizations affected; tens of millions of individuals’ data exposed. The attack required no traditional ransomware encryption — it was a pure data extortion campaign, demonstrating that double extortion can succeed without the encryption component.
The lesson: Software supply chain vulnerabilities can be weaponized to attack hundreds of organizations simultaneously. Zero-day patch management and vendor risk management are critical.
Kaseya VSA (2021): MSP Attack with Downstream Impact
What happened: The REvil ransomware group exploited vulnerabilities in Kaseya’s VSA remote monitoring and management software — used by managed service providers (MSPs) — to deploy ransomware to at least 1,500 of Kaseya’s MSP customers and their downstream clients in a single operation.
The impact: Thousands of businesses affected across multiple countries. Ransom demand was $70 million for a universal decryptor. The FBI obtained the decryption key and shared it with affected organizations weeks later.
The lesson: Attacks targeting MSP infrastructure multiply the blast radius of a single compromise by orders of magnitude. Third-party risk management is not optional.
How to Prevent Ransomware: Complete Prevention Guide {#prevention-guide}
Ransomware prevention is not a single product or setting — it is a layered security architecture designed to interrupt the attack chain at multiple stages. CISA and NIST both publish authoritative frameworks; what follows translates those frameworks into actionable priorities for organizations of all sizes.
Priority 1: Multi-Factor Authentication (MFA) — Implement Immediately
MFA is the single highest-ROI control available against ransomware. Microsoft data indicates that MFA blocks 99.9% of automated credential-based attacks. Given that compromised credentials drive 23% of ransomware incidents, and that the Change Healthcare attack was enabled by a single MFA-less portal, the business case for MFA is unambiguous.
Implementation guidance:
- Deploy MFA on all remote access systems first (VPNs, RDP, cloud portals, email)
- Prioritize phishing-resistant MFA for administrator accounts — hardware security keys (FIDO2/WebAuthn) eliminate MFA fatigue attacks entirely
- Avoid SMS-based MFA for high-privilege accounts (vulnerable to SIM swapping)
- Block legacy authentication protocols that bypass modern MFA requirements
- Apply conditional access policies that escalate authentication requirements based on location, device, and risk signals
CISA’s #StopRansomware Guide specifically mandates MFA implementation as a baseline control aligned with NIST’s Cybersecurity Performance Goals (CPGs).
Priority 2: Patch Management — Close the Vulnerability Window
Unpatched vulnerabilities in internet-facing systems are the fastest-growing initial access vector. The window between public vulnerability disclosure and active ransomware exploitation has shrunk to days in 2026. A calendar-based patch cycle is insufficient — organizations need risk-based, KEV-driven prioritization.
Implementation guidance:
- Subscribe to CISA’s Known Exploited Vulnerabilities (KEV) catalog and prioritize patching listed vulnerabilities immediately
- Establish patch SLAs by severity: critical internet-facing vulnerabilities within 24–72 hours of KEV listing
- Maintain a current, accurate inventory of all internet-facing assets — you cannot patch what you cannot see
- Pay special attention to VPN appliances, remote desktop gateways, web-facing applications, and hypervisors
- Automate patch deployment for non-critical systems to reduce operational overhead
Priority 3: Immutable Backups (The 3-2-1-1-0 Rule)
Tested, immutable backups are the ransomware recovery safety net. But in 2026, attackers specifically target backup infrastructure — making traditional backup approaches insufficient.
The 3-2-1-1-0 backup rule (updated for ransomware resilience):
- 3 copies of data total
- 2 different storage media types
- 1 copy offsite (geographically separate)
- 1 copy offline, air-gapped, or immutable (inaccessible from the primary network)
- 0 unverified backups — test restores regularly, document RTO/RPO
Implementation guidance:
- Implement immutable storage (WORM — Write Once, Read Many) that cannot be overwritten or deleted, even by administrators with full credentials
- Isolate backup credentials from production credentials — if attackers compromise your production environment, they should not automatically have access to backup management interfaces
- Test restoration procedures at least quarterly — a backup that has never been tested is not a backup
- Protect the backup of backup solutions: Domain Controllers, Active Directory, and identity infrastructure should have their own isolated backup processes
- Critical data: back up daily or hourly; less critical data: weekly or monthly
Priority 4: Endpoint Detection and Response (EDR)
EDR solutions provide behavioral monitoring of endpoints — detecting suspicious activities like mass file encryption, shadow copy deletion, credential dumping, and lateral movement — rather than relying solely on malware signatures. In 2026, EDR is a baseline control, not an advanced capability.
Key considerations:
- Deploy EDR agents across all endpoints, including servers and cloud workloads
- Configure EDR to automatically isolate suspected compromised endpoints (host isolation) to prevent lateral movement
- Protect your EDR itself against BYOVD attacks — use EDR products with tamper protection and kernel-level protection enabled
- Consider layering EDR with network detection and response (NDR) for visibility into lateral movement across the network
- Extend detection to cloud environments with cloud workload protection (CWPP)
For guidance on enterprise-grade security tools, see our Best Cybersecurity Tools for Enterprise analysis.
Priority 5: Network Segmentation
Network segmentation limits ransomware’s ability to spread laterally once it is inside your environment. If every system can communicate freely with every other system, a single compromised endpoint becomes a jumping-off point for full network compromise.
Implementation guidance:
- Segment IT and OT (operational technology) networks — production systems should not be reachable from general corporate networks
- Segment by business function: separate HR systems, finance systems, and production systems into distinct network zones
- Implement firewall rules that enforce least-privilege communication between segments
- For cloud environments: use virtual private clouds (VPCs), security groups, and network access control lists (NACLs) to achieve equivalent segmentation
- Apply Zero Trust network access (ZTNA) principles: assume breach, verify every access request, enforce least privilege per session
Priority 6: Email Security and Phishing Defense
Since phishing is the most common ransomware delivery vector, hardening email infrastructure is foundational. Advanced email security goes well beyond spam filtering.
Implementation guidance:
- Deploy DMARC, SPF, and DKIM email authentication to prevent domain spoofing (verify your records are in enforcement mode, not monitor-only)
- Implement email gateway sandboxing that detonates attachments and URLs in an isolated environment before delivery
- Block macro-enabled Office documents from external sources by default
- Disable automatic execution of attachments and scripts
- Conduct regular simulated phishing exercises — not just annual awareness training. The FBI and CISA recommend ongoing training programs calibrated to current threat actor tactics
- Implement a clear, frictionless reporting mechanism for employees to flag suspicious emails
Priority 7: Privileged Access Management (PAM)
Attackers who gain initial access immediately seek to escalate privileges. Privileged access management controls who can do what with administrative credentials.
Implementation guidance:
- Implement least-privilege access: users should have only the minimum permissions required for their role
- Separate administrative accounts from daily-use accounts — administrators should not use their privileged credentials for email and web browsing
- Use a PAM solution to vault and manage privileged credentials, with session recording for audit purposes
- Implement Just-in-Time (JIT) access for administrative tasks — elevated privileges expire after a defined time window
- Review privileged access at least monthly and remove stale accounts immediately
Priority 8: Incident Response Planning
Organizations with tested incident response plans recover significantly faster from ransomware attacks. Only 22% of organizations that felt “very well prepared” beforehand recovered within 24 hours — but that is dramatically better than the broader average of 16% full recovery within 24 hours in 2025.
The core elements of a ransomware incident response plan:
- Detection and triage — who is alerted, how incidents are triaged, what constitutes a ransomware indicator
- Containment — who has authority to isolate systems, what is the isolation procedure, how to preserve forensic evidence
- Communication — internal notification chain, external communications (legal, PR), regulatory notification obligations (and timelines)
- Legal and ransom payment decision — pre-establish your decision framework with legal counsel; understand OFAC sanctions implications for ransom payments
- Recovery — sequence for restoration, priority systems, clean build procedures
- Post-incident review — root cause analysis, lessons learned, remediation tracking
Exercise your plan. Tabletop exercises that walk leadership through a simulated ransomware scenario reveal gaps that paper plans miss. Run them at minimum annually; quarterly for organizations in high-risk sectors.
Priority 9: Employee Security Awareness Training
Humans remain a critical variable in ransomware attacks. Security awareness training in 2026 must go beyond annual compliance videos to address current attacker tactics — including AI-generated phishing, deepfake voice calls, and social engineering via messaging platforms.
Effective training practices:
- Regular simulated phishing campaigns calibrated to current threats
- Specific training for high-risk roles: finance staff (BEC/invoice fraud), executives (CEO fraud/whaling), IT staff (technical social engineering)
- Clear procedures for reporting suspicious emails, calls, or messages
- Training on recognizing early ransomware indicators: unexpected file extension changes, missing files, slow system performance, unusual network activity
Priority 10: Zero Trust Architecture
Zero Trust is the strategic framework that integrates the above controls into a coherent defensive posture. The core principle: never trust implicitly, always verify. This means verifying every access request as though it originates from an untrusted network — regardless of whether it comes from inside the corporate perimeter.
CISA, NIST, and ENISA all recommend Zero Trust adoption as critical for modern ransomware defense. In practice, Zero Trust implementation is a multi-year journey. Start with identity (MFA + PAM), extend to endpoints (EDR + device compliance), then to network segments and applications.
The Ransomware Prevention Checklist
Use this checklist to audit your current ransomware defense posture:
Identity and Access
- [ ] MFA enabled on all remote access (VPN, RDP, cloud portals, email)
- [ ] Phishing-resistant MFA deployed for all administrator accounts
- [ ] Legacy authentication protocols blocked
- [ ] Privileged accounts separated from standard user accounts
- [ ] Monthly privileged access review with documentation
Patching and Vulnerability Management
- [ ] CISA KEV catalog subscribed; vulnerabilities remediated per SLA
- [ ] Automated patch deployment for non-critical systems
- [ ] Internet-facing asset inventory current and reviewed regularly
- [ ] Vulnerability scanning conducted monthly (minimum)
Backups
- [ ] 3-2-1-1-0 backup rule implemented
- [ ] Immutable backups verified with restore tests (quarterly minimum)
- [ ] Backup credentials isolated from production credentials
- [ ] Backup systems not accessible from primary network
Endpoint and Network
- [ ] EDR deployed across all endpoints and servers
- [ ] EDR tamper protection enabled
- [ ] Network segmentation implemented between critical systems
- [ ] IT/OT networks segmented
Email and Phishing
- [ ] DMARC in enforcement mode (p=reject or p=quarantine)
- [ ] Email gateway with attachment sandboxing deployed
- [ ] Macro execution blocked for external documents
- [ ] Phishing simulations conducted quarterly
Incident Response
- [ ] Written ransomware incident response plan in place
- [ ] IR plan exercised via tabletop (annual minimum)
- [ ] Legal counsel pre-briefed on ransom payment decision framework
- [ ] Regulatory notification obligations documented with timelines
- [ ] Cyber insurance policy reviewed and adequate
Ransomware Response: What to Do If You’re Hit {#response-guide}
If you discover a ransomware infection, the first 30 minutes are critical. Decisions made (or not made) in this window determine whether the attack is contained or spreads across your entire environment.
Immediate Response (First 30 Minutes)
Step 1: Isolate immediately. Disconnect affected systems from the network — unplug ethernet cables, disable Wi-Fi. Do not shut the system down (this may destroy volatile forensic evidence). Isolate from all network connectivity including VPNs, shared drives, and cloud sync.
Step 2: Identify the scope. Which systems are showing ransomware indicators? Check for unusual file extensions, ransom notes, and slow performance. Map affected systems before taking further action.
Step 3: Activate your incident response plan. Notify your IR team, IT leadership, and legal counsel simultaneously. If you do not have internal IR capacity, contact a qualified incident response firm immediately. Time matters.
Step 4: Preserve forensic evidence. Before reimaging any system, capture memory (RAM) if possible, preserve system logs, and document everything observed. Forensic evidence is required for law enforcement engagement and insurance claims.
Step 5: Do not pay the ransom immediately. Pause before making any payment decision. Consult legal counsel (OFAC sanctions may prohibit payment to certain groups), contact your cyber insurance provider, and engage law enforcement. FBI and CISA strongly discourage ransom payment — it does not guarantee recovery and funds future attacks.
Reporting to Law Enforcement
Report ransomware incidents to:
- FBI Internet Crime Complaint Center (IC3): ic3.gov
- CISA: cisa.gov/report (24/7 incident reporting)
- Local FBI field office for major incidents
Reporting is not just a civic obligation — law enforcement has recovered decryption keys and disrupted ransomware operations that have directly benefited victims who reported promptly. The FBI obtained and distributed the Kaseya/REvil decryption key to victims who had reported.
Recovery Sequencing
Once containment is confirmed, recovery follows a deliberate sequence:
- Verify and restore from clean backups — prioritize business-critical systems (identity infrastructure first, then core business applications)
- Rebuild compromised systems from scratch — do not reconnect systems that were infected without a full wipe and rebuild; assume any data on affected systems may be compromised
- Reset all credentials — assume all credentials in the affected environment are compromised; perform a full credential reset across the organization
- Patch the initial access vector — do not reconnect to the network until the vulnerability that enabled initial access is identified and remediated
- Conduct forensic analysis — understand how attackers got in, what they accessed, and what data was exfiltrated before deploying encryption
How to Get Started With Ransomware Protection {#get-started}
Where you start depends on your current security maturity and resources. Here is a practical roadmap by organization type.
For Individuals and Home Users
Your highest-priority actions:
- Enable MFA on all important accounts (email, financial, cloud storage) — most platforms support authenticator apps
- Keep systems updated — enable automatic updates for your operating system, browser, and key applications
- Maintain offline backups — use an external hard drive disconnected when not in use, or a cloud backup service with versioning
- Install reputable security software — antivirus with ransomware protection capabilities provides a meaningful layer of defense
For comprehensive protection software recommendations, see our Best Antivirus Software guide.
For Small and Midsize Businesses
Your 90-day priority roadmap:
Days 1–30: Deploy MFA on all remote access; inventory internet-facing assets; enroll in CISA’s KEV notifications; verify you have functional, tested backups.
Days 31–60: Deploy EDR across all endpoints; implement email authentication (DMARC/SPF/DKIM in enforcement mode); conduct a simulated phishing exercise; draft a basic incident response plan.
Days 61–90: Implement network segmentation between critical systems; run a ransomware tabletop exercise with leadership and legal; review cyber insurance coverage; establish a patch SLA process tied to the KEV catalog.
A managed security service provider (MSSP) can accelerate this roadmap significantly for organizations without internal security staff. For enterprise-grade security tools aligned with NIST frameworks, see our Best Cybersecurity Tools analysis.
For Enterprises
Enterprise ransomware defense requires a programmatic approach aligned with NIST’s Cybersecurity Framework (CSF) and CISA’s CPGs:
- Identify: Comprehensive asset inventory, risk assessment, vendor risk program
- Protect: MFA, PAM, EDR, network segmentation, Zero Trust architecture
- Detect: SIEM, NDR, behavioral analytics, 24/7 SOC coverage
- Respond: Tested IR plan, legal pre-engagement, public communications templates
- Recover: Tested backups, business continuity plan, documented RTO/RPO
For VPN solutions that align with zero trust principles, see our Best VPN Services guide. For password and credential management at scale, see our Best Password Managers analysis.
Frequently Asked Questions {#faq}
What is ransomware and how does it work?
Ransomware is malicious software that encrypts your files or locks your systems and demands payment — typically in cryptocurrency — to restore access. Attackers first gain entry through phishing emails, compromised credentials, or unpatched vulnerabilities. They then spread through your network, steal sensitive data, and deploy the encryption payload — rendering files inaccessible. A ransom note with payment instructions and a deadline is left on the infected system. Modern ransomware also exfiltrates data before encrypting, creating a second lever: pay or your data gets published publicly.
Should you pay the ransom?
FBI, CISA, and virtually all cybersecurity authorities recommend against paying ransoms. Reasons: 15% of victims who pay do not receive working decryption keys; 83% of victims who pay are attacked again; ransom payment funds future criminal operations; and OFAC sanctions may prohibit payment to certain designated ransomware groups, creating legal liability. The better path is investing in prevention, tested backups, and an incident response plan that reduces your dependence on the decryption key. That said, ransom payment is ultimately a business decision that should be made with legal counsel after exhausting all alternatives.
What are the most common ways ransomware enters a system?
The top entry points in 2025–2026 are: (1) phishing emails — malicious attachments or links exploiting human trust; (2) compromised credentials — stolen passwords used to log into VPNs, RDP, or cloud services; (3) unpatched vulnerabilities in internet-facing systems; (4) exposed Remote Desktop Protocol (RDP) ports; and (5) supply chain attacks via compromised software vendors or IT providers. Of these, phishing and compromised credentials are consistently the most common across all organization sizes.
How much does a ransomware attack cost?
The ransom payment is typically the smallest component. The median ransom payment in 2025 was $267,500 (Palo Alto Networks). But total incident costs — including downtime, recovery, regulatory fines, legal fees, and reputational damage — range from $1.8 million to $5 million per incident on average, with healthcare incidents averaging $7.42 million (IBM, 2025). Companies endure an average of 24 days of operational disruption. In 25% of cases, organizational leadership is replaced following a ransomware attack.
Can ransomware be removed without paying?
Sometimes, but it depends on the specific ransomware variant and your preparedness. The No More Ransom project (nomoreransom.org), a joint initiative by law enforcement and cybersecurity firms, provides free decryption tools for many ransomware families. Law enforcement operations have also resulted in decryption keys being recovered and distributed. However, for current, professionally operated ransomware variants, free decryption is not reliably available. The most reliable path to recovery remains clean, tested backups — which is why immutable, offline backup architecture is the foundational ransomware resilience control.
Is ransomware a criminal offense?
Yes. Ransomware attacks are criminal offenses under federal law in the United States (Computer Fraud and Abuse Act, 18 U.S.C. § 1030), and under equivalent laws in virtually every jurisdiction globally. International law enforcement — including the FBI, Europol, the UK’s National Crime Agency, and others — actively investigate and prosecute ransomware operators. The FBI Internet Crime Complaint Center (IC3) received 3,156 ransomware complaints in 2024, representing a 33% increase in losses from 2023. Victims are encouraged to report to the FBI’s IC3 (ic3.gov) and CISA.
What is Ransomware-as-a-Service (RaaS)?
Ransomware-as-a-Service is a criminal subscription model in which ransomware developers lease their malware infrastructure to affiliates who conduct attacks. Developers maintain the ransomware code, negotiation portals, and data leak sites; affiliates pay a percentage of collected ransoms (typically 20–30%). RaaS has dramatically lowered the technical barrier to conducting ransomware attacks, flooding the ecosystem with affiliates and creating the industrialized, scalable threat landscape of 2026. Active RaaS platforms include Akira, RansomHub, Play, and Qilin.
What industries are most targeted by ransomware?
Healthcare experiences the highest per-incident costs ($7.42 million average, IBM 2025) and the most persistent targeting (238 incidents in 2024). Manufacturing faces the most operationally disruptive attacks, with 31% of manufacturing cyber incidents involving ransomware. Education faces the highest attack frequency relative to its size (4,484 weekly attacks, double the average). Government, financial services, energy/utilities, and technology/MSPs are consistently in the top targets across all reporting sources.
What is the difference between ransomware and other malware?
The defining characteristic of ransomware is extortion: it actively demands payment from the victim. Other malware types — spyware, adware, banking trojans — typically operate covertly to steal data or resources without announcing their presence. Ransomware deliberately announces itself after causing damage, because the business model depends on the victim knowing they have been attacked and choosing to pay. Wiper malware superficially resembles ransomware (and sometimes carries a ransom note as cover) but is designed for permanent destruction without a functional decryption mechanism.
How effective are backups against ransomware?
Backups are the most reliable ransomware recovery mechanism — but only if they are properly implemented. Backups that are accessible from the primary network can themselves be encrypted by ransomware. The 3-2-1-1-0 rule addresses this: maintain at least one copy that is offline, air-gapped, or immutable (WORM storage), and verify backups with regular tested restoration. In 2025, 97% of organizations that had data encrypted were able to recover it via backups, decryption tools, or payments (Sophos). However, recovery did not prevent data exfiltration, which is why backup resilience alone is insufficient — preventing exfiltration requires stopping attackers earlier in the attack chain.
What is the future of ransomware?
Experts project ransomware will cost victims $265–$275 billion annually by 2031, with attacks occurring every two seconds. The near-term trajectory for 2026–2027 includes: AI-native attack automation from reconnaissance through negotiation; greater focus on cloud and SaaS platform targeting; OT attacks with physical consequences; accelerating supply chain infiltration; and tighter regulatory requirements for ransomware reporting and cyber insurance controls. The fundamental dynamic — that cybercrime economies are rational and adaptive — means the threat will continue evolving as fast as defenders develop countermeasures. Organizations that build resilience (not just prevention) are best positioned for this environment.
How can I tell if my system has been infected with ransomware?
Early warning indicators include: files suddenly bearing unusual extensions (.locked, .akira, .qilin, or random strings); inability to open files that previously worked; presence of a text or HTML file labeled “READ_ME,” “DECRYPT_FILES,” or similar in multiple directories; sudden and unusual file system activity (mass file modifications) visible in system monitoring; missing or inaccessible shadow copies and backup files; and system performance degradation due to intensive encryption activity. If you observe these signs, immediately disconnect the affected system from all network connections — wired and wireless — and contact your IT team or incident response provider. Do not restart or shut down the system before forensic triage.
