Ransomware Response Playbook: The First 48 Hours
Critical window for recovery
Average incident cost
Incidents analyzed
Time is Critical
In ransomware incidents, the first 48 hours determine recovery success. This playbook provides hour-by-hour guidance for security teams and executives managing an active ransomware crisis.
When ransomware strikes, every minute counts. The decisions made in the first 48 hours can mean the difference between a controlled recovery and catastrophic business impact. This playbook provides a proven, hour-by-hour response framework based on hundreds of real-world incidents.
Whether you're a CISO facing your first ransomware attack or a CEO thrust into crisis mode, this guide provides the structure and decision frameworks you need to navigate the chaos effectively.
Hours 0-2: Discovery & Containment
Immediate Actions (First 30 Minutes)
Crisis Team Activation
- Activate incident response team immediately
- Establish command center (virtual or physical)
- Assign incident commander and scribe
- Start incident log with discovery time
- Notify cyber insurance carrier
Containment Actions
- Isolate infected systems - disconnect from network
- Disable automated backups temporarily
- Block command & control IPs at firewall
- Preserve evidence - take screenshots
- Do NOT power off systems (preserves memory)
Hours 2-6: Assessment & Critical Decisions
Impact Assessment
Systems Inventory
- Domain controllers status
- Email systems availability
- Critical business applications
- Backup infrastructure integrity
- Customer-facing systems
Data Assessment
- Encrypted data volumes
- Exfiltration indicators
- Backup viability testing
- Recovery point objectives
- Regulatory data exposure
Ransom Payment Decision Framework
Factors Against Payment
- No guarantee of data recovery
- Funds criminal operations
- May violate sanctions
- Insurance may not cover
- Sets precedent for future attacks
- Reputational damage
Factors Supporting Payment
- No viable backups exist
- Business survival at risk
- Customer data exposure imminent
- Recovery time exceeds tolerance
- Negotiated reduction possible
- Legal counsel approves
Legal Requirement: Always consult legal counsel and law enforcement before making payment decisions. OFAC sanctions and other regulations may prohibit payments to certain groups.
Hours 6-24: Recovery Planning
Recovery Priority Matrix
Priority | Systems | Target RTO |
---|---|---|
Critical | Authentication, Core Business Apps | 4-8 hours |
High | Email, CRM, Financial Systems | 24 hours |
Medium | File Shares, Collaboration Tools | 48 hours |
Low | Development, Test Environments | 72+ hours |
Team Assignments
- Technical Team: Clean systems, restore from backups
- Security Team: Forensics, threat hunting, hardening
- Communications: Stakeholder updates every 4 hours
- Legal/Compliance: Regulatory notifications, evidence preservation
- Business Continuity: Manual process implementation
Hours 24-48: Restoration & Hardening
Security Hardening Checklist
Compliance & Legal Actions
- File required breach notifications
- Document all recovery actions
- Preserve forensic evidence
- Update cyber insurance claim
- Schedule post-incident review
Communication Templates
Internal Staff Communication (Hour 4)
Subject: Important IT Security Update
Team,
We are currently experiencing a security incident affecting some of our IT systems. Our incident response team is actively working to resolve the situation.
What you need to do:
- Do not attempt to log into affected systems
- Report any suspicious emails or activities immediately
- Follow business continuity procedures shared by your manager
- Do not discuss this incident on social media
We will provide updates every 4 hours. Thank you for your patience and cooperation.
Customer Notification (Hour 24-48)
Subject: Important Security Update from [Company]
Dear Valued Customer,
We are writing to inform you of a cybersecurity incident that occurred on [DATE]. Upon discovery, we immediately took action to contain the incident and launched an investigation.
What we're doing:
- Working with cybersecurity experts to investigate
- Implementing additional security measures
- Cooperating with law enforcement
What you should do:
- Monitor your accounts for unusual activity
- Change passwords as a precaution
- Contact us with any concerns
We take the security of your data seriously and apologize for any inconvenience.
True Cost of Ransomware
Understanding the full financial impact helps justify prevention investments:
Post-48 Hour Actions
Week 1-2: Stabilization
- Complete forensic analysis
- Implement permanent security controls
- Conduct tabletop exercise with lessons learned
- Update incident response procedures
- Begin cyber insurance recovery process
Month 1-3: Transformation
- Implement zero-trust architecture
- Deploy advanced EDR/XDR solutions
- Establish 24/7 SOC monitoring
- Conduct organization-wide security training
- Review and update cyber insurance coverage
Prevention: Your Pre-Attack Checklist
Organizations with these controls in place recover 75% faster:
Technical Controls
Process Controls
Need help preparing for ransomware?
Get expert guidance on incident response planning and ransomware prevention.
Looking Ahead: Q4 2025 - 2026 Outlook
As we approach the final quarter of 2025, ransomware tactics continue to evolve. Double extortion attacks are now the norm, with threat actors not just encrypting data but threatening to leak it publicly. The average ransom demand has increased 45% year-over-year, making prevention more critical than ever.
By early 2026, we expect to see increased regulatory scrutiny on ransomware preparedness, with potential mandatory reporting requirements within hours of discovery. Organizations that haven't updated their incident response plans by Q4 2025 will face significantly higher recovery costs and regulatory penalties.
Executive Talking Points
For the Board
- Ransomware is now a when, not if scenario—87% of organizations will face an attempt
- Average total cost is $1.5M-$4.5M, far exceeding typical ransom demands
- Preparedness investments show 10:1 ROI vs. post-incident costs
For the C-Suite
- First 48 hours determine recovery trajectory—preparation is critical
- Customer trust evaporates quickly—communication planning is essential
- Cyber insurance alone isn't enough—active defense required
Critical Success Metrics
< 2 Hours
Detection to containment
< 48 Hours
Critical systems restored
< 7 Days
Full operations resumed
Don't Wait for the Ransom Note
87% of organizations will face ransomware this year. The prepared ones recover in days, not weeks. Get your incident response plan reviewed by experts who've managed 100+ ransomware incidents.
NonaSec specializes in ransomware preparedness and incident response services. Our team has successfully guided organizations through 100+ ransomware incidents, minimizing downtime and ensuring rapid recovery.