Why ransomware assaults be triumphant even if backups exist

acronis hacked head holding.jpg


Personal holding head with the words hacked on the computer screen

Written by way of Subramani Raom Senior Supervisor, Cybersecurity Answers Technique at Acronis

Your backup plan almost certainly received’t continue to exist a ransomware assault. Why? As a result of backups fail all the way through ransomware assaults when attackers intentionally goal and ruin backup techniques ahead of launching encryption. In fashionable assaults, backup infrastructure is steadily uncovered, available and unprotected, making restoration unattainable. What will have to function a restoration mechanism turns into a unmarried level of failure as a substitute.

Platforms like Acronis Cyber Platform deal with this drawback by way of combining backup with safety controls comparable to immutability, get admission to coverage and danger detection.

For years, backups were situated as without equal fallback in cybersecurity technique, the make sure that despite the fact that techniques are compromised, restoration remains to be conceivable. However there’s a new, uncomfortable truth: Backups steadily fail all the way through ransomware assaults no longer as a result of they don’t exist however as a result of they’re uncovered, available and unprotected.

It’s no secret that the tempo and severity of ransomware assaults are regularly accelerating. The selection of assaults rose 50% remaining yr, in step with the Acronis Cyberthreats Record H2 2025. It’s time for IT and safety execs to reconsider long-standing assumptions about backup and restoration.

How attackers systematically damage backup methods

Maximum ransomware assaults practice a predictable series:

Preliminary get admission to → credential robbery → lateral motion → backup discovery → backup destruction → ransomware deployment

To forestall this chain, organizations want controls at each and every level. For instance, Acronis integrates endpoint coverage, credential tracking and backup coverage in a single platform to discover threats ahead of backups are compromised.

Backup techniques are hardly remoted. As soon as attackers acquire administrative credentials, they may be able to:

  • Enumerate backup servers and garage repositories.
  • Get admission to backup consoles by means of stolen credentials.
  • Delete or encrypt backup recordsdata and snapshots.
  • Disable backup brokers and scheduled jobs.
  • Adjust retention insurance policies to take away restoration issues.

Commonplace ways come with:

  • Deleting Quantity Shadow Copies (VSS) on Home windows techniques.
  • The usage of reputable admin gear (living-off-the-land ways).
  • Concentrated on hypervisor snapshots in digital environments.
  • Exploiting API get admission to to cloud backup garage.

By the point ransomware is completed, it’s too overdue. Restoration paths are already long past.

Safe your enterprise with built-in backup, fast crisis restoration, and AI‑powered endpoint safety and control.

Forestall threats faster, recuperate sooner, and simplify day-to-day IT paintings—all from a unmarried Acronis platform constructed to cut back complexity and downtime.

Enhance IT Resilience with Acronis

The commonest backup disasters in ransomware incidents

Throughout incident reaction investigations, a number of habitual weaknesses give an explanation for why backup and restoration ransomware methods fail.

No isolation between manufacturing and backup

Backup techniques steadily take a seat in the similar area, use the similar credentials and are reachable from compromised hosts. This removes any significant separation between manufacturing and backup techniques.

Vulnerable get admission to controls

Shared admin credentials, loss of multifactor authentication (MFA) and overprivileged carrier accounts give attackers simple access into backup infrastructure.

No immutability

If backups will also be changed or deleted, attackers will take away them. Conventional backups with out immutability be offering little resistance.

Untested restoration processes

Organizations regularly uncover all the way through an incident that backups are incomplete, corrupted or too gradual to revive at scale.

Siloed safety and backup gear

Backup techniques steadily function independently of safety tracking, so assaults on backup infrastructure pass undetected.

Why immutability is important for ransomware coverage

If backups will also be changed or deleted, attackers will take away them. Because of this conventional backups fail.

Immutable backups save you any adjustments or deletion for an outlined length, making sure a blank restoration level all the time exists. Acronis Cyber Platform supplies immutable garage with enforced retention insurance policies and coverage in opposition to credential misuse.

Key traits of immutable backup come with:

  • Write-once, read-many (WORM) garage.
  • Time-based retention locks.
  • Coverage in opposition to API and credential misuse.
  • Enforcement on the garage layer no longer simply instrument.

Although attackers acquire complete administrative get admission to, immutable backups stay intact. This guarantees {that a} blank restoration level all the time exists, which is very important for trade continuity.

Then again, immutability by myself isn’t sufficient. It will have to be mixed with get admission to regulate, tracking and restoration validation.

5 tactics to give protection to backups from ransomware

For controlled carrier suppliers (MSPs) and undertaking IT groups managing more than one environments, securing backups calls for consistency and standardization.

Key practices come with:

1. Put into effect id separation: Use devoted credentials and MFA

2. Isolate backup environments: Section networks and prohibit get admission to

3. Use immutable backups: Save you deletion or amendment

4. Track backup task: Locate odd conduct early

5. Check restoration often: Make certain backups will also be restored

Platforms like Acronis combine some of these functions right into a unmarried answer, lowering complexity and making improvements to resilience.

What to do if backups are already compromised

When backups are impacted all the way through a ransomware assault, restoration turns into considerably extra complicated.

Choices to rectify the location come with:

  • Figuring out older untouched backup copies in the event that they exist.
  • Leveraging off-site or cloud-based immutable garage.
  • Rebuilding techniques from blank baselines.
  • The usage of forensic research to resolve the remaining recognized excellent state.

This highlights a essential level: Restoration is not only about having backups however about having faithful backups.

Development a ransomware-resilient backup technique

The Acronis analysis is apparent: to give protection to backups from ransomware, organizations wish to transfer past conventional backup considering and undertake a resilience-first means.

MSPs and organizations having a look to make sure backups are secure from ransomware assaults will have to spend money on coverage answers like the ones within the Acronis Cyber Platform, which come with:

Integrating safety and backup

Backup techniques will have to no longer function in isolation. Detection, coverage and restoration will have to paintings in combination.

Automating coverage and restoration

Handbook processes fail underneath power. Automatic backup validation and restoration orchestration scale back chance.

Making sure end-to-end visibility

Safety groups want visibility into backup standing, anomalies and doable compromise signs.

Designing for assault eventualities

Think attackers will succeed in backup techniques and design controls accordingly.

The shift towards built-in cyber coverage

One of the crucial greatest gaps in conventional architectures is fragmentation. Separate gear for endpoint coverage, backup and tracking create blind spots that attackers exploit.

A simpler means is consolidating those functions right into a unified platform that may:

  • Locate threats ahead of backup compromise happens.
  • Offer protection to backup infrastructure with the similar rigor as manufacturing techniques.
  • Make certain restoration issues stay intact and verified.
  • Supply centralized visibility throughout environments.

Answers just like the Acronis Cyber Platform are designed round this built-in type, combining backup, cybersecurity and restoration control right into a unmarried operational framework. That type reduces complexity whilst making improvements to resilience.

Backups fail as a result of they’re uncovered

Backups nonetheless play a essential function in ransomware protection however provided that they’re designed to resist lively assaults.

The important thing takeaway is discreet: Backups fail no longer as a result of they’re lacking however as a result of they’re uncovered.

To make sure restoration in fashionable danger environments, organizations will have to reconsider backup structure with safety at its core, embracing immutability, isolation, tracking and integration.

In spite of everything, your backup is most effective as sturdy as its talent to continue to exist the assault.


Creator: Subramani Rao

 

Subramani Rao is Senior Supervisor, Cybersecurity Answers Technique at Acronis, the place he makes a speciality of answer technique, positioning, and go-to-market tasks throughout operational generation, trade continuity, and cyber coverage. He has greater than 15 years of cybersecurity enjoy throughout safety technique, chance, compliance, cloud, and resilience, and has helped organizations align safety results with broader trade priorities. He holds an Government MBA from London Trade College, an MSc in Pc Safety, and is CISSP qualified.

Subsidized and written by way of Acronis.


Leave a Comment

Your email address will not be published. Required fields are marked *