Anatomy of a ransomware attack – minute by minute

A Hungarian logistics company with 85 employees was hit by Royal ransomware in December 2024. It caused a three-day total outage, affecting 60 machines and servers. We take a minute-by-minute look at how it unfolded – and what ultimately protected the data.

The attack began at 02:14 on December 18, 2024, via a carelessly left open RDP port. The attacker then expanded in the following timeline:

T+0 – Penetration

Brute force attack on an admin account. Password policy was weak (12 characters, no MFA). Login successful within 41 minutes.

T+2 hours – Reconnaissance

The attacker used SoftPerfect Network Scanner to map the network. 60 servers, 3 ESXi hosts, one SAN storage, and – crucially – a Veeam backup server with write access to the backup storage.

T+5 hours – Lateral movement

Using PsExec, the attacker accessed the Veeam backup server as an administrator. Here, he first deleted the backup repository configuration and then destroyed the files that started the backup chain. The classic "attack the backups first" strategy.

T+11 hours – Coding

Ransomware was running on the file server and SAN from 06:00 AM. The Royal variant is encrypted with AES-256 combined with ChaCha20. The morning shift was unable to log in.

T+3 day – Recognition and negotiation

The company contacted a DFIR specialist firm. They found that the classic backup was unusable (the attacker deleted it), there was no shadow copy (because Royal deletes it by default), and the only usable version was an 11-day tape backup – with partial data loss.

The change: ViVeSec Box introduction

The company deployed ViVeSec Box in January 2025. The architecture has fundamentally changed: the backup chain is no longer managed by a traditional backup server, but by the hardened appliance. Compromising Windows-side admin authentication does not reach the immutable volumes of the ViVeSec Box (out-of-band management, RBAC, 4-eye principle).

The second testing

The company re-enacted the attack chain using a red-team simulation exercise. The result: the attacker reached the Windows backup coordinator, but was unable to modify the immutable storage of the ViVeSec Box. In an internal benchmark, Instant Recovery restored operating systems in 47 minutes – without a single day of downtime.

The difference is not in faster backups. The difference is that the attacker cannot delete them even if they have hacked everything on the Windows side.