A multi-site ransomware attack shut down operations across Europe and the US. Here’s how we stabilised the environment, restored critical systems, and enabled the business to return to full operation.
A multinational pharmaceutical manufacturer suffered a devastating, multi-stage ransomware attack that took down its entire IT estate across five global sites. Infrastructure, directory services, virtualisation platforms, networks, firewalls, and endpoints were all compromised.
Every internal backup was destroyed.
Every system was offline.
Every site was fully operationally down.
The only surviving assets were the organisation’s immutable cloud backups, protected and managed through Direct Cloud Backup’s Fully Managed Backup & Disaster Recovery Service.
Thanks to these isolated backups — and a coordinated rebuild with global cyber-forensics specialists — the business was fully recovered.
The organisation had no clean environment to fail over into, and no active DR capability. Recovery required stabilising identity services before any restoration work could begin.
The attackers gained domain-level access by capturing Kerberos keys. From there, they moved laterally into VMware and implanted persistent access mechanisms. Server snapshots were damaged or removed, making on-premise recovery impossible.
This approach ensured recovery was controlled, verifiable, and secure at every stage.
Forensic analysis later revealed attackers had been inside the environment for six weeks before detonation. During this time, they:
The attackers successfully breached the organisation’s Kerberos authentication keys, giving them the ability to impersonate any account, including Domain Admin.
This gave them unrestricted access to:
Nothing was off-limits.
Once the attackers gained hypervisor control, they:
Destructive actions occurred in three phases:
This ensured no local recovery would be possible.
One domain controller was intentionally left active.
Its purpose:
Hundreds of endpoints were rendered inoperable.
When the attackers were ready:
Complete global outage in 12 minutes.
Internal backups were specifically targeted and destroyed.
But Direct Cloud Backup’s backups were:
This is the only reason the business was able to recover.
Within 12 hours, we:
This step prevented reinfection during recovery.
Because the original estate was irrecoverably compromised, we rebuilt core infrastructure from scratch:
This created a clean, stable environment for restoration.
Over six weeks, Direct Cloud Backup performed:
This was one of the largest coordinated restore efforts in the organisation’s history.
Once restored, we:
The new environment is significantly more secure than the original.
The business recovered fully without permanent data loss.
Production and operational systems were restored, identity was stabilised, and all global sites returned to operation.
| Global sites affected | 5 |
| Systems recovered | 100% |
| Critical data restored | 100% |
| Total data recovered | 875 GB+ |
| Time to full rebuild | 8 weeks |
| Outcome | The organisation adopted a modernised backup and DR strategy to reduce future exposure. |
Ransomware is now a chain of identity theft, persistence, exfiltration, and system destruction.
Active Directory compromise gives attackers unrestricted reach.
Unsupported servers and flat networks accelerate breach impact.
This organisation recovered because backups were isolated, immutable, and cloud-based.
Annual validation is essential. Most organisations don’t discover weaknesses until a real disaster.
Most can’t. Recovery depends on whether backups are isolated, tested, and viable — and whether identity systems can be rebuilt.
Verify backup configurations, immutability, and recovery readiness.
Review your DR design, risks, dependencies, and ability to restore critical systems.