Most enterprise backup environments were built for hardware failures, accidental deletion, or a clean disaster scenario. Ransomware breaks those assumptions because the attacker’s goal is to remove your ability to restore quickly.
They don’t just “land and encrypt” anymore. They move laterally, study the environment, and target what will hurt most: backup servers, VSS snapshots, hypervisor layers, admin credentials, and anything that can restore at scale. If backups are online, domain-joined, or reachable from compromised credentials, they’re in play.
Even when backups aren’t encrypted, they can still be unusable. Backup chains break, catalog metadata gets damaged, and incrementals depend on a full that’s now corrupted. Add delayed detection and you may find your newest restore points carry the same compromise, which is why ransomware data recovery often becomes a trust problem, not a restore problem.