The attack began at 02:14 on December 18, 2024, via a carelessly left open RDP port. The attacker then expanded in the following timeline:
T+0 – Penetration
Brute force attack on an admin account. Password policy was weak (12 characters, no MFA). Login successful within 41 minutes.
T+2 hours – Reconnaissance
The attacker used SoftPerfect Network Scanner to map the network. 60 servers, 3 ESXi hosts, one SAN storage, and – crucially – a Veeam backup server with write access to the backup storage.
T+5 hours – Lateral movement
Using PsExec, the attacker accessed the Veeam backup server as an administrator. Here, he first deleted the backup repository configuration and then destroyed the files that started the backup chain. The classic "attack the backups first" strategy.
T+11 hours – Coding
Ransomware was running on the file server and SAN from 06:00 AM. The Royal variant is encrypted with AES-256 combined with ChaCha20. The morning shift was unable to log in.
T+3 day – Recognition and negotiation
The company contacted a DFIR specialist firm. They found that the classic backup was unusable (the attacker deleted it), there was no shadow copy (because Royal deletes it by default), and the only usable version was an 11-day tape backup – with partial data loss.
The change: ViVeSec Box introduction
The company deployed ViVeSec Box in January 2025. The architecture has fundamentally changed: the backup chain is no longer managed by a traditional backup server, but by the hardened appliance. Compromising Windows-side admin authentication does not reach the immutable volumes of the ViVeSec Box (out-of-band management, RBAC, 4-eye principle).
The second testing
The company re-enacted the attack chain using a red-team simulation exercise. The result: the attacker reached the Windows backup coordinator, but was unable to modify the immutable storage of the ViVeSec Box. In an internal benchmark, Instant Recovery restored operating systems in 47 minutes – without a single day of downtime.
The difference is not in faster backups. The difference is that the attacker cannot delete them even if they have hacked everything on the Windows side.
