Backups are often described as the last line of defense against ransomware, but that same role makes them a direct target. Modern attackers do not usually encrypt production systems first and hope the victim has weak recovery. They often look for backup servers, backup repositories, cloud snapshots, domain controller backups, hypervisor backups, and SaaS backup platforms before the final disruptive stage of the attack. The goal is simple: reduce the victim’s ability to recover without paying.
CISA’s StopRansomware guidance tells organizations to maintain offline, encrypted backups of critical data and to regularly test backup availability and integrity in disaster recovery conditions. That recommendation reflects a practical reality seen across ransomware incidents: backups that remain online, domain-joined, broadly accessible, or managed by overprivileged accounts can become part of the attack surface rather than a recovery control.
Backup compromise can happen at several layers. An attacker may delete backup jobs, encrypt repositories, tamper with retention settings, remove snapshots, destroy backup catalogs, compromise storage credentials, disable backup agents, or corrupt the identity systems needed to run a restore. In many incidents, the backup platform is not exploited through a novel vulnerability. It is accessed through stolen credentials, exposed admin consoles, weak segmentation, shared service accounts, or excessive privileges.
Why Attackers Target Backups First
Ransomware operators understand that backup quality changes the economics of extortion. If an organization has recent, tested, isolated recovery points, the attacker has less leverage. If backups are missing, encrypted, deleted, incomplete, or unavailable during a network outage, the attacker can apply more pressure.
TrustedSec’s Defensive Backup Infrastructure Controls framework frames backup recovery as the final defense against enterprise-scale destructive attacks. The framework identifies several pre-attack objectives, including performing backups of critical systems, hardening backups against destruction, making backup data accessible during a full network outage, restoring critical systems at scale, and using supporting controls to reduce operational variance.
That is why backup systems are so valuable to attackers. They often contain full copies of sensitive systems, credential material, database exports, file shares, Active Directory data, email, source code, virtual machine images, and business records. A backup server may hold enough access to read, restore, overwrite, or delete large portions of the enterprise. If that system is poorly protected, it can become one of the highest-impact assets in the environment.
This also creates a blind spot. Many organizations treat backup infrastructure as IT plumbing, not as privileged security infrastructure. They monitor domain controllers, endpoint alerts, VPN sessions, and firewalls, but backup consoles and repositories may receive less scrutiny. That gap gives attackers room to stage destructive actions before encryption begins.
The Attack Path Usually Starts With Discovery
Attackers often begin by mapping where backup infrastructure lives. They search for hostnames, management consoles, services, file shares, mounted repositories, storage appliances, network paths, backup agents, and cloud credentials. Common names such as backup, veeam, commvault, rubrik, cohesity, netbackup, repository, nas, snapshot, and vault may appear in DNS, Active Directory, management tools, scripts, documentation, or file shares.
Discovery may also happen through normal administrative tooling. Microsoft’s ransomware incident response guidance notes that attackers often use legitimate programs already present in the environment, which can make malicious activity harder to distinguish from administration. Microsoft also stresses that ransomware response depends on trained staff, modern configuration, and security telemetry that can detect and respond before data is lost.
From a SOC view, backup discovery can look like LDAP queries for backup-related groups, remote enumeration of servers, access to IT documentation, scanning for management ports, PowerShell queries for installed products, or file share browsing from an unusual admin account. On Linux-based repositories, it may appear as SSH access attempts, enumeration of mount points, or attempts to list backup directories. In cloud environments, it may look like snapshot enumeration, storage bucket listing, key vault access, or API calls against backup vaults.
The discovery stage matters because it gives defenders a chance to intervene before destruction. If a compromised workstation starts querying backup-related systems, that activity should be treated as high-risk, especially if the user has no operational reason to touch backup infrastructure.
Privilege Is the Main Weakness
Backup systems need high levels of access to function. They may require rights to read virtual machines, access file shares, connect to databases, snapshot workloads, query Active Directory, manage storage, and restore data. Attackers abuse that same permission model.
NIST’s ransomware risk management profile ties ransomware mitigation to credential management, stating that ransomware attacks often begin with credential compromise and that proper credential issuance, management, revocation, and recovery are high-priority controls. This applies directly to backup infrastructure, where a single compromised service account may grant access to backup jobs, repositories, or restore operations.
A common failure is using domain admin or broad administrative credentials for backup operations. Another failure is storing backup service account credentials on the backup server, in scripts, in documentation, or in configuration files with weak access controls. Attackers who compromise the backup console may be able to extract stored credentials or use the platform’s trusted relationships to reach protected systems.
Service account sprawl makes the problem worse. Backup jobs may run under different identities across VMware, Hyper-V, SQL Server, file servers, NAS platforms, cloud storage, and SaaS applications. If those credentials are not isolated, rotated, monitored, and scoped, the backup platform can become a credential aggregation point.
Backup Consoles Become Control Panels for Destruction
Once attackers obtain access to the backup management plane, they often do not need to touch every repository manually. The console may already provide the functions they need. They can disable jobs, change schedules, lower retention, remove immutable settings where allowed, delete recovery points, remove cloud copies, delete backup catalogs, or push destructive commands through managed agents.
This is why the backup control plane should be treated like a Tier 0 or near-Tier 0 system, depending on the environment. If an attacker can use the backup console to erase recovery points for domain controllers, file servers, databases, virtualization clusters, and business applications, then compromise of that console can become a business continuity event.
The control plane is also a target for stealth. An attacker may disable backups days or weeks before encryption, allowing valid recovery points to age out. They may alter retention policies so the organization does not notice until restore is needed. They may delete job history or suppress alerting. In mature attacks, backup tampering may be staged well before the visible ransomware event.
Repositories Are Targeted for Deletion and Encryption
Backup repositories hold the actual recovery points. If those repositories are online and writable from compromised systems, they can be deleted, encrypted, or corrupted. File-based repositories, NAS shares, object storage buckets, and disk targets are all exposed if access controls permit destructive writes.
Veeam’s hardened repository documentation describes immutability as a control that prevents backup files from being moved, modified, or deleted during a configured time period. It also supports single-use credentials so credentials used to deploy the data mover are not stored in the backup infrastructure, reducing the value of compromising the backup server.
Immutability is valuable, but it is not a substitute for sound architecture. If immutability is misconfigured, too short, disabled for some workloads, excluded from log backups, or dependent on credentials attackers can control, recovery can still fail. Veeam’s documentation notes that backup files become immutable only after specific backup conditions are met, and warns that expired immutability on log backup files can make application restore fail if the log chain becomes incomplete.
This is where technical details matter. A repository that is “immutable” in a dashboard may still have operational edge cases. Failed jobs, incomplete restore points, short immutability windows, expired locks, writable metadata, exposed admin accounts, compromised object storage lifecycle policies, or poorly managed retention settings can all weaken recovery.
Snapshots Are Not the Same as Backups
Attackers often target snapshots because many organizations rely on them as a fast recovery mechanism. Virtual machine snapshots, cloud volume snapshots, database snapshots, and storage array snapshots can reduce recovery time, but they are usually controlled through the same administrative plane as production systems.
If an attacker compromises the hypervisor, cloud account, storage controller, or backup orchestration layer, snapshots may be deleted along with production workloads. This is especially dangerous in cloud and virtualization environments where snapshot deletion can be done through API calls at scale.
Snapshots are useful recovery points, but they should not be the only recovery layer. A resilient design separates production administration from recovery administration. It also stores at least one copy in a location or trust boundary the attacker cannot modify from the compromised environment.
Active Directory Recovery Is a Special Problem
Backup systems often depend on Active Directory, and Active Directory often depends on backups for recovery. That circular dependency becomes dangerous during ransomware. If attackers compromise domain controllers, delete backup service accounts, alter group membership, or corrupt directory data, the organization may lose both authentication and recovery orchestration at the same time.
TrustedSec’s framework explicitly includes foundational capabilities such as Active Directory, DNS, DHCP, and related core infrastructure in the scope of critical backups. That point is important: recovery is not just about restoring file shares and business applications. The organization needs the identity, name resolution, network, and administrative services required to perform the restore.
In practice, this means teams need a documented plan for restoring identity infrastructure in an isolated recovery environment. Domain controller backups, system state backups, DNS records, DHCP configuration, privileged access documentation, break-glass credentials, and restore procedures need to be available without relying on the compromised production domain.
Cloud Backup Systems Have Their Own Failure Modes
Cloud backups reduce some local infrastructure risk, but they introduce different attack paths. Attackers may target cloud IAM roles, access keys, backup vault policies, storage lifecycle rules, snapshot permissions, SaaS admin roles, and cross-account replication settings. If the same identity can administer production and delete backups, cloud hosting does not solve the problem.
A common cloud failure is treating backup deletion as a normal admin action without strong approval, alerting, or retention protection. Another is storing long-lived access keys in backup servers, CI/CD systems, scripts, or developer workstations. If those keys grant rights to delete snapshots or object storage versions, the attacker can damage recovery from outside the traditional network.
Cloud-native controls such as object lock, backup vault lock, MFA delete where supported, cross-account backup copies, separate administrative accounts, and restrictive IAM policies can reduce this risk. The key is separating production compromise from backup destruction. A compromised production admin should not automatically have the ability to delete all recovery points.
SaaS Backups Are Often Overlooked
Many organizations assume Microsoft 365, Google Workspace, Salesforce, or other SaaS platforms make backup concerns less urgent. That assumption can be risky. SaaS platforms provide availability and platform resilience, but customer-side deletion, account takeover, malicious app consent, retention misconfiguration, and data corruption can still create recovery needs.
An attacker with access to a SaaS admin account may delete users, alter retention settings, remove mailbox data, export sensitive records, or change application configurations. If backup or retention policies are controlled by the same compromised identity provider, the recovery layer may be exposed.
SaaS backup architecture should separate backup administration from normal tenant administration where possible. Restore logs, retention configuration, API access, third-party app permissions, and backup status should be monitored. The organization also needs to know how long SaaS recovery points remain available and which data types are included or excluded.
Signs That Backup Systems Are Being Targeted
Backup targeting does not always produce malware alerts. It often looks like administration from the wrong account, wrong system, wrong time, or wrong sequence.
High-risk indicators include failed or successful logins to backup consoles from unusual hosts, backup job disablement, unexpected retention changes, repository deletion attempts, mass snapshot deletion, access to backup documentation by non-IT users, new admin accounts in backup platforms, unusual SSH access to hardened repositories, object storage policy changes, cloud backup vault deletion attempts, and backup agents being stopped across multiple systems.
Other warning signs include VSS shadow copy deletion, use of tools such as vssadmin, wbadmin, bcdedit, diskshadow, or PowerShell commands related to backup removal. These commands are not always malicious, but they are high-signal when paired with suspicious authentication, lateral movement, ransomware staging, or endpoint alerts.
Backup telemetry should flow into the SIEM. Many organizations collect endpoint and firewall logs but omit backup platform events. That leaves defenders blind to job changes, repository access, restore activity, failed authentication, administrative actions, and deletion attempts. A backup system that cannot be monitored during an incident is difficult to trust during recovery.
How to Harden Backup Infrastructure
Backup hardening starts with architecture. The backup management plane should be isolated from standard user networks, limited to approved administrative workstations, protected by strong MFA, and separated from routine domain administration. Privileged access should be scoped, logged, time-bound, and reviewed.
CISA’s ransomware guidance recommends offline, encrypted backups and regular testing of backup integrity and availability. That means a backup strategy is incomplete if the organization cannot prove that recovery points are usable under real incident conditions.
Immutability should be applied to backup repositories with retention windows matched to the organization’s recovery needs. Veeam documents hardened repository controls that prevent movement, modification, or deletion during the immutability period, and its architecture is intended to protect backup files even if certain backup transport components are exploited.
Segmentation is just as important. Backup repositories should not be exposed through broad SMB shares, flat network access, shared local administrator credentials, or routine domain admin sessions. Repository servers should have minimal installed software, restricted inbound access, monitored authentication, and no unnecessary internet exposure.
Credential design needs special attention. Backup service accounts should be dedicated, least-privileged, denied interactive logon where possible, rotated, and monitored. Stored credentials inside backup platforms should be protected, and the backup server should not become a general-purpose admin jump box.
Recovery Testing Has to Be Realistic
A backup that has never been restored is an assumption. NIST’s ransomware risk management profile says ransomware response and recovery plans should be tested periodically so assumptions and processes remain current against changing ransomware threats. It also ties response cost and recovery success to the quality of contingency planning.
Realistic recovery testing should answer hard questions. Can the team restore without the production domain? Can backups be accessed during a full network outage? Can the team rebuild DNS, DHCP, identity, virtualization, and critical business systems in the right order? Are restore credentials available through a secure break-glass process? Are backup catalogs protected? Can staff validate that restored systems are clean before reconnecting them?
Testing should include destructive scenarios. Assume the backup console is compromised. Assume some recent recovery points are encrypted. Assume the domain is unavailable. Assume cloud keys are revoked. Assume the incident response team must restore from isolated copies. These exercises expose gaps that normal restore tests miss.
What SOC and IT Teams Should Prioritize
The most important change is treating backup infrastructure as part of the security boundary. Backup servers, repositories, vaults, and admin consoles should be inventoried, classified, monitored, and protected as high-impact systems.
Security teams should alert on backup job disablement, retention reduction, repository deletion, snapshot deletion, new backup administrators, abnormal console logins, failed MFA, service account misuse, repository access from non-backup hosts, and commands tied to local backup removal. These alerts should be tested before an incident.
IT teams should review whether backups are isolated from the production domain, whether immutable copies exist, whether offline or logically separated copies are available, whether cloud backup deletion requires separate authority, and whether recovery documentation is accessible during a domain outage.
The shared goal is not just having backups. The goal is preserving recoverability under hostile conditions. Attackers target backups because they know recovery breaks extortion. Defenders need to design backup systems with that same assumption in mind.
How Can Netizen Help?
Founded in 2013, Netizen is an award-winning technology firm that develops and leverages cutting-edge solutions to create a more secure, integrated, and automated digital environment for government, defense, and commercial clients worldwide. Our innovative solutions transform complex cybersecurity and technology challenges into strategic advantages by delivering mission-critical capabilities that safeguard and optimize clients’ digital infrastructure. One example of this is our popular “CISO-as-a-Service” offering that enables organizations of any size to access executive level cybersecurity expertise at a fraction of the cost of hiring internally.
Netizen also operates a state-of-the-art 24x7x365 Security Operations Center (SOC) that delivers comprehensive cybersecurity monitoring solutions for defense, government, and commercial clients. Our service portfolio includes cybersecurity assessments and advisory, hosted SIEM and EDR/XDR solutions, software assurance, penetration testing, cybersecurity engineering, and compliance audit support. We specialize in serving organizations that operate within some of the world’s most highly sensitive and tightly regulated environments where unwavering security, strict compliance, technical excellence, and operational maturity are non-negotiable requirements. Our proven track record in these domains positions us as the premier trusted partner for organizations where technology reliability and security cannot be compromised.
Netizen holds ISO 27001, ISO 9001, ISO 20000-1, and CMMI Level III SVC registrations demonstrating the maturity of our operations. We are a proud Service-Disabled Veteran-Owned Small Business (SDVOSB) certified by U.S. Small Business Administration (SBA) that has been named multiple times to the Inc. 5000 and Vet 100 lists of the most successful and fastest-growing private companies in the nation. Netizen has also been named a national “Best Workplace” by Inc. Magazine, a multiple awardee of the U.S. Department of Labor HIRE Vets Platinum Medallion for veteran hiring and retention, the Lehigh Valley Business of the Year and Veteran-Owned Business of the Year, and the recipient of dozens of other awards and accolades for innovation, community support, working environment, and growth.
Looking for expert guidance to secure, automate, and streamline your IT infrastructure and operations? Start the conversation today.


Leave a comment