The Ransomware Paradox: Why Better Detection Guarantees Worse Outcomes

Every ransomware incident investigated in the past five years reveals the same structural truth: the organisation did not fail because its sensors were blind, its patches were late, or its firewall rules were misconfigured. It failed because its governance apparatus—the architecture of decision-making, access control, and data handling—was architected for maximum ransomware harvesting. The industry response has been to layer detection on top of this broken foundation: more SIEM rules, more EDR telemetry, more threat hunts, more zero-trust frameworks that gate access without reducing the value of what lies beyond the gate. This is cargo-cult security. It feels purposeful whilst guaranteeing failure.

The Industry Narrative: Technology Abundance, Governance Vacuum

The conventional reading of ransomware is a technology story. Organisations are attacked because their environments are complex, legacy systems are unpatched, and adversaries are sophisticated. The remediation path follows naturally: patch faster, detect better, hunt more aggressively, deploy SOAR to automate response. This narrative is supported by high-profile incidents, regulatory guidance, and vendor roadmaps.

Take the Synnovis ransomware attack in June 2024, which cascaded across NHS blood-testing services in England and Wales. The post-incident analysis centred on what Synnovis lacked: it had failed to implement multi-factor authentication at scale, had not segmented its network sufficiently, and had not maintained offline backups of critical data. The NHS, in its own security review and in the subsequent public health service resilience framework, prescribed the standard controls: endpoint detection and response (EDR), security information and event management (SIEM), network segmentation, and backup isolation. The Health and Social Care Security Centre published guidance explicitly aligned with NIST CSF and ISO 27001. All sensible. All insufficient.

The Change Healthcare ransomware incident of February 2024 exposed similar governance seams. The attacker, operating under the Blackcat/ALPHV banner, compromised Optum's cloud environment through a remote access vulnerability and then spent weeks exfiltrating protected health information (PHI) at scale—over 100 million records—before encrypting critical payment and eligibility systems. The incident cost Change Healthcare an estimated $900 million in response, ransom (reportedly $22 million), and operational disruption. The remediation narrative: strengthen cloud IAM, implement EDR across all remote access systems, enforce continuous authentication, improve backup hygiene. The U.S. Department of Health and Human Services Office for Civil Rights (OCR) cited it as a failure of administrative safeguards under HIPAA. Once again, the remedy prescribed was technological.

The M&S ransomware incident of January 2025, attributed to Scattered Spider, demonstrated yet another layer of the same failure. Marks & Spencer's fashion e-commerce platform was shut down for weeks following an attack that exploited legacy credential compromise and lateral movement through insufficiently segmented systems. The attack was not sophisticated in its technical components—it leveraged known weak points in credential management—but it was devastating in its impact because the organisation's governance model allowed a single compromised account to traverse systems that should never have been on the same trust domain.

What these incidents share is not a deficit in detection technology. All three organisations employed EDR, SIEM, or equivalent monitoring. Some had threat hunting programmes. The failure was not that the attacks could not have been detected earlier; the failure was that detection would not have mattered, because governance permitted the attack to exist in the first place. The incident response in each case was reactive: find the adversary, kill the session, restore from backup, negotiate the ransom if recovery failed. The remediation was additive: layer more controls without changing the foundational architecture that made the attack viable.

The Structural Failure: Governance as Ransomware Surface

Ransomware succeeds because it targets governance failures, not technology gaps. A governance failure is any decision, process, or architectural choice that—knowingly or through negligence—creates asymmetric risk between cost of defence and cost of breach.

Start with data centralisation. Modern enterprise architecture concentrates data for operational efficiency: customer records, payment information, intellectual property, operational logs—all stored in cloud data warehouses, data lakes, or centralised file servers, all indexed, all backed up, all discoverable by a single lateral movement chain. This is a governance choice, not a technology necessity. It privileges operational convenience over breach resilience. When an adversary lands inside the network perimeter, the entire data corpus is reachable. When they exfiltrate and encrypt, they encrypt everything that matters, because everything that matters is accessible from a single point.

Second, credential governance. Most organisations operate on a model of distributed but interoperable credentials: domain-joined systems, federated identity, service accounts with static passwords or shared secrets, privilege escalation paths that assume trust once initial entry is achieved. This is a governance choice. It prioritises seamless user experience and easy cross-system interoperability over post-breach resistance. Once an attacker obtains a single credential—through phishing, social engineering, or exploitation—they inherit the trust relationships that credential carries. The entire estate becomes a graph of transitivity. Ransomware scales along that graph.

Third, backup governance. Organisations maintain backups, but most backups are operationally connected to the systems they back up. They exist on the same network, under the same IAM model, accessible by the same administrative tools. During the Change Healthcare incident, Optum's backup systems were sufficiently accessible that Blackcat could discover them, potentially encrypt them (or threaten to), and thereby nullify the primary recovery path. Again, this is governance: the decision to prioritise rapid restore (which demands accessible backups) over breach isolation (which demands air-gapped or zero-knowledge backups).

Fourth, governance visibility. Most organisations operating under NIST CSF, ISO 27001, or similar frameworks maintain some form of asset inventory, access control policy, and change management process. These artefacts exist as documents, policies, or tickets in separate systems from the infrastructure they govern. During incident response, the gap between policy and reality becomes catastrophic. The formal segmentation boundary differs from the actual network topology; the IAM policy differs from effective access; the backup retention plan differs from actual recovery times. This is governance entropy—the persistent divergence between stated and actual control. It emerges because governance operates at human timescales (policy review cycles measured in months or years) whilst infrastructure operates at machine timescales (deployments measured in minutes, configuration drift measured in hours).

Why Legacy Controls Deepen the Failure

The standard industry response to these governance failures is to deploy detection and response technologies: EDR to identify lateral movement, SIEM to correlate suspicious events, DLP to prevent data exfiltration, SOAR to orchestrate response, incident response playbooks to triage alerts. This response is not wrong; it is insufficient to the point of counterproductivity.

Deploying EDR across a ransomware-vulnerable estate does not reduce ransomware risk; it increases operational complexity whilst creating a false confidence that breach detection is tantamount to breach prevention. The Synnovis incident had monitoring in place. The Change Healthcare incident had monitoring in place. The M&S incident had monitoring in place. EDR did not prevent the attack; it merely provided forensic evidence after the attack succeeded. The remediation effort was misdirected toward "improving detection latency" when the actual failure was architecturally prior: the governance model that made the attack possible in the first place.

Moreover, detection-centric security creates a perverse incentive: organisations optimise for MTTD (mean time to detection) rather than MTPB (mean time post-breach). A system that detects a breach in 200 seconds is considered more secure than a system that prevents the breach entirely. But detection is useful only if the organisation can respond faster than the adversary can exfiltrate and encrypt. In the Change Healthcare case, the time between initial compromise and full exfiltration was weeks. No SIEM alert velocity can outpace an attacker with that temporal advantage and that much data volume to harvest.

The SIEM-to-SOAR pipeline—increasingly marketed as a path to "autonomous response"—compounds this failure. Organisations invest in correlation rules, threshold tuning, and automated playbooks, but these operate within the same compromised governance boundary. If the governance model permits lateral movement, then automated response is merely automating a reaction to a preventable state. The playbook cannot rewrite the access control list; it can only try to kill the adversary's session, which the adversary can simply re-establish with another compromised credential.

The PULSE Architecture: Governance Encoded in Infrastructure

The path beyond this failure is to encode governance into infrastructure such that the technical default enforces the policy intent, rather than relying on human processes to maintain consistency between policy and reality.

This demands a zero-knowledge substrate: an architectural model in which sensitive data (customer records, transaction logs, intellectual property) is not stored in any location where it can be centrally accessed, enumerated, or exfiltrated. Instead, data is encrypted at origin, remains encrypted in transit, and decrypts only at the point of use—and only for the specific transaction or query that requires it. The encryption keys are held in a domain-specific hardware security module (HSM) or trusted execution environment (TEE) that is operationally divorced from the systems requesting the decryption. No single administrative account, no matter how compromised, can decrypt the entire data corpus. No lateral movement chain can reach the data in unencrypted form.

This demands a strict separation between data-plane and control-plane. The control-plane (the systems that orchestrate, schedule, and govern) operates on a separate network, under separate credentials, with separate backup and recovery mechanisms. A breach of the data-plane (the systems that process and store data) cannot pivot to the control-plane because there is no trust relationship between them. The control-plane can kill or isolate a compromised data-plane system, but it does not rely on that system for its own operation. This is the inverse of the current model, in which control-plane compromise usually precedes and enables data-plane compromise.

This demands adaptive active defence: the security posture continuously drifts—not in response to detected threats, but as a baseline operational assumption. Access control lists rotate on a schedule independent of incident or audit. Encryption key material rotates continuously. The network topology changes automatically, such that even a fully compromised system cannot reliably predict the network connectivity it will encounter on its next connection attempt. This is not "moving target defence" as a marketing concept; it is architectural baseline behaviour. The assumption is that compromise is inevitable, and the technical design makes the window of utility for a compromised asset as narrow as possible.

This demands domain-specific automation engineered into the substrate, not bolted on via SIEM/SOAR retrofit. Backup systems are never on the same network as production systems and never share credentials with them. Database access is mediated by a stateless proxy that enforces query-level policy and logs at the cryptographic layer, not the application layer. Exfiltration attempts are not detected after the fact; they are structurally impossible because the data is never in a form that can be exfiltrated and used. Data in motion is always encrypted; data at rest is always encrypted; the keys are never in any location where an attacker can steal them en masse.

This is not "zero trust" as a marketing framework—most zero-trust architectures still assume that once an attacker bypasses the initial gate, they can move freely inside the perimeter. This is post-breach resistance: the assumption that gates will be bypassed, and the technical architecture is designed such that post-breach impact is bounded by the loss of a single isolated domain, not the entire organisation.

Governance Resilience Through Architecture

The payoff of this approach becomes visible only when tested against the actual failure modes of ransomware. In a zero-knowledge substrate with data-plane/control-plane separation:

— An adversary who compromises a web application server cannot read the database, because the database credentials do not exist on the server; database access is mediated through a stateless proxy that decrypts only on behalf of a specific query context.

— An adversary who compromises an administrative account cannot encrypt backups, because backups exist on an air-gapped system without that account's credentials and without network connectivity to the systems that account administers.

— An adversary who exfiltrates data discovers that the data is encrypted at origin with keys they do not possess; the exfiltrated data is worthless for extortion or sale.

— An adversary who attempts to traverse the network discovers that the network topology has changed since their reconnaissance; lateral movement paths are not persistent.

— An adversary who attempts to establish persistence discovers that the system they compromised has been quarantined and isolated without human intervention; the control-plane detected anomalous behaviour not through SIEM rules but through cryptographic proof that the system deviated from its declared configuration.

These are not improvements to detection-and-response. They are fundamental changes to the risk model. They make ransomware strategically untenable, not because attacks are detected faster, but because attacks that do succeed have vastly lower impact and ransoms become uncollectable.

From Narrative to Practice

The conversation in cybersecurity governance has stalled at the level of policy and process. Organisations write incident response plans, conduct tabletop exercises, maintain backup procedures, and audit access controls. All of this is conducted in human timescales and human language. The actual infrastructure operates at machine speeds and machine logic, and the two systems are consistently misaligned.

The shift required is not incremental—it is not another line item in the security budget for a SIEM upgrade or a SOAR platform. It is a commitment to encode governance into infrastructure such that the technical default enforces the policy intent automatically. This demands domain expertise across cryptography, systems engineering, and organisational risk. It demands honest conversation about which systems can be retrofitted and which must be redesigned. It demands willingness to accept architectural constraints (zero-knowledge encryption, data-plane/control-plane separation, continuous cryptographic rotation) that eliminate certain operational conveniences.

It is, however, the only path that converts ransomware from a catastrophic risk into a manageable cost of operation.

Organisations operating at the frontier of data sovereignty—financial services, healthcare, critical infrastructure operators, government—should request a technical briefing to assess whether your current governance model is encodable into post-breach-resistant infrastructure.

Engagement

Request a briefing under executed Mutual NDA.

PULSE engages only with verified counterparties. Strategic briefing material — reference architecture, regulatory mapping, deployment topology — is released after counter-execution of the NDA scoped to the recipient's evaluation purpose.

Request Briefing →

Related Reading