Databack - Récupération de données
Request a quote
THE BLOG

How do I decrypt ransomware?

Decrypting ransomware, i.e. deciphering data locked by ransomware, represents a vital challenge for the organizations affected, be they companies, public authorities or local authorities. Although ransomware attacks are a constantly evolving form of cybercrime, your organization can protect itself and respond to them.

1- Protect yourself and anticipate ransomware attacks

Good digital security practices will enable you to manage, or at best anticipate, crises caused by the encryption of your data:

  • regularly back up your data using cloud computing or independent storage media (NAS servers, RAID systems, etc.);
  • regularly update your operating systems, software (especially antivirus software), web browsers and plug-ins;
  • avoid risky behavior: opening e-mails or attachments of dubious origin, visiting uncertified or high-risk websites, etc.

2- The right reflexes in the event of a ransomware attack

The success of subsequent ransomware decryption / ransomware decryption operations will depend on your first reflexes:

  • Isolate the computer or system infected by the attack: cut off Internet access, disconnect from the network, quarantine ;
  • take a screenshot of the ransom message, which may contain information about the ransomware version;
  • don’t pay the ransom! This will not guarantee the recovery of your data, and will encourage further ransomware attacks.

3- Decrypt files encrypted by a ransomware virus

Decrypting files encrypted by ransomware or ransomware requires identifying the ransomware or ransomware in order to implement the appropriate procedures:

  • try to trace the source of the attack: fraudulent e-mail or infected attachment, website hacked by web exploit or malvertising, etc. ;
  • collect any clues that may help identify the ransomware: screenshots(see above), behavior, extension of encrypted files, etc. ;
  • identifiez le ransomware et mettez en œuvre les procédures connues lorsqu’elles existent ; vous disposez pour cela de plusieurs ressources :
    • identification and decryption sites such as that of cybersecurity company Kaspersky orEuropol;
    • a laboratory specialized in data recovery, such as Databack.
1 December 2020
KEEP IN TOUCH

SUBSCRIBE TO OUR NEWSLETTER

By entering your email address, you agree to receive the Databack newsletter. You can unsubscribe at any time by clicking on the unsubscribe link at the bottom of the content. You can consult our privacy policy to find out more.
Databack Linkedin