Data decryption, ransomware and cryptolocking issues

Data encryption consists in protecting readable information (“clear” data) by converting it into non-readable information for any unauthorized user (“encrypted” data). The conversion process is carried out using an encryption algorithm. A corresponding encryption key is then required to read the original clear data.

It can be hardware encryption (performed by the storage medium) or software encryption (performed by specific software). Several situations can however make it impossible to access encrypted data:

Unintentional manipulation or errors committed during system administration:

  • Delete or modify user profiles
  • Deletion or formatting of encrypted data
  • Formatting or modifying the encrypted volume

Forgetting or making mistakes in adjusting rights, especially in these situations:

 

  • Migration or duplication of the encrypted volume on another medium
  • Relocation or modification of user profiles
  • Updating the storage medium or reinstalling the operating system
  • Decryption errors, use of wrong algorithm and / or wrong encryption key
  • Hardware corruption, defective volume, accessibility errors, etc.

In addition, cryptolockers (or crypto-lockers) can infect computer media. This is ransomware, a class of malware that encrypts media data and demands ransom from the user to make it accessible again. The most common are CryptoLocker, Wannacry, Petya…

Data decryption

Data decryption should be considered in the context of a decryption or cryptolocking problem activated by a ransomware.

We have therefore developed within the technologies and skills necessary for recovering encrypted data:

  • Knowledge of encryption algorithms
  • Repair and decryption of inaccessible data
  • Recryping the recovered data
Hard Drive Disc Close Up 5

We are able to recover encrypted data on most storage media and by most encryption software: Microsoft Bitlocker Drive Encryption, Symantec EndPoint Encryption (PGP), McAfee Drive Encryption (SafeBoot), CheckPoint EndPoint, Sophos Safeguard, WinMagic Securedoc, TrueCrypt, VeraCrypt…

In the case of software or hardware encryption: the user name, encryption key or password (ATA for a hard disk) are essential.

In the context of a crypto locking: you can declare the claim on the government site against cyber-malware:

The processing of sensitive data

Encryption by definition concerns confidential or sensitive information and involves security concepts. Any unsuccessful decryption attempt that may result in the locking or permanent loss of encrypted data, it is necessary to contact a specialized company as soon as a problem is identified.

In addition to the precautions taken in the context of data recovery, our company brings you the following guarantees:

Safe working environment:

  • Company located in France and not practicing any subcontracting
  • Secure laboratory and regulated access
  • Vault for the storage of sensitive material
  • Independent computer system disconnected from any outside access
  • Respect for your security and confidentiality needs
  • Security protocols at all stages of decryption and recovery
  • New data encryption to guarantee protection before restitution
What Customers Say
Our Blog

Newsletter

Follow Us