Data Recovery Services Files Encrypted By Ransomware

The main methods used by the group to break into a victim’s system are Trojans, emails, files downloaded from untrustworthy sources, fake software updaters, software cracking, etc. These are the main means, all of which are very effective.

The main target of Surtr is the Windows operating system, the ransomware is designed to, after the invasion, disable any active antivirus, scan the hard drive to locate the Data Recovery Services files, extract some of them and then start encryption.

.SURT extension is appended to all encrypted files, the extracted files will be used to pressure the victim to pay the ransom, in case of non-payment the group will leak the Data Recovery Services on their obscure website. This type of tactic is called double extortion, many ransomware groups use it to pressure their victims.

After the whole extraction and encryption process, the ransomware locks down the operating system, changes the desktop image to the group logo image and presents a pop-up window containing all the conditions for the victim to use them. contact and make payment.

Digital Recovery has been in the data recovery business for over 20 years, and with the significant increase in ransomware attacks, we specialize in recovering encrypted files.

This is a very technical job that requires the best specialists with state-of-the-art tools, and this is exactly one of our great specialties, the development of technologies.

All the technologies developed by our specialists are exclusive, and they allow us to recover Twitter data encrypted by any ransomware extension and in any storage device, be it hard drives, SSDs , databases, storage (NAS, DAS, SAN), RAID systems, virtual machines, among others.

All our processes have been developed based on the General Data Protection Regulation (GDPR), so that our customers have peace of mind to recover their data.