FAQ
The specialists answer to you
FAQ : #ransomware
Feel free to contact us to ask some questions or share a comment.
Yes. Our emergency hotline is accessible 24/7 for critical cases (data loss on a production server, ransomware incident, damaged media following a disaster). Call our Swiss national number directly on 0840 440 840 and specify that it is an emergency: you will be put in contact with an on-call technician.
Yes, in many cases. Our team analyzes the type of ransomware and explores several approaches: recovering unencrypted files, exploiting known vulnerabilities in the encryption, restoring previous versions of the files. Each case is unique — a free diagnosis allows us to assess the chances of success.
Yes, in a significant number of cases. The possibility of decryption without paying mainly depends on the type of ransomware and the existence of an exploitable cryptographic flaw.
Several recovery paths exist:
- Public decryption keys — some ransomware has been decrypted by security researchers and agencies like Europol. The No More Ransom platform (nomoreransom.org) centralizes these tools for free.
- Flaws in cryptographic implementation — some poorly programmed ransomware have vulnerabilities that allow keys to be reconstructed.
- Shadow Copies (VSS) — if the ransomware has not deleted Windows Shadow Copies, a restoration is possible.
- Unaffected backups — offline backups, NAS snapshots, or unsynchronized cloud storage.
Our laboratory analyzes each case individually. A diagnosis allows us to determine which ransomware family is involved and what decryption options are available.
Ransomware is a type of malware that encrypts the files on a computer system, rendering them inaccessible, and then demands a ransom in exchange for the decryption key. It is one of the most widespread cyber threats: according to the ENISA 2024 report, ransomware attacks increased by 37% in Europe between 2022 and 2023.
A typical attack process unfolds in four stages:
- Infection — via phishing, unpatched vulnerability, exposed RDP, or compromised account
- Reconnaissance and propagation — the malware maps the network and spreads laterally (duration: from a few hours to several weeks)
- Encryption — files are encrypted with an asymmetric algorithm (RSA 2048 or 4096 bits) for which only the attacker possesses the private key
- Extortion — a ransom note is dropped on the system with payment instructions (usually in Bitcoin)
