FAQ

The specialists answer to you

FAQ : #ransomware

Feel free to contact us to ask some questions or share a comment.

Yes. Our emergency hotline is accessible 24/7 for critical cases (data loss on a production server, ransomware incident, damaged media following a disaster). Call our Swiss national number directly on 0840 440 840 and specify that it is an emergency: you will be put in contact with an on-call technician.

Yes, in many cases. Our team analyzes the type of ransomware and explores several approaches: recovering unencrypted files, exploiting known vulnerabilities in the encryption, restoring previous versions of the files. Each case is unique — a free diagnosis allows us to assess the chances of success.

Yes, in a significant number of cases. The possibility of decryption without paying mainly depends on the type of ransomware and the existence of an exploitable cryptographic flaw.

Several recovery paths exist:

  • Public decryption keys — some ransomware has been decrypted by security researchers and agencies like Europol. The No More Ransom platform (nomoreransom.org) centralizes these tools for free.
  • Flaws in cryptographic implementation — some poorly programmed ransomware have vulnerabilities that allow keys to be reconstructed.
  • Shadow Copies (VSS) — if the ransomware has not deleted Windows Shadow Copies, a restoration is possible.
  • Unaffected backups — offline backups, NAS snapshots, or unsynchronized cloud storage.

Our laboratory analyzes each case individually. A diagnosis allows us to determine which ransomware family is involved and what decryption options are available.

Ransomware is a type of malware that encrypts the files on a computer system, rendering them inaccessible, and then demands a ransom in exchange for the decryption key. It is one of the most widespread cyber threats: according to the ENISA 2024 report, ransomware attacks increased by 37% in Europe between 2022 and 2023.

A typical attack process unfolds in four stages:

  1. Infection — via phishing, unpatched vulnerability, exposed RDP, or compromised account
  2. Reconnaissance and propagation — the malware maps the network and spreads laterally (duration: from a few hours to several weeks)
  3. Encryption — files are encrypted with an asymmetric algorithm (RSA 2048 or 4096 bits) for which only the attacker possesses the private key
  4. Extortion — a ransom note is dropped on the system with payment instructions (usually in Bitcoin)

The PLUS of SOS Data Recovery

  • Swiss leader of Data recovery

  • Extranet Follow-up

  • Security copy of the device

  • Secure offices

  • Data encryption on request

  • Storage in a safe

  • Monitoring of the parcels

  • Over 20 years of experience

  • Confidentiality