Data Recovery After Ransomware on Servers & NAS
LockBit, BlackCat/ALPHV, Cl0p, Akira, DeadBolt, QLocker — recovery without paying ransom
LockBit, BlackCat/ALPHV, Cl0p, Akira, DeadBolt, QLocker — recovery without paying ransom
Enterprise ransomware is not the same as what affects a home PC. Today's ransomware groups attack complete infrastructures: servers, NAS, backups and virtual machines. Their goal is to paralyse the entire business to maximise payment pressure. According to INCIBE, Spain received over 120,000 cybersecurity incidents in 2025, with ransomware as the main threat to SMEs.
The most globally active ransomware group. Encrypts Windows and Linux servers, ESXi virtual machines and shared volumes. Uses AES-256 + RSA-2048 encryption. The executable is deployed via Active Directory GPO to encrypt all domain machines simultaneously.
Written in Rust, cross-platform (Windows, Linux, ESXi). Known for «double extortion»: encrypts data and threatens to publish it. Specifically targets ESXi VMFS volumes and Hyper-V VHDX to paralyse the entire virtual infrastructure.
Specialises in exploiting file transfer vulnerabilities (MOVEit, GoAnywhere). Exfiltrates data massively before encrypting. Affects file servers, SQL databases and shared volumes on enterprise NAS.
Relatively new ransomware targeting SMEs through Cisco VPN without MFA. Encrypts Windows servers, Linux and NAS. Particularly aggressive with backups: actively seeks and destroys backups before encrypting production data.
Specific to QNAP and Synology NAS exposed to the internet. Encrypts files at the shared folder level with AES-128. Files appear with the .deadbolt extension. The NAS login page is replaced by the ransom note. Exploited vulnerabilities in QTS and Photo Station.
QLocker uses 7-Zip to compress QNAP NAS files with a password. eCh0raix attacks Synology and QNAP NAS via SSH brute force or known vulnerabilities. Both are less sophisticated than LockBit but equally destructive to victim data.
⚠ The first 30 minutes are critical. Follow these steps in order:
We do not depend on decryption. Our approach combines multiple techniques to maximise data recovery without paying ransom:
We analyse the ransom note, file extension and encryption patterns to identify the exact variant. We consult decryptor databases (No More Ransom, ID Ransomware) in case a public decryption tool exists.
Many ransomwares attempt to delete Windows Volume Shadow Copies (VSS), but do not always succeed 100%. We analyse the volume at disk level looking for residual shadow copies. On NAS, we look for Btrfs/ZFS snapshots that may have survived.
If the server uses RAID, we clone all disks and virtually reconstruct the array. In many cases, the original (unencrypted) files remain in unoverwritten RAID sectors, especially if encryption was partial or interrupted.
Ransomware typically encrypts in-place (overwrites the file) or encrypt-and-delete (creates encrypted file + deletes original). In the second case, the original file remains on disk until its space is reused. Recovery via carving and journal analysis is viable.
We maintain an updated database of public decryption keys and tools. When law enforcement dismantles a group (Hive case, LockBit case), keys are published. We check every case against available keys.
Encrypted VMDKs on ESXi, encrypted VHDXs on Hyper-V. If the ransomware partially encrypted the VMFS datastore or if VM snapshots exist from before the attack, VM content recovery is viable. We also recover VMs from encrypted Veeam/NAKIVO backups.
Synology, QNAP, WD My Cloud with shared folders encrypted by DeadBolt, QLocker, eCh0raix. Recovery via residual Btrfs snapshots, previous versions in @Recently-Snapshot, or carving of unoverwritten files in the file system.
SQL Server (.mdf/.ldf), MySQL, PostgreSQL. Databases tend to be large files that ransomware encrypts partially (only the first few MB). Reconstructing unencrypted data pages allows recovery of a high percentage of records.
Veeam (.vbk/.vib), Acronis (.tibx), Windows Server Backup, Time Machine. Attackers actively seek and destroy backups. If backups were on separate volumes, offline or with immutability enabled, they may be the primary recovery path.
Three options tailored to your urgency and budget
| Scenario | Description | Timeframe | Price |
|---|---|---|---|
| Encrypted NAS (DeadBolt/QLocker) | Synology/QNAP NAS with encrypted files. Recovery via snapshots, carving or known decryptor. | 4–12 days | €2,200–4,000 |
| Encrypted Windows server | Server with RAID + NTFS/ReFS encrypted. Shadow copies, journal analysis, RAID reconstruction. | 7–20 days | €3,500–6,000 |
| Encrypted VMs (ESXi/Hyper-V) | Encrypted VMDK/VHDX. VMFS reconstruction, VM snapshot analysis, data carving from VM. | 10–25 days | €4,000–8,000 |
| Emergency | Absolute priority. Dedicated 24/7 team including weekends. | 24–72h | +50% |
No. According to the FBI, Europol and INCIBE, paying the ransom does not guarantee recovery (only 65% of those who pay receive a functional decryptor), funds criminal organisations and makes the company a recurring target. Additionally, paying sanctioned groups (such as those linked to North Korea) can have legal consequences.
It depends on the variant. The No More Ransom project (nomoreransom.org), backed by Europol, publishes free decryptors regularly. There are also tools from Kaspersky, Emsisoft and Avast for specific variants. Upload an encrypted file and the ransom note to ID Ransomware (id-ransomware.malwarehunterteam.com) to identify the variant and check for an available decryptor.
We do not attempt to break the encryption (it is computationally infeasible). Our approach is to recover data without decrypting: undeleted Windows shadow copies, Btrfs/ZFS snapshots on NAS, original files deleted but not overwritten («encrypt-and-delete» type), previous versions in backups, data in free disk space. Success rate depends on the ransomware type and elapsed time.
DeadBolt encrypts file by file with AES-128 and deletes the original. If your QNAP has Btrfs and had snapshots enabled, the original files may be intact in the snapshots. If the NAS uses EXT4, recovery depends on whether the deleted files' space has been overwritten. The sooner you act, the better: do not use the NAS for anything else, do not install updates, do not write new data.
If the ransomware affected personal data (customers, employees, suppliers), yes. GDPR (Art. 33) requires notification to the supervisory authority within a maximum of 72 hours from becoming aware of the breach. If there is high risk to the rights of data subjects, they must also be notified directly (Art. 34). Non-compliance can result in fines of up to 20 million euros or 4% of global turnover.
LockBit encrypts rapidly (AES + RSA) and aggressively deletes shadow copies (vssadmin.exe delete shadows /all). Recovery depends on: (a) whether backups survived, (b) whether encryption was completed 100% or was interrupted, (c) whether the server uses RAID with residual data. Typical timeframe: 10-20 days for complete analysis + extraction. Emergency service: 3-7 days.
Do not pay the ransom. Do not format. Do not shut down the machines. Contact us now.
Every minute counts: data in RAM may contain encryption keys.
Free collection* within 24h · 4-hour diagnosis · No recovery, no fee
Practical guides, news and tips to protect your data. No spam.
Stay updated