Ranzy Locker ransomware has placed itself among major cybercriminal groups, it is a spin-off of the AKO and ThunderX ransomware. The FBI released a flash alert with information about the group and its high dangerousness.
Ranzy Locker first appeared in 2020, and that same year the FBI recorded attacks on more than thirty companies in critical manufacturing, government academic, facilities, information technology and the transportation sector.
The main tactic implemented by the group to break in is the brute force attack, which exploits known flaws in Microsoft Exchange Server, and uses phishing campaigns that aim to create openings for the brute force attack.
Like the vast majority of ransomware groups the group has the RaaS (Ransomware as a Service) affiliate programme this tactic is highly lucrative for the group as the number of attacks can increase exponentially. This brings renown and authority to the group.
Apart from encrypting the files, Ranzy Locker ransomware steals vital data for the companies like trade secrets, employee and customer data etc. These files are used for blackmail, if the victim does not pay the ransom the files will be leaked on the internet.
Digital Recovery has been developing unique data recovery technologies for over 20 years, we take data recovery to another level by specialising in recovering data encrypted by ransomware.
We can recover encrypted data on virtually any storage device, such as HDDs, SSDs, Databases, Storages, RAID Systems, Virtual Machines and others.
Throughout the entire process the client is accompanied by one of our specialists who can clarify any questions and with constant feedback the client will be aware of each process applied to the device.
All our processes are in accordance with the guidelines established in the General Data Protection Regulation (GDPR) and we also provide an non-disclosure agreement (NDA).
If it is not possible to send the device to one of our laboratories, we can recover the data remotely.
Contact our experts and start the process for data recovery now.