A company in the furniture manufacturing sector, located in Romania, contacted Digital Recovery after experiencing a complete production shutdown caused by a Lynx ransomware attack. The incident occurred over a weekend and immediately compromised the company’s entire operational environment.
All central systems became unavailable, production lines were halted, and shared directories began displaying the “.lynx” extension, confirming a scenario of widespread encryption.
The ransomware infiltrated the Hyper-V virtualized environment, rapidly encrypting multiple VHDX virtual disks and compromising critical systems responsible for:
- Production planning
- Inventory synchronization
- Logistics
- Industrial controllers
As a direct consequence, the production line equipment stopped receiving updated instructions from the servers, forcing a complete halt of operations.
Initial Contact
The company reached out to Digital Recovery through a previously published success case and contacted our emergency line over the weekend.
The IT manager, visibly exhausted and under extreme pressure, summed up the situation:
“Tudo está fora do ar. Estamos perdendo dinheiro a cada minuto e nem sabemos se nossos backups sobreviveram.”
At that moment, there was no guarantee of data recovery nor clarity on the true extent of the damage.
The initial analysis conducted by Digital Recovery’s engineers identified the following infrastructure:
- Hosts Hyper-V
- Dozens of encrypted VHDX virtual disks
- A dedicated NAS for Veeam backup storage
- Multiple critical virtual machines, including:
- ERP
- File servers
- Logistics systems
- Industrial control servers
Although the ransomware reached the backup network, the technical analysis revealed that the situation was still recoverable.
Recovery Process
Even with Veeam metadata and catalogs partially corrupted, Digital Recovery engineers identified that the backup blocks remained intact.
Using proprietary technologies, it was possible to:
- Rebuild damaged metadata of VHDX disks
- Identify and extract valid restoration points from Veeam, even without access to the catalogs
- Restore ERP systems, file servers, and virtual machines connected to production
- Validate each recovered system through our Integrity Map process, ensuring operational consistency and reliability
The entire process was carried out without any interaction with the attackers and without paying a ransom.
Result
- 100% of virtual machines recovered
- No data loss
- No ransom paid
- Production fully restored
- Operational continuity ensured
In a short operational timeframe, the Romanian furniture manufacturer resumed normal activities, with all systems rebuilt, validated, and operating exactly as they were before the attack.


