Ransomware AiDLocker

The AiDLocker ransomware has been drawing attention in recent days. The group has been manifesting itself on forums and social networks such as Telegram, introducing its malware.

We can deduce, due to its relationship with other Russian groups, that the AiDLocker ransomware probably originates from Russia. The group has been active in advertising its malware.

In the current update, we know that AiDLocker features AES-512 encryption, LAN network scanner, process blocker, data clone to shared folder, and some other features.

The group responsible for the AiDLocker ransomware said it has created a new channel on Telegram for “leaking companies that refuse to pay the ransom.” Which proves the practice of double extortion.

The group seems not to have emerged in a lone fashion, other well-established groups have provided support for AiDLocker. Therefore, experts are monitoring their movements.

The group has everything to grow and become highly dangerous, it has been taking its first steps and everything indicates that it will soon be among the big ransomware groups.

The victim of an AiDLocker ransomware attack should be prepared to be able to react effectively to the situation.

Recover files encrypted by AiDLocker ransomware

At times like these, a company that is a victim of an AiDLocker attack can rely on Digital Recovery. That is, count on ransomware-encrypted data recovery specialists willing to offer the necessary help to solve the problem.

For more than 23 years we have been improving our solutions and today they allow us to recover encrypted files on servers, databases, RAID systems, virtual machines and other storage devices.

Also make available to all our clients a non-disclosure agreement (NDA).

Our team consists of competent and experienced specialists in the data recovery market. We have a multi-lingual support team available 24/7.

Our solutions are designed with remote recovery in mind. So, wherever your business is located, Digital Recovery can help.

Contact our experts today and get your data recovered.

We are always online

Please fill out the form, or select your preferred contact method. We will contact you to start recovering your files.

Latest insights from our experts

Khonsari Ransomware

Khonsari Ransomware

The Khonsari ransomware was the first group to exploit known Apache Log4j vulnerabilities (CVE-2021-44228 and CVE-2021-45046), the group has focused its attacks on Windows servers that

Recuperar Ransomware Makop

Makop Ransomware

Makop ransomware has been expanding through its affiliate program, RaaS (Ransomware as a Service), a tactic that aims to seek partners to carry out attacks


Through unique technologies Digital Recovery can bring back encrypted data on any storage device, offering remote solutions anywhere in the world.