Ransomware Blaze

The Blaze ransomware is a relatively new group, a variation of the Babuk ransomware, a group that has made numerous attacks on businesses around the world. Blaze is following the path of its predecessor, the group aims to target large companies.

The group uses phishing campaigns to break into the victim’s system, this tactic is targeted at specific companies, after the malware is downloaded it quickly starts running in the background, mapping the stored files and preparing them for encryption.

The encryption process is done within minutes, all files encrypted by the ransomware are given the .blaze extension. All files with this extension can only be opened with the decryption key.

After the end of encryption a file named  ‘How To Decrypt.txt.’is generated, it contains the ransom terms, the victim is directed to a website in the .TOR browser, through which the victim can contact the criminals for the payment of the ransom.

Paying the ransom is not recommended under any circumstances, paying the ransom funds the group for further attacks.

Recover files encrypted by Blaze ransomware

Digital Recovery specializes in recovering files encrypted by ransomware, we can recover numerous extensions.

We can recover data encrypted in Databases, Servers, Storages, RAID Systems, Virtual Machines and others.

We know that confidentiality in these cases is critical,

Our specialists have developed exclusive technologies that can be applied remotely anywhere in the world. This recovery is done in a totally secure environment.

Contact us and start the recovery now.

Digital Recovery helps companies recover data

Check out other posts

We are always online

Please fill out the form, or select your preferred contact method. We will contact you to start recovering your files.

Latest insights from our experts

AtomSilo Ransomware

Ransomware AtomSilo

The AtomSilo ransomware emerged in September 2021, the group acts a little differently than other ransomware groups, the ransom amount is fixed, $1 million is

Khonsari Ransomware

Khonsari Ransomware

The Khonsari ransomware was the first group to exploit known Apache Log4j vulnerabilities (CVE-2021-44228 and CVE-2021-45046), the group has focused its attacks on Windows servers that


Through unique technologies Digital Recovery can bring back encrypted data on any storage device, offering remote solutions anywhere in the world.