Digital Recovery Group
CONSOLIDATED EXPERIENCE
PROJECTS AROUND THE WORLD
MULTILINGUAL SUPPORT
WORLDWIDE PRESENCE
Digital Recovery was founded in April 1998, after an extensive period of loss and disruption caused by the Chernobyl virus (Win32/CIH). We are the result of a strategic partnership with a North American data recovery laboratory. In this partnership we acquired technology and expertise that allowed us to position ourselves among the best data recovery companies.
It all started with data recovery on HD, SSD, Databases, Servers, RAID, Storages, Magnetic tapes and more.Then it opened doors to meet a global demand for ransomware.
Over the years we had an impressive growth, with that we opened the first branch in Germany, and today we are located in 4 continents.
Thousands of companies, such as Dell, IBM, Samsung, Toshiba, Siemens, D-Link, Caterpillar, Scania, Volkswagen, Coca-Cola, TOTVS and many others around the world have trusted their devices and information to be recovered by Digital Recovery Group.
We have a multilingual customer service, offering native service in English, Spanish, French, Portuguese, Italian, and German. All this so that there are no barriers to serve our customers.


Canada
Peru
Argentina
Chile
Venezuela
United Kingdom
France
Spain
Switzerland
South Africa
India
China
Australia
Morocco
Nigeria
Russia
Egypt
Mexico
Turkey
Ukraine
Latvia
Indonesia
Iran
Israel
Japan
Taiwan
Vietnam
Singapore

USA
Germany
Italy
Brazil
Dubai
- Offices
- Projects
Success Cases
What our customers say about us





Client since 2017












Latest insights from our experts

AtomSilo Ransomware
The AtomSilo ransomware emerged in September 2021, the group acts a little differently than other ransomware groups, the ransom amount is fixed, $1 million is

Khonsari Ransomware
The Khonsari ransomware was the first group to exploit known Apache Log4j vulnerabilities (CVE-2021-44228 and CVE-2021-45046), the group has focused its attacks on Windows servers that

Quantum Ransomware
Quantum Ransomware is one of the newer malware in activity, there are already some reports of attacks done by it. A bit different from the