The Ech0raix ransomware has been known since 2019. However, recently the group responsible for the Ech0raix ransomware attacks has updated its malware and has once again fired malicious email campaigns around the world.
The group’s attacks are targeted exclusively at QNAP NAS (Network Attached Storage) devices, which has forced the manufacturer QNAP to release problem-solving updates frequently.
The Ech0raix ransomware is written in the GO programming language and, like other ransomware, uses the AES algorithm to encrypt data.
Right after encrypting the most important data in the environment, the .encrypt extension is added to the original file name.
In its latest wave of attacks, the group behind the Ech0raix ransomware used to ask from 0.024BTC ($1,200) to 0.06BTC ($3,000) in ransom value.
According to independent researchers, there has been a considerable increase in reports of attacks by Ech0raix. A new wave is happening.
QNAP has been alerted and is working on fixing the problem. This possible update will certainly protect against future attacks. However, those who have already been infected will not be able to rely on this improvement for the recovery of their data.
Fortunately, in cases like this, data recovery companies like Digital Recovery can be relied upon.
Recover files encrypted by Ech0raix ransomware
Digital Recovery has specialized in recovering data encrypted by ransomware for over 23 years and has been helping companies that have suffered attacks get back up and running.
Our developers have managed to create a solution capable of recovering encrypted data on storage devices such as servers, databases, RAID systems and others.
We offer our customers a confidentiality agreement (NDA) because we understand the importance of professional secrecy.
For optimal security, our solutions have been fully developed based on the General Data Protection Regulation (GDPR).
Our team of experts is available 24/7 to serve you in the best way and show that recovery of data encrypted by Ech0raix ransomware is possible.
Contact us and get your data back.