Blaze Ransomware

The Blaze ransomware is a relatively new group; it is a variation of the Babuk ransomware, a group that has made numerous attacks on businesses around the world. Blaze is following the path of its predecessor, the group targets large companies.

The group uses phishing campaigns to break into the victim’s system, this tactic is targeted at specific companies, after the malware is downloaded it quickly starts running in the background, mapping stored files and preparing them for encryption.

The encryption process is done within minutes, all files encrypted by the ransomware are given the .blaze extension. All files with this extension can only be opened with the decryption key.

After the end of encryption a file named  ‘How To Decrypt.txt.’ is generated. It contains the ransom terms, the victim is directed to a website in the .TOR browser, through which the victim may contact the criminals for the payment of the ransom.

Paying the ransom is not recommended under any circumstances, paying the ransom funds the group for further attacks.

Recover files encrypted by Blaze ransomware

Digital Recovery specializes in the recovery of files encrypted by ransomware, we can recover numerous extensions.

We can recover data encrypted in Database, Servers, Storages, RAID Systems, Virtual Machines and others.

We know that confidentiality in these cases is fundamental, so we provide all our customers with a confidentiality agreement (NDA).

Our specialists have developed exclusive technologies that can be applied remotely anywhere in the world. This recovery is done in a totally secure environment. Our solutions have been developed based on the General Data Protection Regulation (GDPR).

Contact us and start the recovery now.

Digital Recovery helps businesses recover data

Check out other posts

We are
always online

Please fill out the form, or select your preferred contact method. We will contact you to start recovering your files.

Latest insights from our experts

Khonsari Ransomware

Khonsari Ransomware

The Khonsari ransomware was the first group to exploit known Apache Log4j vulnerabilities (CVE-2021-44228 and CVE-2021-45046), the group has focused its attacks on Windows servers that

Récupérer le Ransomware Makop

Makop Ransomware

The Makop ransomware has grown through its affiliate programme, RaaS (Ransomware as a Service), a tactic that aims to find partners to carry out attacks


Through unique technologies Digital Recovery can bring back encrypted data on any storage device, offering remote solutions anywhere in the world.