Share on facebookFacebook
Share on twitterTwitter
DJVU ransomware, also known as STOP, has elevated its attacks since early 2022. It first appeared in 2018 and since then there have been more than 370 variations of the malware.
STOP/DJVU uses RSA encryption, which is one of the most commonly used by ransomware groups, the group’s main focus is Windows operating systems.
Because there are so many variations of STOP/DJVU, the extensions added to the encrypted files are varied, the main ones include: .eucy, .ckae, .qnty, . ccps, .iips, .avyu, .cuag, .bbbr, .bbbe, .qqqr, .maiv, .bbbw, .yoqs, .qqqe, .qqqw, .maak, .fhkf, .vfgj, .yber, .zaqi, .nqhd, .vgkf, .dehd, .loov among others.
After STOP/DJVU invades the system it automatically downloads various programs that assist the ransomware to encrypt all files without any interruption.
At the end of the encryption a text file is left with instructions for the victim to contact the group to pay the ransom.
Digital Recovery specializes in the recovery of data encrypted by ransomware, we can recover any variant of the STOP/DJVU ransomware.
We can recover files stored on Databases, Storages, Virtual Machines, Servers, RAID systems and more.
We have developed unique technologies, this puts us at the forefront of encrypted data recovery, few companies can perform this recovery.
We have in our portfolio the remote recovery, with it we can recover data from anywhere in the world on any device.
All our processes were developed by our experts and created based on the General Data Protection Regulation (GDPR).
We know the importance of confidentiality in cases of ransomware attacks, so we have developed the NDA, which we make available to all our clients.
Contact us and start the recovery right now.