Reading Data Recovery — the UK’s No.1 Ransomware Data Recovery Specialists (25+ years)
We deliver forensic-grade ransomware triage, containment, and data recovery for laptops, desktops, external drives, NAS/RAID and virtualised environments. We handle cases involving families such as LockBit, REvil/Sodinokibi, Conti/Black Basta lineages, Dharma/Phobos, STOP/Djvu, Medusa, Makop, and many others. Our approach is evidence-preserving, clone-first, and controller-aware—we stabilise storage, acquire pristine images, and then pursue decryption or non-decrypt recovery paths in parallel to maximise outcome.
What we actually do (process overview)
- 
Incident intake & isolation — Safely power down infected systems, capture volatile artefacts (RAM, handle lists, key material), preserve chain-of-custody. 
- 
Forensic imaging — Hardware write-blocked, hash-verified images of all affected volumes (HDD/SSD/NVMe/RAID). 
- 
Strain identification — Classify by extension, note, binary signatures, and crypto artefacts; map kill-switches and known decryptors. 
- 
Parallel strategy — (a) Cryptanalytic/decryption path and (b) non-decrypt reconstruction (snapshots, journals, databases, partial file rebuilds). 
- 
Recovery & verification — Sample-open validation, hash manifests, structured delivery; optional evidence bundle for insurers/law enforcement. 
We never modify originals; all work is performed on forensic images.
25 techniques we use to recover from ransomware (with technical detail)
Format: Technique — Why it works / What we do in the lab
- 
Family & crypto-profile fingerprinting — Static triage of notes, extensions, PE imports, and config blocks identifies cipher-suite (e.g., ChaCha20+RSA-2048, AES-256-GCM+ECC). This tells us if public decryptors exist, whether hybrid per-file keys are used, and where to hunt for session keys or nonces. 
- 
Known-good decryptors & config extraction — When a strain has a vetted decryptor (or a leaked builder/config), we extract victim ID, campaign key, and per-file metadata to feed the tool. Our wrappers validate output with per-file hashes and auto-skip corrupted headers. 
- 
Private lab decryptors (flawed variants) — We maintain proprietary modules for specific mis-implementations (e.g., IV reuse, CTR counter resets, truncated MACs). These attack logic errors rather than the cipher, enabling plaintext recovery without the private key in some variants. 
- 
GPU-accelerated keyspace attacks (weak KDFs/password gates) — For strains that gate decryption behind a human password or a weak KDF (PBKDF2 with low iteration count, custom SHA loops), we distribute attacks across multi-GPU rigs with mask/rule/PRINCE heuristics and domain wordlists. We strictly target the wrapper credential, not strong asymmetric keys. 
- 
In-memory key harvesting — Live response/RAM images are parsed for key schedules, NaCl boxes, OpenSSL EVP contexts, Windows DPAPI blobs, and process heaps. Keys or decrypted session states sometimes persist post-encryption; we carve them and replay decryption on images. 
- 
Volume Shadow Copy & snapshot restoration — If VSS wasn’t fully purged (or was blocked by ACL issues), we mount snapshot diffs from clones and extract pre-incident versions. On NAS/VM stacks (ZFS/Btrfs/APFS/VMware), we enumerate snapshots and clone them out read-only. 
- 
Journal-led file system rollback — NTFS $LogFile/$UsnJrnl, APFS snapshots/OMAP, EXT journal and XFS log allow rollback to a consistent prior state for many small files, even when payloads were encrypted. We replay journals on images to reconstruct directories and metadata.
- 
Database-aware salvage — For SQL Server/Exchange/SQLite/QuickBooks/etc., we use WAL/redo logs and page-level checks to rebuild consistent databases, neutralising encrypted pages where possible and salvaging intact objects (tables, mailboxes, ledgers). 
- 
Partial file reconstruction (media & docs) — Many lockers encrypt only file headers/first N MB (“partial encryption” for speed). We repair PDF/JPEG/Office headers and rebuild MP4/MOV moovatoms frommdat, recovering playable media even when the header region is encrypted.
- 
Differential recovery via dedup/backup stores — Corporate shares with block-level dedup (Windows Server, Veeam repositories, ZFS) often retain earlier block versions. We extract pre-incident chunks by content hash and rehydrate files without an online backup server. 
- 
Cloud version restoration — OneDrive/Google Drive/Dropbox maintain previous versions and server-side recycle bins. We map local paths to cloud object IDs and bulk-restore pre-incident revisions with rate-limited tooling, independent of the infected endpoint. 
- 
Misused randomness & IV/key reuse attacks — We test for nonce collisions (AES-GCM/CTR, ChaCha20) across encrypted files. Reused IVs leak XOR of plaintexts; with known-plaintext headers (file magic, OOXML ZIP central directory), we can recover chunks. 
- 
RSA/ECC implementation flaws — We search for short exponents, shared-prime RSA, or reused ephemeral keys in ECDH (Curve25519/secp256r1). Entropy or PRNG seeding bugs can allow private-key recovery; we run GCD/sca tests across captured public keys. 
- 
Config mistakes in builders — Some campaigns embed raw private keys or decryptor URLs in the binary or note. We statically extract configs and verify against C2/recovery logic—occasionally yielding direct decryption capability for that campaign. 
- 
Offline-key family handling (e.g., STOP/Djvu) — When a strain falls back to a global “offline key”, public keys or known offline secrets exist for portions of the corpus. We partition files by key ID and apply the correct decryptor paths only where viable. 
- 
Negotiated key ingestion (client-direct) — If a client (via counsel/insurer) obtains a decryptor/key from actors, we validate it in a sandbox, snapshot the environment, and run decryption offline on clones with tamper-checks, then verify outputs by hashes and file-open tests. 
- 
Restore from cold/offline media — We inventory USB disks, NAS snapshots that were air-gapped, and previous workstation images. Even partial restores (user profiles, project repos) greatly reduce downtime while we pursue cryptanalysis for the remainder. 
- 
Virtualisation rollbacks — For Hyper-V/ESXi, we mount VM-level snapshots, copy out VMDK/VHDX prior states, or reconstruct guests by stitching base + delta disks, ignoring the encrypted delta. 
- 
Forensic carving of plaintext artefacts — Lockers often miss temp folders, cache stores, and thumbnail databases. We carve for JPEG/Office/ZIP/RAW signatures in unallocated space/slack and recover intact payload fragments that evade the encryptor. 
- 
Email & collaboration system recovery — For M365/Exchange, we export pre-incident mailbox versions and SharePoint/Teams document versions via eDiscovery/graph flows; for on-prem, we replay EDB/JET logs on image copies. 
- 
Domain posture & propagation cut-off — We harden AD/Group Policy (disabling scheduled tasks/PS scripts used by actors), rotate credentials, and isolate storage so ongoing encryptor daemons can’t re-touch already recovered data. 
- 
RAID/NAS metadata rebuild first, decrypt second — On multi-disk systems we virtually reassemble arrays (mdadm/LSI/Adaptec/ZFS/Btrfs), fix parity/metadata, then target encryption artefacts. A stable volume is prerequisite to any cryptanalytic attempt. 
- 
File-type–specific repair pipelines — Custom repair for Office OOXML, AutoCAD DWG, Photoshop/Lightroom catalogs, FCP/ProRes containers—rebuilding internal indexes where only headers/TOCs were hit. 
- 
Key escrow & DPAPI recovery — Windows DPAPI master keys and domain backup keys can decrypt app secrets (e.g., cloud sync tokens, vaults). We leverage domain DPAPI backup to regain app access for version restores. 
- 
Metrics-driven triage & stop-loss — We quickly estimate recoverability: encryption coverage %, snapshot viability, key prospects. This informs whether to focus on non-decrypt restores or invest GPU/RAM for crypto attacks, reducing downtime and cost. 
Important realities (straight talk)
- 
Modern crypto is strong. When actors used correctly implemented AES/ECC/RSA and scrubbed keys, decryption without keys is typically infeasible. Our wins often come from implementation mistakes, key artefacts, partial-encryption behaviour, or independent data versions (snapshots/cloud/dedup). 
- 
We never run decryptors on live infected hosts or originals; everything runs on cloned media with hash verification and audit logs. 
- 
If negotiation is pursued, it is always client-direct with legal/insurer oversight. We only validate any keys/tools obtained and perform safe bulk decryption. 
Why Reading Data Recovery
- 
25 years of incident response and forensic data recovery across consumer, enterprise and RAID/NAS/VM platforms. 
- 
Proprietary decrypt/repair tooling for specific variants and multi-GPU infrastructure for credential/KDF attacks where appropriate. 
- 
Deep file-system, database and media-container expertise to recover data even when decryption is not possible. 
- 
Evidence-grade process: write-blocked imaging, SHA-256 manifests, and deliverables suitable for insurers and law enforcement. 
Next steps (free diagnostic)
- 
Isolate affected machines from the network; do not delete files or “clean” disks. 
- 
Contact us for rapid intake. We’ll advise on RAM capture (where safe) and collection. 
- 
Send storage to us (anti-static bag inside a padded envelope or small box), or book a courier/drop-off. We’ll perform a free diagnostic and present clear recovery options. 
Reading Data Recovery — trusted partner for ransomware investigation, decryption and data restoration.


