Russian Hackers Weaponize Ransomware in War with Ukraine

According to the Computer Emergency Response Team of Ukraine (CERT-UA), Russian hackers have used a new malware strain, “Somnia,” to disable information technology (IT) systems in Ukraine. While the government of Ukraine has not confirmed the success of the attack,...
November 14, 2022

Alleged Member of LockBit Ransomware Group Arrested in Canada

The Department of Justice (DOJ) has announced the arrest of Mikhail Vasliev, 33, for suspected involvement in the global LockBit ransomware attacks that have targeted hundreds of organizations over the past two years. Vasliev, who is a Russian-Canadian citizen according...
November 11, 2022

LockBit Ransomware: Is Data Recovery Possible?

LockBit was first identified in September 2019. At the time, it was known as ABCD ransomware due to its method of attack: The ransomware would encrypt files and change their file extensions to .abcd. Newer versions of LockBit change the...
November 9, 2022

Ransomware Investigation Services

In 2022, researchers recorded over 623 million ransomware attacks worldwide. That number increased significantly from 2021 — and may be much higher, since many businesses choose not to report infections. When a ransomware attack occurs, your organization needs to respond...
October 19, 2022

Veritas Backup Migration: Challenges and Considerations

Veritas Backup Exec™  is a unified data backup and recovery solution for small to midsize businesses. The software enables organizations to protect critical data across multiple systems, and thanks to integrated cloud connectors for all major cloud vendors, Veritas has...
April 15, 2022

How to Protect Your Phone from Ransomware

Most ransomware attacks target desktop computers, servers, and high-value storage networks — but in recent years, a growing number of attacks have targeted smartphones and other mobile devices. Below, we’ll look at a few examples of how mobile ransomware works....
April 8, 2022

Data Leak Response: 4 Tactics for Reducing Risks

According to the Identity Theft Resource Center, the number of data breaches jumped 68 percent in 2021 — setting a new record with a total of 1,862 events. To IT security experts, the numbers aren’t surprising. Bad actors use extremely...
March 21, 2022

How to Stop Locky Ransomware: Prevention, Decryption, and Recovery

Locky is the common name for a ransomware variant that first appeared in 2016. The first version of Locky was distributed by the Necurs botnet; subsequent versions have been introduced by Necurs and other distribution groups. Typically, the ransomware is...
March 9, 2022

Ransomware Attack Data Recovery: 4 Factors to Consider

Ransomware attacks continue to threaten businesses, local governments, and nonprofit organizations — and the trend is unlikely to change anytime soon. According to public records, more than 400 city and county governments have sustained ransomware attacks since 2014. Private...
February 23, 2022

A Look Inside Datarecovery.com’s Hard Drive Parts Inventory

In order to recover data from a physically damaged hard drive, engineers need to return the drive to a working condition. That’s easier said than done — hard drive components are extremely drive-specific. In some cases, drives with identical model...
February 7, 2022