Another example of oracle data file is encrypted and restored

E-mail:chf.dba@gmail.com

Title: Another example of oracle data file is encrypted and restored

Author: DATABASE SOS©All rights reserved [without my consent, it may not be reproduced in any form, otherwise there is the right to further legal responsibility.]

A customer oracle database file is encrypted with the suffix name: .z33m8rvi, and the content of the txt file is as follows
20200617223806


The encrypted data file is:
20200617223900


By analyzing the file, we judge this encryption situation, all data in the data file can be recovered, after recovering the file, the database is directly opened, and the data is exported normally
20200617224546


We have a lot of experience in encrypting similar data files. If you encounter such encryption, you need to solve it,you can contact us to provide:E-Mail:chf.dba@gmail.com

.lockbit encrypted database recovery

E-mail:chf.dba@gmail.com

Title: .lockbit encrypted database recovery

Author: DATABASE SOS©All rights reserved [without my consent, it may not be reproduced in any form, otherwise there is the right to further legal responsibility.]

There is a case where the oracle database is encrypted with the suffix name: .lockbit
20200619224513


Restore-My-Files.txt file content:
20200619224658


Through the recovery of encrypted files, confirm that each file only destroyed a part of the data block
20200619224900


Through the underlying analysis and recovery, the undamaged block data in the file can be recovered, minimizing the loss of customers due to encryption
20200619225348


We have a lot of experience in encrypting similar data files. If you encounter such encryption, you need to solve it,you can contact us to provide:E-Mail:chf.dba@gmail.com

[squadhack@email.tg].Devos Recovery

E-mail:chf.dba@gmail.com

Title: [squadhack@email.tg].Devos Recovery

Author: DATABASE SOS©All rights reserved [without my consent, it may not be reproduced in any form, otherwise there is the right to further legal responsibility.]

Recently, a friend inquired that the hospital database file was encrypted as: .id[FC1CFDC9-2700].[squadhack@email.tg].Devos
20200628222729


The info.txt information they left is

!!!All of your files are encrypted!!!
To decrypt them send e-mail to this address: squadhack@email.tg

Analyze the destruction of encrypted files
20200628223640


There is not much data destroyed by encryption, but because the business is special, there is a lot of xml type data, it is best to open the database, and then export the data, analyze the damaged part through the bottom layer, the open database is successful, and the loss is minimized (for individual damage (The table is processed separately according to rowid/pk)
20200628224435
20200628224027


We have a lot of experience in encrypting similar data files. If you encounter such encryption, you need to solve it,you can contact us to provide:E-Mail:chf.dba@gmail.com

Oracle dmp Encryption Recovery

E-mail:chf.dba@gmail.com

Title: Oracle dmp Encryption Recovery

Author: DATABASE SOS©All rights reserved [without my consent, it may not be reproduced in any form, otherwise there is the right to further legal responsibility.]

An oracle dmp file is encrypted and damaged.The encryption prompt is as follows
20200306192501


20200306191213


Analysis of the tool found that the first 1M of the file was damaged
20200306191553


Special processing of 1M data with head damage through our tool, data is imported directly using imp command
20200306191709
If you have various databases (oracle, sql server, mysql) encrypted by similar viruses, we can provide professional recovery support to achieve almost perfect recovery of data without paying hackers
E-Mail:chf.dba@gmail.comProvide professional recovery services.

.horseleader encrypted database recovery

E-mail:chf.dba@gmail.com

Title: .horseleader encrypted database recovery

Author: DATABASE SOS©All rights reserved [without my consent, it may not be reproduced in any form, otherwise there is the right to further legal responsibility.]

Virus-encrypted .horseleader extension file
20200304182923


Through analysis, we only destroyed part of the data, and we can recover most of them
20200304182504
20200304182522


Process through the bottom layer, skip the damaged part and recover the non-corrupted data
20200304182551


For this type of encryption, we can recover the vast majority of data for SQL Server, MySQL, oracle, and realize the recovery of most business data by not paying a ransom to hackers.

.[geerban@email.tg].Devos Encrypted database recovery

E-mail:chf.dba@gmail.com

Title: .[geerban@email.tg].Devos Encrypted database recovery

Author: DATABASE SOS©All rights reserved [without my consent, it may not be reproduced in any form, otherwise there is the right to further legal responsibility.]

A new virus was found to encrypt the Oracle database, with a suffix named:.id[06495F21-2700].[geerban@email.tg].Devos
20200302121209


Through analysis, it was found that the data in the front part of the file was directly blanked.
20200302122026


File intermediate data still exists
20200302122204


Through the underlying analysis for such failures, we can recover the vast majority of data and achieve the vast majority of business data recovery without paying a ransom to hackers.

.ROGER virus encrypted database recovery

E-mail:chf.dba@gmail.com

Title: .ROGER virus encrypted database recovery

Author: DATABASE SOS©All rights reserved [without my consent, it may not be reproduced in any form, otherwise there is the right to further legal responsibility.]

Recently, a new encryption virus was found, with the suffix: .id-CC46A224.[Wang.chang888@tutanota.com].ROGER. The encryption prompt is similar:
ROGER-virus-new-ransom-note-image


Analyze the file and find that the virus emptied the file header
20200224173730


Analysis found that most of the location business data in the file still exists
20200224174433


Through the underlying analysis, such failures can achieve the vast majority of data recovery
20200224174803


If you encounter a database that is similar to an encryption virus and encrypted (oracle, mysql, sql server), you can contact us to achieve a better recovery effect without paying the hacker (the recovery is not successful without any fees)
E-Mail:chf.dba@gmail.comProvide professional decryption recovery services.
Protection recommendations:
1. Multiple machines, do not use the same account and password
2. The login password should have sufficient length and complexity, and the login password should be changed regularly.
3. The shared folder of important data should be set up with access control and regularly backed up
4. Regularly detect security vulnerabilities in the system and software and apply patches in a timely manner.
5. Periodically go to the server to check if there is any abnormality. View scope includes:
a) Whether there are new accounts
b) Guest is enabled
c) Is there an exception in the Windows system log
d) Is there any abnormal interception of anti-virus software?
6. Install security protection software and ensure its normal operation.
7. Download and install software from regular channels.
8. For unfamiliar software, if it has been intercepted by antivirus software, do not add trust to continue running.

.happychoose encrypted database recovery

E-mail:chf.dba@gmail.com

Title: .happychoose encrypted database recovery

Author: DATABASE SOS©All rights reserved [without my consent, it may not be reproduced in any form, otherwise there is the right to further legal responsibility.]

Recently, a friend of the SQL server database was encrypted with the suffix: .mdf.happythreechoose, which needs to provide recovery support.
Files left by hackers are similar

ALL YOUR FILES ARE ENCRYPTED!
ALL YOUR IMPORTANT DATA HAS BEEN ENCRYPTED.

To recover data you need decryptor.
To get the decryptor you should:
Send 1 test image or text file happychoose@cock.li or happychoose2@cock.li.
In the letter include YOUR ID (look at the beginning of this document).

We will give you the decrypted file and assign the price for decryption all files
 

After we send you instruction how to pay for decrypt and after payment you will 
receive a decryptor and instructions We can decrypt one file
in quality the evidence that we have the decoder.
Attention!

Only happychoose@cock.li or happychoose2@cock.li can decrypt your files
Do not trust anyone happychoose@cock.li or happychoose2@cock.li
Do not attempt to remove the program or run the anti-virus tools
Attempts to self-decrypting files will result in the loss of your data
Decoders other users are not compatible with your data, 
because each user's unique encryption key

The query found that the virus and .happyfourchoose belong to the GlobeImposter family. Currently, the solution is not supported.密
Through low-level analysis, it was found that mainly the header and tail of the file were confidential.
20200217223408
20200217230214


Scanned data files and found that most of the data can be recovered
20200217222837


If you encounter a database that is similar to an encryption virus and encrypted (oracle, mysql, sql server), you can contact us to achieve a better recovery effect without paying the hacker (the recovery is not successful without any fees)
E-Mail:chf.dba@gmail.comProvide professional decryption recovery services.
Protection recommendations:
1. Multiple machines, do not use the same account and password
2. The login password should have sufficient length and complexity, and the login password should be changed regularly.
3. The shared folder of important data should be set up with access control and regularly backed up
4. Regularly detect security vulnerabilities in the system and software and apply patches in a timely manner.
5. Periodically go to the server to check if there is any abnormality. View scope includes:
a) Whether there are new accounts
b) Guest is enabled
c) Is there an exception in the Windows system log
d) Is there any abnormal interception of anti-virus software?
6. Install security protection software and ensure its normal operation.
7. Download and install software from regular channels.
8. For unfamiliar software, if it has been intercepted by antivirus software, do not add trust to continue running.

.chch encrypted database recovery

E-mail:chf.dba@gmail.com

Title: .chch encrypted database recovery

Author: DATABASE SOS©All rights reserved [without my consent, it may not be reproduced in any form, otherwise there is the right to further legal responsibility.]

Recently, the database was encrypted by the .chch virus. Through analysis, such viruses can be better recovered through the database level.
20191205192145
Through the recovery process, a better data recovery effect is achieved as follows
20191205191902


If you have such an encrypted scenario database (sql server, oracle, mysql), you can contact us

.[hardlog@protonmail.com].harma encrypted database recovery

E-mail:chf.dba@gmail.com

Title: .[hardlog@protonmail.com].harma encrypted database recovery

Author: DATABASE SOS©All rights reserved [without my consent, it may not be reproduced in any form, otherwise there is the right to further legal responsibility.]

Some friends continue to find us. Their old encrypted library needs to be restored, and the extension is similar.id-02A15898.[Hardlog@protonmail.com].harma
 20200214155103


Through analysis, it was found that the virus directly emptied part of the block.I did not want some previous viruses to encrypt the block, but luck was good, and there was still a lot of data that was not destroyed.
 20200214155240
 20200214155304


Over 99% recovery of data through a series of underlying processing
 20200214155659


If you encounter a database that is similar to an encryption virus and encrypted (oracle, mysql, sql server), you can contact us to achieve a better recovery effect without paying the hacker (Unsuccessful recovery without charge)
E-Mail:chf.dba@gmail.comProvide professional decryption recovery services.