top of page
Network Cable Technician

Our Step By Step Process

Create a new Case

01

The purpose of the evaluation is to determine the complexity of infection and the cost associated with the recovery. Every infection is unique and we can only determine the cost of recovery after a proper evaluation.

We have 100% success rate with most ransomware infections like BIP, COMBO, JAVA, Arrow, Cryptolocker, DMA, XTBL, Kyra, Locky, Thor, CrytpoMIX, Microsoft Crypto, Aleta, Arena, Nuclear, NM4, Gryphon, BTC, and Zepto & many more

Evaluation

02

Depending on the evaluation you have selected we will begin analyzing your files to determine the cost associated with recovery.

If you have selected priority evaluation, you will receive an invoice from our accounts department and upon receipt of payment we will begin the evaluation.

A proper tax invoice will be issued clearly mentioning no data no charge policy.

Quote

03

Upon completion of the evaluation, a quote will be sent to you. 80% of most jobs are between $750 – $4000 and cost can only be determined after we run the evaluation on your files.

We provide three levels of service.

Standard Recovery Service (6-10 days)

Priority Recovery Service (1-5 days) on average

Emergency Recovery Service (24 Hours) DHARMA ONLY

Most of our jobs are recovered within 1-2 days but we do allow up to 5 days

All jobs are started immediately after quote acceptance.

Notify us immediately and confirm the files you have sent as we will provide a quote/recovery based on the ransom attached

Acceptance of Quote

04

Once you accept the quote, an invoice will be sent to you to commence recovery.

Upon receiving remittance advice, your job will start immediately.

Initial Recovery Process

05

We will work on the original sample files submitted as part of the ticket until we reverse-engineer the decryption key.

Once the key has been identified, we will contact you or update the ticket to start the recovery.

We will need remote access via team viewer (https://download.teamviewer.com/download/TeamViewerQS_en.exe)

Further instructions will be sent by email

Actual Recovery

06

Upon a successful remote connection to your infected computer,  we take a snapshot of your infected files before and after the recovery on an excel spreadsheet for your records.

We start the recovery process and check random files to ensure they are opening successfully and confirm successful recovery.

Your ticket will be updated to notify you of completion.

Note1: We highly recommend a complete backup of your files to an external drive (and have it disconnected from the infected system before we begin recovery)

Note2: Please ensure your network has been scanned and cleaned properly before any data recovery.

If you don’t have an IT technician, please let us know and we are happy to perform the service at an additional cost.

The advantage of our Ransomware Recovery?

At WeDecrypt, we pride ourselves in our knowledge and experience in the Ransomware Recovery and Ransomware Prevention services from cyber-attacks (aka Ransomware).

Trust the largest ransomware recovery service in the US with a growing list of international clients with your data recovery

Prevention

A primary recommendation will be made to identify the risk of infection and discuss the appropriate solution to avoid further attacks.

website security
bottom of page