Qnap Ransomeware- PhotoRec works to retrieve files
Posted: 29 Apr 2021, 09:53
Hi,
I and thousands of others have been hacked by Qlocker Ransomeware demanding 500 Bitcoins to get the files unencrypted.
A member on the Beeping Computer forum and someone on YouTube have come up with a way to try and retrieve the files that the hackers deleted. It uses PuTTy and PhotRec.
I eventually got it to work and PhotoRec has so far got 88k files with another 32 hours to go.
The program saves the files with a number and the correct ext so the actual orig filename is not there.
I was wondering in what order does PhotoRec get the files and save them to the new drive?
Is is by orig name alpha, or where it is saved on the disk etc.
It may help me when I am trying to rename the numbered files to their correct orig name.
Thanks to PhotoRec the hackers are a few dollars less rich, although I saw where someone said over 500,000 has been paid to them to get the file password.
I and thousands of others have been hacked by Qlocker Ransomeware demanding 500 Bitcoins to get the files unencrypted.
A member on the Beeping Computer forum and someone on YouTube have come up with a way to try and retrieve the files that the hackers deleted. It uses PuTTy and PhotRec.
I eventually got it to work and PhotoRec has so far got 88k files with another 32 hours to go.
The program saves the files with a number and the correct ext so the actual orig filename is not there.
I was wondering in what order does PhotoRec get the files and save them to the new drive?
Is is by orig name alpha, or where it is saved on the disk etc.
It may help me when I am trying to rename the numbered files to their correct orig name.
Thanks to PhotoRec the hackers are a few dollars less rich, although I saw where someone said over 500,000 has been paid to them to get the file password.