Step 1: Create a new Case
Click here to submit a new case -> http://fastdatarecovery.com.au/OS/upload/open.php
The purpose of the evaluation is to determine the type and complexity of infection and cost associated with the recovery. Every infection is unique and we can only determine the cost of recovery after a proper evaluation.
We have 100% success rate with most ransomware infections like JAVA, Arrow, Cryptolocker, DMA, XTBL, Kyra, Locky, Thor, CrytpoMIX, Microsoft Crypto, Aleta, Arena, Nuclear, NM4, Gryphon, BTC, and Zepto (to mention few!)
We operate on No Data = No Fee!.
When submitting a ticket, you will be asked for the following information
- Enter your details
- Select the type of evaluation
- Free Evaluation 10-14 days on average
- Priority Evaluation
- Cost of Priority evaluation is $350
- The cost of the evaluation will go towards the recovery of your files
- You are covered by our No Data = No charge policy
- 4 to 24 hours response time in most cases
- Send 3-4 small sample files with different extensions plus the ransomware note (the ransomware note contains important information about your ransomware infection)
- Submit a case
Depending on the evaluation you have selected we will commence analysing your files to determine the cost associated with recovery.
If you have elected for a priority evaluation you will receive an invoice from our accounts department and upon receipt of payment we will commence the evaluation
A proper tax invoice will be issued clearly mentioning no data no charge.
Priority Evaluation can take 4-24 hours
Step 3: Quote
Upon completion of the evaluation, a quote will be sent to you. 80% of most jobs are between $750 – $4000 and can only be determined after we run the evaluation.
We provide two levels of service. Standard Recovery service (6-10 days) or a priority service (1-5 days) on average.
* Most of our jobs are recovered within 1-2 days but we do allow up to 5 days
* All jobs are started immediately after quote acceptance.
Step 4: Acceptance of Quote
Once you accept the quote, an invoice will be sent to you to commence recovery.
Upon receiving remittance advice, your job will start immediately.
Step 5: Initial Recovery Process
We will work on the original sample files submitted as part of the ticket until we reverse-engineer the decryption key.
Once the key has been identified, we will contact you or update the ticket to start the recovery.
We will need remote access via team viewer (https://download.teamviewer.com/download/TeamViewerQS_en.exe) or screen connect (http://pclink.gotdns.com:8040)
Further instructions will be sent by email
Step 6: Actual Recovery
Upon a successful remote connection to your infected computer, we take a snapshot of your infected files before and after the recovery on an excel spreadsheet for your records.
We start the recovery process and check random files to ensure they are opening successfully and confirm successful recovery.
Your ticket will be updated to advise of the recovery completion
Note1: We highly recommend a complete backup of your files to an external drive (and have it disconnected from the infected system before we commence recovery)
Note2: Please ensure your network has been scanned and cleaned properly before any data recovery.
If you don’t have an IT technician, please let us know and we are happy to perform the service at an additional cost.
Step 7: Prevention
A basic recommendation will be made to identify the risk of infection and discuss the appropriate solution to avoid further attacks in the future.