Virus or Ransomware

In laby we can recover data encrypted by a VIRUS or RANSOMWARE attack. Whatever your case, we can help you.

At Laby we can help you.


What is Ransomware?

Ransomware is a type of malware that infiltrates computers and mobile devices connected to the Internet. Once inside, it analyzes the use of our data, as well as internal backup systems, routines, and high-demand services for and even other computers or peripherals connected to the network, such as servers, workstations, NAS devices, or even disks. virtual hard drives in the cloud like Google Drive, Amazon, etc. Once this analysis has been carried out, once the attack has been launched, it will proceed to prevent access to the information, generally encrypting it, and requesting a ransom to recover the information.

We offer you our data recovery solutions.
At LABY we can help you recover files lost due to VIRUS or RANSOMWARE, we will explain the reason that caused the data loss and help you recover the lost files, photos or documents.
In addition, we will advise you to prevent it from happening again.

Trust Laby, we can recover and decrypt information destroyed by a virus or ransomware.

Problems due to

In recent years, Ramsomware attacks have evolved from random network attacks in search of security flaws, to premeditated attacks against targets such as companies or storage systems like Sinology or Qnap NAS among others, servers, vpn or virtual machines.

Once hackers have penetrated the security system, they observe and study the company’s movements. In this way, they know how data traffic works, how important it is, how to make backups, etc., in order to draw up a plan for attacking and encrypting data. They make sure that the backups are not usable and proceed to the complete encryption of the data likely to be important, to finally ask for a ransom.



Contact the offender or hacker through the ransom note. This option should NOT be performed under any circumstances. Interest is being shown in the recovery of that encrypted data, therefore, the person or group behind it will understand that the encrypted data is important and could take other actions against us.

2. On the other hand, paying a ransom presents several conditions, among them:

It is not legal to pay such a ransom to criminals or cybercriminals. It is punishable by law

– There is no certainty of payment. They usually ask for cryptocurrencies that cannot be traced so no guarantees can be required.

– It has been demonstrated in many cases, that once the ransom is paid, they proceed to perform a partial decryption of data. If you want the rest, you have to keep paying.


Before giving any advice, it is important to keep in mind that it is not only necessary to take preventive measures in terms of equipment and software. It is also important to train employees and even oneself to avoid facilitating the possibility of infecting our systems.

Having an infrastructure (however small it may be) that is always up to date in terms of software (with manufacturer updates) and having security elements such as a well-configured firewall. Likewise, having offsite backups outside the same work network is also protected. 

If you are not knowledgeable about it, it is better to leave the IT infrastructure in the hands of professionals.

As for employees and even oneself, it is important to be wary of emails with PDF attachments if we do not clearly know the origin of the email. Tracking links to courier packages or banks are the easiest way to let Ramsomware in without us being aware of it.
Another factor to take into account is not to connect external devices (USB, hard disks) if we do not know where they come from. It may seem very obvious, but there are several cases of Ramsomware in Spain, which have entered through these routes.

Finally, common sense. When in doubt, it is better to delete the mail or get rid of the device.


In just 1 HOUR

We process the collection through courier service.

In 4 Working Hours

After receiving the device in the laboratory (within 24 hours), we carry out a diagnosis and budget without obligation within a maximum period of 4 business hours.

4 to 7 working days

It is the average time, in working days, to recover the damaged device*

* There are cases where it may take longer, but we will notify you so that you are always informed.

If you have problems with Virus or Ransomware...





Analyzes performed


Spare parts



Pick up service
and free shipping (*)

Diagnóstico y
presupuesto gratuitos

Real time monitoring
through our intranet

If we don't get your
data, we do not charge

Telephone service
free customer

Electronic Laboratory and Class 100 Clean Room

Qualified technical staff and continuous training

Service with coverage at European level

* If the device is unrecoverable or the quotation is rejected, courier charges will be charged.

More than 19.615 diagnoses performed. More than 27.351 devices in stock for fast and economical service. Own software and customized intranet.




The price to recover data that has been corrupted or encrypted by the virus or ransomware will always be based on the damage caused by the virus or ransomware , together with the hours of work and technical equipment required to carry out the recovery processes.

We will carry out a pre-analysis of your case. We will inform you of the time and cost of this analysis. Once the vectors have been identified, we can provide you with a budget and a certain time.
Upon acceptance of the estimate*, we will begin the decryption work and take care of the entire process in order to deliver your decrypted data to you.

*If decryption is not possible, no cost related to the decryption process will be charged.


Decrypt encrypted data

Each type of encryption is unique. Despite the fact that ramsomware tends to have generic names, it is important to know that on many occasions they use different encryption keys, generated at the time to proceed with the encryption of data . Furthermore, if the process is interrupted for any reason (pc restart, power off, etc.) a new key is generated, different from the previous one, so we can find files with one key and files with another.

It is important to be able to carry out a prior analysis of the encrypted files and determine how many encryption vectors (keys) are applied in the data encryption process. For this, a sample of the files must be available. so that Laby engineers can analyze and proceed to determine the variant and vectors.


Encryption processes

Encryption processes in many cases are extremely complex. In order to solve certain cases, external infrastructures such as computer centers are used to process extremely complex mathematical calculations in short periods of time. Agreements with this type of infrastructure allow key extraction and proceed to decipher the data encrypted by the ransomware.

Working with Laby guarantees you a professional, legal service with guarantees of resolution.


At LABY we are specialists in the recovery and decryption of this type of VIRUS or RANSOMWARE.

If you have a problem with a data encryption by a VIRUS or RANSOMWARE and your information has been encrypted demanding a ransom, our advice is not to pay the hackers. You have no guarantee of recovery of your files through this procedure.

It is important to analyze the files at their source and not attempt to manipulate them, as this may result in the files not being recovered.

If we don't recover your data, we don't get paid

Contact us to request a quote

If you want to know exactly the cost for you, it is best to contact us and we will give you a free estimate without obligation.

The best thing is to let OUR CLIENTS
give their opinion about us

Our +300 reviews are published on Google
Average rating: 4.7 out of 5

Concepcio Agusti i Parareda
Concepcio Agusti i Parareda
Genial, amb el tracte, la informació donada i sobretot amb la rapidesa amb la m'han recuperat tota la informació. No podria desitjar un servei millor. Gràcies a tot l'equip
Lo recomiendo 100% Se me estropeó un disco duro que nunca había dado ningún problema en el año y pico que hacía que lo tenía... allí tenía todo el trabajo de 3 años, todos los archivos de clientes, trabajos en curso, trabajos finalizados... me lo recuperaron todo sin problemas. Espero no tener que repetir, pero si vuelve a pasarme algo así tengo claro a quién acudiré.
Recibi un trato estupendo. Les lleve disco duro externo de 4TB que no podía leer. Hacia un ruido extraño que hacia presagiar fallo HW. Intentaron recuperarlo pero les fue imposible. Me reintegraron totalmente el 30% que les transferí cuando acepte el presupuesto.
Antonio Marquez
Antonio Marquez
se me cayó el disco externo al suelo desde la altura de la mesa y dejó de funcionar. tenía fotos, videos, documentos importantes…les doy las gracias porque por suerte me lo han podido recuperar casi todo y con un trato excepcional
Lo recomiendo 100%. Perdí todos los datos del portátil con las fotos de mis hijos desde que eran pequeños. Después de llamar a otras empresas de Barcelona decidí hacer la recuperación con ellos porque fueron los que mas confianza me dieron y no me equivoqué. Supe en todo momento en que punto se encontraba la recuperación y, aunque no me dieron todas las garantías en un principio, en menos de una semana tenía todas las fotografías de nuevo. Agradezco a todo el equipo de Laby y en especial a Marta por la atención que siempre me ha dado.
Eliseo Carrasco
Eliseo Carrasco
Excelentes profesionales y excelente trato. Presupuesto de recuperación sin compromiso.
Inma bastante molina
Inma bastante molina
Trato excelente, muy amables, me recuperaron los datos cuando otras empresas no lograron hacerlo. Totalmente recomendable.
Marta Mata Pamies
Marta Mata Pamies
Servicio de 10! Aunque pase el tiempo no pierden la calidad de trabajo y hacia el cliente. Hace tiempo ya tuve que recurrir a ellos y fué un trabajo inmejorable como esta vez, informando-me de todo lo que iba aconteciendo en todo momento! Lo recomiendo 100%. Mil gracias de nuevo!


Mechanical hard disks

The main components of HDD disks are the main platters (disks), where the data is stored, and the heads, which are responsible for accessing the information. The most common hard disk.

SSD Hard Drives

SSDs do not move, hence the name solid state. The information is stored in blocks and no headers are required to access it. It is much more efficient and faster than an HDD hard disk.

External Hard Drives

External hard disks allow us to store outside the computer all the important information of which we want to make a backup copy. But one failure can cause us to lose all this data.

Iphone, Ipad or MacBook

Apple devices, such as Iphone, Ipad, Macbook, Macbook air Imac, Mac Mini, etc; are reliable, elegant, powerful and easy to use devices.

Laptop hard disks

On the laptop hard disk we store important work or home information. If a failure occurs, it can cause us to lose all this valuable personal data.

NAS, SAN and DAS disks

A SAN, NAS or DAS disk is a compact enclosure consisting of several hard disks that are connected via a network cable to the system, hence the common name network hard disk.

RAID systems

RAID disks are a redundant group of independent disks. They can be HDD disks or SSD disks and together they form a storage system to distribute or replicate data.

Pendrives and USB Flash Drives

Pen drives or USB flash drives consist of one or more memory blocks. They work in many cases like SSD devices (same Flash technology).

Memory cards

Memory cards are used to store information from devices such as cameras, cell phones or tablets. They differ in their storage capacity and read/write speed.

Virus or Ransomware

We recover data encrypted with viruses or ransomware. Ransomware is extortive software: its purpose is to prevent you from using your device until you have paid a ransom. Depending on the type of ransomeware, either the entire operating system or only some files are encrypted.

Mobile Phones and Tablets

In mobile devices such as smartphones or tablets, the recovery process can be performed through electronic repair of the damaged components or by performing the chip off process.

Data deletion

We offer the service of secure data erasure and destruction with certificate in our laboratory to perform personalized management or we can offer the service of destruction and erasure of data remotely.

Forensic Analysis

Computer forensic analysis and expert evidence We recover and certify critical information with legal value for companies and individuals We have certified computer experts to perform certifications, expert analysis and reports with legal value.