Micronics Technologies India Private Limited

FAQs

Frequently Asked Questions

is it possible to Payment made After Data verification ?

Yes, We always First Verifying Data , if customer is happy than we generate invoice.
Payment is due in full upon completion & successful recovery. Micronics will not release client’s data until payment is made unless otherwise arranged by Micronics management. Once Data is Approved By customer than we will be charge for Data Recovery.

If Data is Not Recover By Micronics than Customer has to Pay Any char …

If no data is recovered by Micronics , client will not be charged per Micronics No Data Recovered, No Charge Policy (This excludes any parts fee and attempt fee charges for “High Priority” or “RAID” jobs).

Is there Any Checking/ Analysing Charges for Our Media ?

Micronics Data Recovery will perform a media evaluation/assessment to provide client with an estimate for recovery costs. This assessment is free of charge (applies only to Standard recovery jobs) and any work beyond this evaluation will not be performed without first obtaining explicit client approval. Beyond Standard evaluation charge @ 250/- Rs. + Services Tax

can you say your data recovery Minimum or Maximum chages ?

If Media has Standard Problem than we will charrge @ 2500/- Rs. Beyond Standard problem we will not perfom any Data recovery work without prior customer approval . we can not Say about Maximum Charges becuase price is decide by according to Media problems .

My Hard disk is 1TB AND My Data is 1gb Important than what is price …

Our Data Recovery charges are Never Depend On DATA Size , it is depending on Media Problem . Means If Media has Logical crashed than lower charges and If media is physically Crashd than it is more charges than logically.

What is price for DATA RECOVERY ?

Our pricing structure is determined by 3 main factors:
• Type Of Media Problem: ( e.g . Logical Or Physical )
• Capacity Of Media : ( e.g. 40gb, 250gb, 500gb, 1tb, 2TB and etc )
• type Of Media Configuration : ( e.g used isolated , used in network storage, used in server and etc .)

Is it possible to decrypt files encrypted by Cerber?

YES , at this is possible.
Cerber is notable due to how it encrypts the user’s files – namely, it uses AES-265 and RSA encryption method – in order to ensure that the affected user has no choice but to purchase the private key. The RSA public key can only be decrypted with its corresponding private key. Since the AES key is hidden using RSA encryption and the RSA private key is not available, decrypting the files is not feasible as of this writing.
Brute forcing the decryption key is not realistic due to the length of time required to break an AES encryption key.

So unfortunately, once the Cerber encryption of the data is complete, decryption is not feasible without paying the ransom on Decryption Service site.

Because the needed private key to unlock the encrypted file is only available through the cyber criminals, victims may be tempted to purchase it and pay the exorbitant fee. However, doing so may encourage these bad guys to continue and even expand their operations. We strongly suggest that you do not send any money to these cyber criminals, and instead address to the law enforcement agency in your country to report this attack.

Is my computer infected with Cerber virus?

If your computer is infected with the Cerber ransomware will display a red #DECRYPT MY FILES#.png wallpaper that covers the entire desktop, and all your documents will have a .Cerber extension. A #DECRYPT MY FILES#.txt text file will be placed on your desktop. Both files contain instruction on how or recover the encrypted files.
The messages displayed by this ransomware infection can be localized depending on the user’s location, with text written in the appropriate language.
This the message that the Cerber ransomware may display:

Cerber

Your documents, photos, databases and other important files have been encrypted!
To decrypt your files follow the instructions:
—————————————————————————————
1. Download and install the “Tor Browser” from https://www.torproject.org/
2. Run it
3. In the “Tor Browser” open website:
http://decrypttozxybarc.onion/[removed]
4. Follow the instructions at this website

What is Cerber Ransomware?

The Cerber ransomware targets all versions of Windows including Windows XP, Windows Vista, Windows 7, Windows 8 and Windows 10. This infection is notable due to how it encrypts the user’s files – namely, it uses AES-265 and RSA encryption method – in order to ensure that the affected user has no choice but to purchase the private key.
When the Cerber ransomware is first installed on your computer it will create a random named executable in the %AppData% or %LocalAppData% folder. This executable will be launched and begin to scan all the drive letters on your computer for data files to encrypt.
Cerber ransomware searches for files with certain file extensions to encrypt. The files it encrypts include important productivity documents and files such as .doc, .docx, .xls, .pdf, among others. When these files are detected, this infection will change the extension to .Cerber, so they are no longer able to be opened.
Files targeted are those commonly found on most PCs today; a list of file extensions for targeted files include:

.sql, .mp4, .7z, .rar, .m4a, .wma, .avi, .wmv, .csv, .d3dbsp, .zip, .sie, .sum, .ibank, .t13, .t12, .qdf, .gdb, .tax, .pkpass, .bc6, .bc7, .bkp, .qic, .bkf, .sidn, .sidd, .mddata, .itl, .itdb, .icxs, .hvpl, .hplg, .hkdb, .mdbackup, .syncdb, .gho, .cas, .svg, .map, .wmo, .itm, .sb, .fos, .mov, .vdf, .ztmp, .sis, .sid, .ncf, .menu, .layout, .dmp, .blob, .esm, .vcf, .vtf, .dazip, .fpk, .mlx, .kf, .iwd, .vpk, .tor, .psk, .rim, .w3x, .fsh, .ntl, .arch00, .lvl, .snx, .cfr, .ff, .vpp_pc, .lrf, .m2, .mcmeta, .vfs0, .mpqge, .kdb, .db0, .dba, .rofl, .hkx, .bar, .upk, .das, .iwi, .litemod, .asset, .forge, .ltx, .bsa, .apk, .re4, .sav, .lbf, .slm, .bik, .epk, .rgss3a, .pak, .big, wallet, .wotreplay, .xxx, .desc, .py, .m3u, .flv, .js, .css, .rb, .png, .jpeg, .txt, .p7c, .p7b, .p12, .pfx, .pem, .crt, .cer, .der, .x3f, .srw, .pef, .ptx, .r3d, .rw2, .rwl, .raw, .raf, .orf, .nrw, .mrwref, .mef, .erf, .kdc, .dcr, .cr2, .crw, .bay, .sr2, .srf, .arw, .3fr, .dng, .jpe, .jpg, .cdr, .indd, .ai, .eps, .pdf, .pdd, .psd, .dbf, .mdf, .wb2, .rtf, .wpd, .dxg, .xf, .dwg, .pst, .accdb, .mdb, .pptm, .pptx, .ppt, .xlk, .xlsb, .xlsm, .xlsx, .xls, .wps, .docm, .docx, .doc, .odb, .odc, .odm, .odp, .ods, .odt

Once your files are encrypted, the Cerber ransomware will create the #DECRYPT MY FILES#.txt text files ransom note in each folder that a file has been encrypted and on the Windows desktop. The ransomware will also change your Windows desktop wallpaper to #DECRYPT MY FILES#.png.
These files are located in every folder that a file was encrypted as well as in the user’s Startup folder so that they are automatically displayed when a user logs in. These files will contain the informations on how to access the payment site and get your files back.
When the infection has finished scanning your computer it will also delete all of the Shadow Volume Copies that are on the affected computer. It does this so that you cannot use the shadow volume copies to restore your encrypted files.

How did the Cerber ransomware got on my computer?

The Cerber ransomware is distributed via spam email containing infected attachments or links to malicious websites. Cyber-criminals spam out an email, with forged header information, tricking you into believing that it is from a shipping company like DHL or FedEx. The email tells you that they tried to deliver a package to you, but failed for some reason. Sometimes the emails claim to be notifications of a shipment you have made. Either way, you can’t resist being curious as to what the email is referring to – and open the attached file (or click on a link embedded inside the email). And with that, your computer is infected with the Cerber virus.

My hard disk is Not Detected In Bios / Computer , what is data recover …

Without Analysing We can not Say Hard disk Price Becuase , We need to check first Hard disk Internal Problem due what reason hard disk it not Detected . And Accordng to problem Our Lab Engineer Has to Pay Effort . so Effort cost, time cost, Lab cost can Decide Data Recovry Price . Generally People has Mind Data Recovery compnay quoted as per customer Need But Micronics Has Fix Price Policry , We will be always quote As per problmes Only .

If you don’t recover my data, is there a charge?

No, there is absolutely no charge if your data is deemed un-recoverable by our engineers. Your media will simply be shipped back to you(shipping & handling, Critical/Priority Attempt Fee charges excluded).

How do I ship my hard drive?

• Securely wrap media in anti-static bubble wrap or anti-static foam wrap.
• Place wrapped storage media in a box filled with some type of foam/peanuts or bubble wrap.
• Please include the Preliminary assessment form and place in box. Seal box securely.
• Please ship your storage media using a carrier that can provide shipping confirmation and tracking numbers ( e.g., Blue Dart, DTDC, First Flight, Maruti, and Etc )

What is your confidentiality policy?

We treat data confidentiality very seriously here at Micronics Computer Data Recovery Services. Rest assured t hat all work performed by Micronics is safely stored and guarded within our data storage vaults until our 15 day storage time limit has been reached. Once this timeframe has been reached, our engineers will then permanently degauss and overwrite the customers data. In addition, we are open to signing any non-disclosure agreements with our customers.

Can I recover my data if I reformat my hard drive?

Yes. In most cases we have fully recovered data from drives which have been reformatted as well as had an Operating System re-installed.

What does “Authorized by the Manufacturer” mean?

This means that customers may utilize Micronics’s Data Recovery Service without voiding their original manufacturer warranty. Because of Micronics’s proven track record and professionalism, manufacturers trust us with their drives.

How long does the data recovery evaluation take?

Once the Storage media is received in-house, it will go through our initial engineer diagnostic process to determine whether the drive is physically or logically damaged. Once determined, this will signal the engineer to direct the drive to either a clean room laboratory or to our logical specialists division. This will also determine whether the drive will require special parts. Once the drive has gone through the proper channels for diagnosis, a full report is then produced as well as a price quote with detailed breakdowns with price and timeframes included.
If the evaluation exceeds the average 24-48 hour evaluation time-frame, a representative will contact you with a full update regarding your data recovery status.

How do we charge for data recovery?

Once you contact Micronics, we may only provide the customer with an estimated price range since we will need the media in-house to give it a proper assessment and to determine the state and/or condition of the media be it a partition recovery, reformatting recovery, hard disk data recovery, virus recovery, etc. Once assessed, we will contact you with a detailed report as well as an accurate price quote. The quoted price range is just an estimated range you can expect per the specifications you provide. Our pricing structure is determined by 3 main factors:
• Type Of Media Problem: ( e.g . Logical Or Physical )
• Capacity Of Media : ( e.g. 40gb, 250gb, 500gb, 1tb, 2TB and etc )
• type Of Media Configuration : ( e.g used isolated , used in network storage, used in server and etc .)
Once you contact Micronics, you will initially be given a quoted price range. In order to obtain an accurate price quote, we will need your drive in-house to give it a proper assessment and to figure out to what extent your drive/media is damaged/corrupted. Once assessed, we will contact you with a detailed report as well as an accurate price quote.

How can you protect yourself from future data loss?

• BACKUP, BACKUP, AND THEN BACKUP.
• Carry out regular checks on your backups and confirm the data has truly been backed up.
• Keep your computer(s) in a clean area.
• Utilize Anti-Virus software and update it religiously.

When can data recovery services help?

• Bios is not detecting your hard drive
• Operating system not booting up or is booting up intermittently
• Mysteriously missing folders, files or directories
•User accidentally deleted files – user error
• Hard drive omits clicking or grinding noises
• Hard drive not spinning
• Power surges/natural disasters
• Data corruption
• Files and folders cannot be open
• All this and more…

What is data recovery?

The act, process, duration, of recovering inaccessible data from a storage media format caused by a vast array of data loss factors such as virus attacks, data corruption, physical malfunctions, human error and more.