The data recovery blog by Ontrack

Encrypted Data Recovery 

Written by Ontrack | Jul 17, 2025 10:07:22 AM

A frequently asked question is:

Can Ontrack recover encrypted data?

This question often arises, especially in the context of ransomware attacks. 

Ontrack addresses various scenarios of encrypted data recovery, including: 

  • Software-based encryption 
  • Ransomware-encrypted devices 
  • Enterprise encryption software 
  • Hardware encryption 
  • Self-encrypting devices 

 

Recovering encrypted data - General Considerations 

Recovering encrypted data typically requires credentials or encryption keys. However, Ontrack has occasionally discovered workarounds in unique circumstances. The future of encryption recovery might be influenced by advancements in quantum computing, which could potentially crack encryption algorithms. 

 

Ransomware-Encrypted Data 

Data encrypted by ransomware is challenging to recover without a decryption key. However, there are certain exceptions where recovery may be possible: 

  • Key databases for specific ransomware variants have been captured by cyber defense groups and law enforcement. 
  • Coding errors in ransomware can create vulnerabilities. 
  • The underlying technology or architecture may sometimes allow for recovery. 
  • Hackers often partially encrypt data to maximize impact quickly, which can provide recovery opportunities (e.g., encrypting 100,000 files in 5 minutes). 

If purchasing a decryption key, it is crucial to test it on a copy of the encrypted data to minimize risk. Additionally, the decryption process may not always be straightforward; some cases involve multiple keys for different parts of the system. 

For more information, visit: Ransomware Data Recovery for Organizations. 

 

Recovery of Data Encrypted with Enterprise Software 

Ontrack engineers rigorously follow secure protocols to handle, recover, and return encrypted data, ensuring maximum safety at every stage. Although enterprise encryption increases the complexity of data recovery, Ontrack can recover data using decryption information like recovery passwords, keyword packages, or files (.sdb, .svf). In some cases, a Challenge/Response process may be required. 

 

Supported Enterprise Encryption Software 

Ontrack provides recovery services for a wide range of encryption software, including: 

  • Bitdefender GravityZone Full Disk Encryption. 
  • Check Point Full Disk Encryption. 
  • Dell Encryption Enterprise. 
  • Digital Guardian Endpoint DLP. 
  • ESET Endpoint Encryption. 
  • Microsoft BitLocker. 
  • Sophos Central Device Encryption. 
  • Symantec Endpoint Encryption. 
  • Trellix (former McAfee)  
  • WD Encryption 
  • EFSS 
  • TrueCrypt 
  • PGP 
  • WinMagic SecureDoc Enterprise 

 

Hard Drive Recovery Process 

The process for recovering data from encrypted hard drives includes: 

  1. Assessment: Evaluating the hard drive for logical or physical defects. 
  2. Cleanroom Treatment: Ensuring safe handling of the device. 
  3. Data Imaging: Creating an image of the drive's contents. 
  4. Decryption and Analysis: Decoding and analyzing underlying data structures. 
  5. Quotation and Recovery: Providing a recovery estimate and proceeding upon approval. 
  6. Delivery: Preparing and securely encrypting the recovered data for return. 

 

Advanced Decryption Techniques 

Ontrack employs patented techniques that scan only the data-containing sections of a hard drive, enabling faster and more efficient recovery. This method significantly minimizes processing time while maximizing results. 

Credentials such as usernames, passwords, or access to encryption software are typically required for the decryption process. In cases of complex encryption, Ontrack may collaborate with software providers once the storage media is received. 

 

Self-Encrypting Devices 

Many devices automatically encrypt data, including: 

  • SSDs, where controller chips encrypt data before storage. 
  • External hard drives with built-in circuit boards managing encryption keys. 
  • Apple devices equipped with T2 or M chips. 
  • Smartphones. 

In scenarios where controller chips fail beyond repair, data may be lost. To improve recovery chances, it is essential to provide all original system components—not just the hard drive. 

 

Quantum Computing and the Future of Encryption 

Current encryption methods rely on the absence of backdoors, programming errors, or mathematical solutions. When brute-force attacks are insufficient, organizations such as the NSA often defer recovery until new technological advancements make decryption viable. 

Quantum computing is expected to revolutionize encryption recovery by enabling rapid decryption of data encrypted with current cryptographic algorithms. Ontrack continues to monitor these developments closely. 

 

Incorporating Encryption into Business Continuity Plans 

Encryption raises important considerations for Business Continuity and Disaster Recovery Plans: 

  • How will you address a scenario where an encrypted hard drive fails? 
  • What measures will you take for data recovery on encrypted devices? 
  • How will you manage encrypted backups during data loss events? 

These questions should be addressed proactively to ensure comprehensive disaster recovery planning. 

 

Choosing a Secure Provider for Data Recovery 

When recovering encrypted data, selecting a trustworthy provider is essential. Consider the following criteria: 

  • Are they authorized to handle sensitive data securely? 
  • Do they have proven expertise in encryption and recovery? 
  • Are their employees thoroughly vetted? 
  • Do their facilities meet international defense standards? 
  • Do they possess advanced technology and documented procedures for computer forensics? 

 

For more details, check out: