Restore from an Arcserve Shadowprotect backup

Have your SPX backups been corrupted or encrypted by ransomware?Can't restore your backups? Our experts are on hand 24/7 to help you restore your systems. Our experience and responsiveness will save you precious time! We are a specialized service of Recoveo, the French leader in data recovery.

Specialised expertises

We are expert in all backup format like ArcServe, Veeam, Acronis, etc.

Tailor-made approach

Customised solutions tailored to your company's specific needs

Data security

Secure transfers Independent French laboratory for over 20 years.

Shadowprotect data recovery services

In the event of Arcserve Shadowprotect file encryption or corruption, sos ransomware provides you with a collection of proprietary tools to recover your data from servers, virtual machines, backup tapes or other storage media. Our team of experts is available 24/7.

Decryption

- 130+ Decryptors
- Specialized collection of proprietary tools developed to recover data encrypted by ransomware

File Recovery and Repair

- Virtual Disk Repair (vhdx vmdk)
- Database Repair (SQL, mdb…)
- Backup File Repair
- All file Repair

Volume Recovery

- All type supported (NAS, Server, SAN)
- Deleted File Recovery

Backup Recovery

- Full Tape Support (LTO, DLT, etc.)
- Veeam Toolset (deleted,corrupted, encrypted files)
- All Backup Formats

FREE EVALUATION

on backups cases until JUNE 30th, 2025

Common causes of loss of access to SPF/SPI files

SPF/SPI files can become inaccessible or damaged in a number of ways:

  • Corruption of SPF files: due to disk failure, software errors, or power outages during backup creation.
    Ransomware: cyberattacks can encrypt or destroy SPX files.
    Loss of metadata: problems with backup indexes or logs.
    Human error: accidental deletion or mishandling of backup files.
logo specialist arcserve

Understanding SPX formats: SPF and SPI

The files generated by StorageCraft’s ShadowProtect software are backup image files. These files play a crucial role in protecting a company’s data, enabling rapid restoration in the event of data loss, ransomware attack, or system corruption. However, these files can sometimes become damaged or inaccessible, necessitating a recovery procedure.

The SPX format is a proprietary format used by ShadowProtect to create full (SPF) or incremental (SPI) backups of disks and partitions. Each SPX file contains an exact copy of the backed-up data, including file systems, permissions and metadata.

Key file features include :

– Data compression: to reduce the size of backups.
– Encryption: to guarantee data security.
– Incremental management: backup only changes to save disk space.

How can backup systems be damaged by ransomware?

Your backups, once your lifeline, are now the main target of the most sophisticated cyberattacks.

Hackers don’t just steal your data, they methodically make it inaccessible.

In less than two hours, your files, virtual machines and backups can be partially encrypted. These targeted attacks, often carried out on weekends, paralyze your systems and put your business at risk.”

But don’t be discouraged: our experts and state-of-the-art technology are here to help you recover your data…

defaillance base de donnees 1200

Testimonial

Success stories

Why can SOS Ransomware help you?

Experiences

With over 250+ ransomware cases, we have adapted our tools and processes to achieve success.

Specialist Corrupted files

Since 2019, we have been developing our tools specifically for recovering data from corrupted files.

Fast

Our software has been rewritten to process corrupted files even faster.

Evaluation gratuite

We offer to prove our expertise with a free analysis of a corrupt file of your choice. Just send it to us.

Two main backup recovery modes: in the laboratory or remotely

Our 10 Gb/s access enables us to be very responsive and fast during exchanges, in the event of remote recovery. Security is our priority: we use the SFTP protocol exclusively for transfers. The integrity of the files is checked on arrival, so you can be sure that the files are 100% identical.

Laboratory database recovery

The majority of our recoveries still take place in our laboratories. The main advantage: we have more recovery options with physical servers than with downloaded files. Laboratory recovery is essential in cases of deletion where data has actually been deleted.

Remote database recovery

This type of recovery is becoming increasingly common in our business. The advantage is that there is no physical transport of the machines or disks, so there are logistical savings and no risk of damage in transit. There are no customs issues to consider... Your server can remain online if services are running on it.

Our recovery process

We have over 20 years’ experience in data recovery. Call on the French leader, our expertise enables us to provide you with a top-level response. We have in-depth knowledge of the different types of ransomware and the techniques used to combat them.

Diagnostic

free of charge or for a fee, depending on the deadline and file type.

Analysis and Recovery

Your storage media are supported. We carry out systematic cloning to avoid damaging the evidence in the event of an investigation.

Check

Extraction of priority data, validity testing and creation of a list of recovered files. Then secure restoration and resumption of activities.

Payment and returns

Extraction of priority data, validity testing and creation of a list of recovered files. Then secure restoration and resumption of activities.

How fast do you need your data?

We offer flexible service packages to meet your unique needs and budgetary considerations.

24/7

- On-call processing
- 365/24
- Dedicated team
- Average 1 to 3 working days

Urgent

- Treatment urgent
in the business hours
- 1 dedicated engineer
- Average 3-7 working days

Standard

- Treatment during theworking hours
- 1 shared engineer
- Average 7 to 14 working days

FAQ

Frequently asked questions

Everything you need to know about data recovery services for corrupted files

Several factors can lead to SPF file corruption, including:

  • Unexpected system crashes or power failures during the backup process
  • Malware or ransomware attacks
  • Bad sectors on the storage device
  • Incomplete or interrupted backup operations
  • File system corruption
  • Software or hardware conflicts

Common signs of SPF file corruption include:

  • ShadowProtect failing to mount or restore the backup
  • Error messages such as "Invalid or corrupted file format"
  • Incomplete or missing data when restoring from backup
  • The file size appearing unusually small or large

Yes, there are several methods to attempt SPF file recovery:

  • Use StorageCraft’s built-in tools: ShadowProtect includes tools like ImageManager that can check and repair minor corruption.
  • Verify integrity with Checkdisk (chkdsk): If the corruption is caused by disk errors, running chkdsk may help.
  • Try opening the SPF file on a different system: If the corruption is software-related, another environment might successfully read it.
  • Restore from a previous version: If you have multiple backup versions, use an earlier, uncorrupted version.
  • Contact us : If the above steps fail, we may be able to reconstruct the file.

There are limited third-party tools specifically for SPF file recovery. However, general-purpose disk image repair tools may be useful. Always make a copy before attempting a recovery.

Request a free evaluation

Contact us to recover your data from files corrupted, damaged or encrypted by ransomware.

Blog ressources

Related services

In addition to recovering files encrypted by ransomware, we also intervene on complex systems such as Hyper-V, VMware or RAID. Our specialized services guarantee rapid restoration of your critical data, whatever your technical environment.

Hyper V

Data recovery from Hyper-V virtual machines, even in the event of corruption or failure.

Data recovery from degraded or failed RAID systems, whatever the configuration.

VMWare

Expertise in restoring damaged or inaccessible VMware virtual machines.

Restore ransomware-encrypted files with advanced, secure solutions.