Solved

Crypto Locker

Posted on 2013-11-05
3
1,239 Views
Last Modified: 2013-11-08
Regarding the Crypto Locker Virus/Malware

has anyone seen "crypto locker" encrypt an already encrypted Server/Workstation?

IE: if everything is already encrypted are we exposed ?
0
Comment
Question by:jwrotondo
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 35

Accepted Solution

by:
Joseph Daly earned 500 total points
ID: 39625164
It can and will encrypt files that have already been encrypted. Basically double encrypting files making them that much harder to recover if you pay the ransom since you need to pay for both keys.

If the user account that gets infected with cryptolocker has write access to the file it will encrypt it.
0
 
LVL 24

Expert Comment

by:aadih
ID: 39625196
Keeping regular backups is the only prevention and protection.
0
 
LVL 33

Expert Comment

by:Dave Howe
ID: 39625423
It does encrypt files "protected" by bitlocker or truecrypt. I have heard conflicting stories regarding efs - allegedly it can't access those, but I haven't seen an official statement either way, and you would think that Microsoft would be crowing about that if it were true. ..
0

Featured Post

Simplifying Server Workload Migrations

This use case outlines the migration challenges that organizations face and how the Acronis AnyData Engine supports physical-to-physical (P2P), physical-to-virtual (P2V), virtual to physical (V2P), and cross-virtual (V2V) migration scenarios to address these challenges.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

As the title indicates, I have done this before. It chills me everytime I update the OS on my phone, (http://www.experts-exchange.com/articles/18084/Upgrading-to-Android-5-0-Lollipop.html) because one time I did this and I essentially had a bricked …
Article by: btan
The intent is not to repeat what many has know about Ransomware but more to join its dots of what is it, who are the victims, why it exists, when and how we respond on infection. Lastly, sum up in a glance to share such information with more to help…
This is used to tweak the memory usage for your computer, it is used for servers more so than workstations but just be careful editing registry settings as it may cause irreversible results. I hold no responsibility for anything you do to the regist…
Hi friends,  in this video  I'll show you how new windows 10 user can learn the using of windows 10. Thank you.

688 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question