Solved

possible to save cryptolocker scrambled files?

Posted on 2014-01-11
4
332 Views
Last Modified: 2014-01-22
got the virus and cleaned it up, but the files are destroyed. anything out there help us resurrect the files?
0
Comment
Question by:jaybird10
4 Comments
 
LVL 18

Expert Comment

by:Steven Harris
ID: 39773988
Backups.

The only way to get rid of it is to scrub your HDD.
0
 
LVL 27

Expert Comment

by:tliotta
ID: 39774183
You can always pay the ransom. That's been the common solution, AFAIK.

Tom
0
 
LVL 54

Expert Comment

by:McKnife
ID: 39774589
> You can always pay the ransom. That's been the common solution, AFAIK.
Maybe. But not after deleting the infected files, at least the virus info screen claims that the key will be destroyed if you delete the virus.
0
 
LVL 18

Accepted Solution

by:
web_tracker earned 500 total points
ID: 39774880
If the data is destroyed or encrypted and thus making you think the data is gone, then the only way you can get the data back is to have the encryption key. Without the key the data is really pretty much gone. No data recovery program can extract data from an encrypted file. The data recovery program may recover the deleted files but if they are encrypted files you will not be able to open them without the data encryption key.
0

Featured Post

What is SQL Server and how does it work?

The purpose of this paper is to provide you background on SQL Server. It’s your self-study guide for learning fundamentals. It includes both the history of SQL and its technical basics. Concepts and definitions will form the solid foundation of your future DBA expertise.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

SSL stands for “Secure Sockets Layer” and an SSL certificate is a critical component to keeping your website safe, secured, and compliant. Any ecommerce website must have an SSL certificate to ensure the safe handling of sensitive information like…
Since pre-biblical times, humans have sought ways to keep secrets, and share the secrets selectively.  This article explores the ways PHP can be used to hide and encrypt information.
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question