Solved

CryptoLocker Files

Posted on 2014-01-14
3
484 Views
Last Modified: 2014-01-15
I have a client that was recently hit with the CryptoLocker virus.  We have it cleaned off, but of course there are corrupted/encrypted files that they need access to.  This only seems to have effected Word, Excel, and PDFs, but not all Word, Excel, or PDFs.  Its very random on which files are corrupted and which ones open normally.  We have restored from backup as far back as 1 month ago but the files are still corrupt.  I have also tried restoring from our offsite backup vendor and those files are corrupt.  How can I get those files fixed or restored properly? Any help is greatly appreciated.
0
Comment
Question by:jhaysbns
3 Comments
 
LVL 80

Accepted Solution

by:
David Johnson, CD, MVP earned 500 total points
ID: 39781085
unfortunately your client is screwed without a backup you have to pay the ransomware within the 72 hours time frame


Cryptolocker prevention kit
0
 
LVL 21

Expert Comment

by:CompProbSolv
ID: 39781272
I've run into this on just a few computers, but the symptoms appeared very quickly (within a day or so) from the infection.  Is it believable that the virus hit over a month ago?

Have you tried restoring those data files to a computer that has never been hit with this virus?

The only solutions that I have seen are these:
1)  Pay the ransom within 72 hours
2) Restore from good backup
3) Use "Restore Previous Versions"
0
 
LVL 27

Expert Comment

by:tliotta
ID: 39781441
Nothing to add. The only known answers are already given. This comment is only intended as an extra bit of confirmation.

Tom
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Worried about if Apple can protect your documents, photos, and everything else that gets stored in iCloud? Read on to find out what Apple really uses to make things secure.
Ransomware is a growing menace to anyone using a computer or mobile device. Here are answers to some common questions about this vicious new form of malware.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…

860 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question