Solved

CryptoLocker Files

Posted on 2014-01-14
3
479 Views
Last Modified: 2014-01-15
I have a client that was recently hit with the CryptoLocker virus.  We have it cleaned off, but of course there are corrupted/encrypted files that they need access to.  This only seems to have effected Word, Excel, and PDFs, but not all Word, Excel, or PDFs.  Its very random on which files are corrupted and which ones open normally.  We have restored from backup as far back as 1 month ago but the files are still corrupt.  I have also tried restoring from our offsite backup vendor and those files are corrupt.  How can I get those files fixed or restored properly? Any help is greatly appreciated.
0
Comment
Question by:jhaysbns
3 Comments
 
LVL 79

Accepted Solution

by:
David Johnson, CD, MVP earned 500 total points
ID: 39781085
unfortunately your client is screwed without a backup you have to pay the ransomware within the 72 hours time frame


Cryptolocker prevention kit
0
 
LVL 20

Expert Comment

by:CompProbSolv
ID: 39781272
I've run into this on just a few computers, but the symptoms appeared very quickly (within a day or so) from the infection.  Is it believable that the virus hit over a month ago?

Have you tried restoring those data files to a computer that has never been hit with this virus?

The only solutions that I have seen are these:
1)  Pay the ransom within 72 hours
2) Restore from good backup
3) Use "Restore Previous Versions"
0
 
LVL 27

Expert Comment

by:tliotta
ID: 39781441
Nothing to add. The only known answers are already given. This comment is only intended as an extra bit of confirmation.

Tom
0

Featured Post

Best Practices: Disaster Recovery Testing

Besides backup, any IT division should have a disaster recovery plan. You will find a few tips below relating to the development of such a plan and to what issues one should pay special attention in the course of backup planning.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

As a financial services provider, your business is impacted by two of the strictest federal regulations on record: the Sarbanes-Oxley Act and the Gramm-Leach-Bliley Act. Correctly implementing faxing into your organization to provide secure, real-ti…
Worried about if Apple can protect your documents, photos, and everything else that gets stored in iCloud? Read on to find out what Apple really uses to make things secure.
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

785 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question