Solved

CryptoLocker Files

Posted on 2014-01-14
3
474 Views
Last Modified: 2014-01-15
I have a client that was recently hit with the CryptoLocker virus.  We have it cleaned off, but of course there are corrupted/encrypted files that they need access to.  This only seems to have effected Word, Excel, and PDFs, but not all Word, Excel, or PDFs.  Its very random on which files are corrupted and which ones open normally.  We have restored from backup as far back as 1 month ago but the files are still corrupt.  I have also tried restoring from our offsite backup vendor and those files are corrupt.  How can I get those files fixed or restored properly? Any help is greatly appreciated.
0
Comment
Question by:jhaysbns
3 Comments
 
LVL 78

Accepted Solution

by:
David Johnson, CD, MVP earned 500 total points
Comment Utility
unfortunately your client is screwed without a backup you have to pay the ransomware within the 72 hours time frame


Cryptolocker prevention kit
0
 
LVL 20

Expert Comment

by:CompProbSolv
Comment Utility
I've run into this on just a few computers, but the symptoms appeared very quickly (within a day or so) from the infection.  Is it believable that the virus hit over a month ago?

Have you tried restoring those data files to a computer that has never been hit with this virus?

The only solutions that I have seen are these:
1)  Pay the ransom within 72 hours
2) Restore from good backup
3) Use "Restore Previous Versions"
0
 
LVL 27

Expert Comment

by:tliotta
Comment Utility
Nothing to add. The only known answers are already given. This comment is only intended as an extra bit of confirmation.

Tom
0

Featured Post

Want to promote your upcoming event?

Attending an event? Speaking at a conference? Or exhibiting at a tradeshow? Easily inform your contacts by using a promotional banner in your email signature. This will ensure your organization’s most important contacts are in the know.

Join & Write a Comment

Explore the encryption capabilities built into Google Apps and how these features can help you meet privacy policy and regulatory compliance, but are not a full solution. Understand and compare the most popular email encryption services for Google A…
When the confidentiality and security of your data is a must, trust the highly encrypted cloud fax portfolio used by 12 million businesses worldwide, including nearly half of the Fortune 500.
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

771 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

14 Experts available now in Live!

Get 1:1 Help Now