Solved

Crypto Locker

Posted on 2014-01-23
4
489 Views
Last Modified: 2014-04-07
We've successfully removed the crypto locker virus. We however have a clone of the drive infected before the removal. We would like to know if anyone has anyway to beat the encryption of the virus on the personal files? Any help would be greatly appreciated.

Thanks!
0
Comment
Question by:itneedshelp
  • 2
4 Comments
 
LVL 29

Expert Comment

by:Sudeep Sharma
ID: 39803666
Unfortunately there is no decrypting tool yet for crypto locker. Either you need to pay them to get the files or need to restore them from the backups.

If you don't have the backups you may try to get the original files from the Shadow Copies.

Please go through the link below for further information and how to get the files from Shadow Copies.

http://www.bleepingcomputer.com/virus-removal/cryptolocker-ransomware-information

Sudeep
0
 
LVL 27

Expert Comment

by:Thomas Zucker-Scharff
ID: 39803835
Sudeep pretty much said it all.  Cryptolocker is nasty and the only options I have either used successfully or seen used successfully are:

1. Reimage/Reinstall the system completely

2. Restore system from Backup (before the infection)

3. Pay for the decryption key (so far they have been providing the key when you pay - but it seems they only accept bitcoin)

0
 
LVL 54

Expert Comment

by:McKnife
ID: 39806387
Hi.

Please describe what you are trying to achieve. I guess, you wonder if you can restore the files from the infected drive. Of course you can. That virus is no file-infector.
The only way to become infected from that drive is by executing the virus executable - this will not happen when you restore documents.
0
 
LVL 27

Accepted Solution

by:
Thomas Zucker-Scharff earned 500 total points
ID: 39806676
AFAIK, this is true BUT the files have been encrypted by cryptolocker and therefore are useless unless you have a backup previous to the infection.
0

Featured Post

Free Tool: ZipGrep

ZipGrep is a utility that can list and search zip (.war, .ear, .jar, etc) archives for text patterns, without the need to extract the archive's contents.

One of a set of tools we're offering as a way to say thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Many companies are looking to get out of the datacenter business and to services like Microsoft Azure to provide Infrastructure as a Service (IaaS) solutions for legacy client server workloads, rather than continuing to make capital investments in h…
Encryption for Business Encryption (https://en.wikipedia.org/wiki/Encryption) ensures the safety of our data when sending emails. In most cases, to read an encrypted email you must enter a secret key that will enable you to decrypt the email. T…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

860 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question