?
Solved

CTB-Locker (Critoni) virus

Posted on 2014-09-24
9
Medium Priority
?
1,575 Views
Last Modified: 2014-11-01
I have  a computer (win 7) with this virus on it. How can I get it removed and files unencrypted?
0
Comment
Question by:dawn1993
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 4
  • 3
9 Comments
 
LVL 76

Accepted Solution

by:
Alan Hardisty earned 2000 total points
ID: 40343344
2 Ways to resolve this:

1. Pay the ransom
2. Restore the files from backup

No other way exists unfortunately.

Removal should be relatively easy if you read this blog:

http://www.bleepingcomputer.com/virus-removal/ctb-locker-ransomware-information
0
 

Author Comment

by:dawn1993
ID: 40351025
Thanks for your response. I looked on the web and bleeping computer has a thread going on decrypting the files. I am waiting on someone to figure out how to do it. I refuse to pay the ransom.
0
 
LVL 76

Expert Comment

by:Alan Hardisty
ID: 40351041
Totally understand your feelings with not wanting to pay.  Do you have a backup to recover from, or are you waiting for someone to figure out how to de-crypt the files?

Alan
0
Three Reasons Why Backup is Strategic

Backup is strategic to your business because your data is strategic to your business. Without backup, your business will fail. This white paper explains why it is vital for you to design and immediately execute a backup strategy to protect 100 percent of your data.

 

Author Comment

by:dawn1993
ID: 40351455
I am waiting. It is not urgent. I reinstalled Windows on another hard drive and can wait this out. I am hoping in time that  someone is able to help me. I do have some of the files backed up so it is not to bad for me.

Thanks for your help.
0
 
LVL 76

Expert Comment

by:Alan Hardisty
ID: 40351638
No problems - I'll keep my fingers crossed.  Do you have Shadow Copies Enabled?
0
 
LVL 59

Expert Comment

by:LeeTutor
ID: 40417111
I've requested that this question be deleted for the following reason:

Not enough information to confirm an answer.
0
 

Author Comment

by:dawn1993
ID: 40414906
Please close it!

Thanks
0
 
LVL 76

Expert Comment

by:Alan Hardisty
ID: 40417112
Why isn't my comment sufficient as an answer?
0

Featured Post

Cyber Threats to Small Businesses (Part 1)

This past May, Webroot surveyed more than 600 IT decision-makers at medium-sized companies to see how these small businesses perceived new threats facing their organizations.  Read what Webroot CISO, Gary Hayslip, has to say about the survey in part 1 of this 2-part blog series.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Worried about if Apple can protect your documents, photos, and everything else that gets stored in iCloud? Read on to find out what Apple really uses to make things secure.
This article investigates the question of whether a computer can really be cleaned once it has been infected, and what the best ways of cleaning a computer might be (in this author's opinion).
Windows 8 comes with a dramatically different user interface known as Metro. Notably missing from the new interface is a Start button and Start Menu. Many users do not like it, much preferring the interface of earlier versions — Windows 7, Windows X…
This Micro Tutorial will teach you the basics of configuring your computer to improve its speed. It will also teach you how to disable programs that are running in the background simultaneously. This will be demonstrated using Windows 7 operating…
Suggested Courses

752 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question