Solved

WIN XP PC - files damaged/encrypted from "Crypto" virus - please help - how can I decrypt ?

Posted on 2014-10-08
7
200 Views
Last Modified: 2016-11-23
I have a WIN XP Dell PC - all files damaged/encrypted from "Crypto Locker" virus - please help - how can I decrypt ?
0
Comment
Question by:expressconsult
7 Comments
 
LVL 90

Accepted Solution

by:
John Hurst earned 500 total points
ID: 40369900
You cannot. You need to get files from backups and if you did not back up your documents, they are lost.

Do NOT pay to get the key. The perpetrators are criminals and paying them will invite deeper trouble.
0
 

Author Comment

by:expressconsult
ID: 40369949
So there is no decrypting software or tool that can help in my case ?
0
 
LVL 13

Expert Comment

by:akb
ID: 40369980
John Hurst is right. It is not possible to decrypt without the keys.
I had my first experience 2 days ago with this nasty virus.
Luckily my customer had good backups and we were able to recover after removing the virus.
If you do not have good backups then you may have no option but to pay them - that is a decision for you.

There is a good article on Cryptolocker here: http://www.pcworld.com/article/2060640/cryptolocker-creators-try-to-extort-even-more-money-from-victims-with-new-service.html
0
 
LVL 23

Expert Comment

by:Dr. Klahn
ID: 40369998
Depending on which version has hit your system, there may be a solution.  See the article at the site below:

http://www.fireeye.com/blog/corporate/2014/08/your-locker-of-information-for-cryptolocker-decryption.html

If you were hit by a recent version with a recent key, this will not do the job.  However, if you were hit by one of the earlier versions using one of the keys acquired during the anti-CryptoLocker campaign, this may work.

If this fails, the options are as previously described above.  Pay the ransom, reload from a recent full backup, or reload Windows from scratch as the system should no longer be trusted even if cleaned up.
0
 
LVL 87

Expert Comment

by:rindi
ID: 40370055
Even if you pay the ransom, you aren't guaranteed that you'll even get the keys. So as thinkpad's mentioned already, NEVER pay. At least now you can move up from XP to a supported OS....
0

Featured Post

6 Surprising Benefits of Threat Intelligence

All sorts of threat intelligence is available on the web. Intelligence you can learn from, and use to anticipate and prepare for future attacks.

Join & Write a Comment

Today, security is a big concern in an organization to prevent sensitive data leakage. In Outlook you can secure your Outlook items (emails, calendars, contacts and other stuff) using various techniques like by marking item as private, or you can pu…
Healthcare providers, insurance companies and other covered entities trust eFax Corporate to transmit their most sensitive documents. eFax Corporate can help your organization implement a HIPAA compliant cloud faxing solution.
When you create an app prototype with Adobe XD, you can insert system screens -- sharing or Control Center, for example -- with just a few clicks. This video shows you how. You can take the full course on Experts Exchange at http://bit.ly/XDcourse.
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

759 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now