Solved

CryptoWall 2.0

Posted on 2014-10-20
1
264 Views
Last Modified: 2014-10-27
My client has contracted CryptoWall 2.0.  We tried everything to our that we knew to remove the encryption.  Finally we paid the ransom with Bit Coin got an decryption key but that did not work.  Our Backup Exec was showing a false positive, saying it backed up nut was not backing up all of our selections.  The main program Jonas Systems was encrypted as it was a share on the original computer that was infected.  Is there anyone out there that has encountered CryptoWall 2.0 and has any suggestions to clean the ransomware  from the system.  We have HyperV on our system using a Server 2008, and HyperV SBS 2011.
0
Comment
Question by:marionlwallace
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 82

Accepted Solution

by:
David Johnson, CD, MVP earned 500 total points
ID: 40391619
1. User education
2. get the cryptowall prevention kit
Remove Cryptowall
0

Featured Post

[Webinar] How Hackers Steal Your Credentials

Do You Know How Hackers Steal Your Credentials? Join us and Skyport Systems to learn how hackers steal your credentials and why Active Directory must be secure to stop them. Thursday, July 13, 2017 10:00 A.M. PDT

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The question has been asked on multiple occasions as to how best to do printing in a remote desktop or terminal services environment.   It seems that this particular question has plagued several people and most especially as Terminal Services, as…
Issue: One Windows 2008 R2 64bit server on the network unable to connect to a buffalo Device (Linkstation) with firmware version 1.56. There are a total of four servers on the network this being one of them. Troubleshooting Steps: Connect via h…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

617 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question