Solved

TorrentLocker

Posted on 2014-11-26
2
551 Views
Last Modified: 2014-11-26
We have a client with a Windows 7 PC with the TorrentLocker Ransomware infection.
It claims its Cryptolocker but isn't.

Re http://www.bleepingcomputer.com/forums/t/547708/torrentlocker-ransomware-cracked-and-decrypter-has-been-made/

They have no backups whatsoever so even if the TorrentUnlocker program still decrypted the files they couldn't use it.

Is there anything they can do right now without paying? We don't want to make it worse by trying to remove with malware software.
0
Comment
Question by:Ace-IT
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 10

Accepted Solution

by:
10023 earned 500 total points
ID: 40468345
You said:  "They have no backups whatsoever so even if the TorrentUnlocker program still decrypted the files they couldn't use it."

Are you referring to shadow copies:  if not...here is long article...claims sometimes it is not successful in deleting shadow copies...ctrl-F to find the part about system restore
http://www.bleepingcomputer.com/virus-removal/cryptolocker-ransomware-information#shadow
0
 
LVL 1

Author Comment

by:Ace-IT
ID: 40468421
Thanks. The Shadow Copiers are all there from this morning.
One thing I didn't think about.
Cheers.
0

Featured Post

Announcing the Most Valuable Experts of 2016

MVEs are more concerned with the satisfaction of those they help than with the considerable points they can earn. They are the types of people you feel privileged to call colleagues. Join us in honoring this amazing group of Experts.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Header of docx file 17 132
how can i gnupg encrypt a PDF document? 12 76
Top honey pots & reviews of canary 7 58
"Ensure their internet protocol supports SHA-2 certificate" ?? 5 65
When the confidentiality and security of your data is a must, trust the highly encrypted cloud fax portfolio used by 12 million businesses worldwide, including nearly half of the Fortune 500.
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…

733 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question