?
Solved

TorrentLocker

Posted on 2014-11-26
2
Medium Priority
?
565 Views
Last Modified: 2014-11-26
We have a client with a Windows 7 PC with the TorrentLocker Ransomware infection.
It claims its Cryptolocker but isn't.

Re http://www.bleepingcomputer.com/forums/t/547708/torrentlocker-ransomware-cracked-and-decrypter-has-been-made/

They have no backups whatsoever so even if the TorrentUnlocker program still decrypted the files they couldn't use it.

Is there anything they can do right now without paying? We don't want to make it worse by trying to remove with malware software.
0
Comment
Question by:Ace-IT
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 10

Accepted Solution

by:
10023 earned 2000 total points
ID: 40468345
You said:  "They have no backups whatsoever so even if the TorrentUnlocker program still decrypted the files they couldn't use it."

Are you referring to shadow copies:  if not...here is long article...claims sometimes it is not successful in deleting shadow copies...ctrl-F to find the part about system restore
http://www.bleepingcomputer.com/virus-removal/cryptolocker-ransomware-information#shadow
0
 
LVL 1

Author Comment

by:Ace-IT
ID: 40468421
Thanks. The Shadow Copiers are all there from this morning.
One thing I didn't think about.
Cheers.
0

Featured Post

VIDEO: THE CONCERTO CLOUD FOR HEALTHCARE

Modern healthcare requires a modern cloud. View this brief video to understand how the Concerto Cloud for Healthcare can help your organization.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Many companies are looking to get out of the datacenter business and to services like Microsoft Azure to provide Infrastructure as a Service (IaaS) solutions for legacy client server workloads, rather than continuing to make capital investments in h…
Since pre-biblical times, humans have sought ways to keep secrets, and share the secrets selectively.  This article explores the ways PHP can be used to hide and encrypt information.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
Suggested Courses

800 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question