Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

TorrentLocker

Posted on 2014-11-26
2
547 Views
Last Modified: 2014-11-26
We have a client with a Windows 7 PC with the TorrentLocker Ransomware infection.
It claims its Cryptolocker but isn't.

Re http://www.bleepingcomputer.com/forums/t/547708/torrentlocker-ransomware-cracked-and-decrypter-has-been-made/

They have no backups whatsoever so even if the TorrentUnlocker program still decrypted the files they couldn't use it.

Is there anything they can do right now without paying? We don't want to make it worse by trying to remove with malware software.
0
Comment
Question by:Ace-IT
2 Comments
 
LVL 10

Accepted Solution

by:
10023 earned 500 total points
ID: 40468345
You said:  "They have no backups whatsoever so even if the TorrentUnlocker program still decrypted the files they couldn't use it."

Are you referring to shadow copies:  if not...here is long article...claims sometimes it is not successful in deleting shadow copies...ctrl-F to find the part about system restore
http://www.bleepingcomputer.com/virus-removal/cryptolocker-ransomware-information#shadow
0
 
LVL 1

Author Comment

by:Ace-IT
ID: 40468421
Thanks. The Shadow Copiers are all there from this morning.
One thing I didn't think about.
Cheers.
0

Featured Post

Free Tool: Postgres Monitoring System

A PHP and Perl based system to collect and display usage statistics from PostgreSQL databases.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Provide an easy one stop to quickly get the relevant information on common asked question on Ransomware in Expert Exchange.
In 2017, ransomware will become so virulent and widespread that if you aren’t a victim yourself, you will know someone who is.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…

856 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question