Solved

CBT Virus

Posted on 2015-02-04
5
307 Views
Last Modified: 2015-02-18
1 of my customers did pick up a virus CBT virus which encrypt all her files and they want some money to encrypt the files

I did remove the CBT from the pc but the files are still encrypted ,is there anyway I can decrypt these files.

Thanks
SD
0
Comment
Question by:Dirkie Laubscher
5 Comments
 
LVL 13

Expert Comment

by:Mark Galvin
ID: 40588472
Is this the one where there is a text file advising that if you pay XXX bit coins they will provide the decrypt key?

I have a client with that last year and its restore the last full backup they had. Following an complete review and subsequent lock down of their LAN.

You can try https://www.decryptcryptolocker.com/ and see if your client can use that program to get their files unlocked.
0
 

Author Comment

by:Dirkie Laubscher
ID: 40588504
Hi I did try the site but says my file doesn't need to be decrypted ,seems she is screwed and she doesn't have backups
0
 
LVL 13

Expert Comment

by:Mark Galvin
ID: 40588514
Oohhh, no backups? Not a great start. Is it much data?
0
 
LVL 11

Expert Comment

by:Wilder1626
ID: 40588521
Hi

Have you scan you PC with MalwareBite? Might be a good thing

https://www.malwarebytes.org/

You may also want to look at this link:
Malware troubleshooting: recover your files damaged by CTB Locker Virus.

System Restore of Windows may help in resolving some issues, but not all the time.  You can give it a try also.
0
 
LVL 15

Accepted Solution

by:
Ivan earned 500 total points
ID: 40588595
Hi,

there is no decrypting system for CBT-Locker. There is a site http://www.shadowexplorer.com/ that will allow you to see data created by Shadow Copy in Windows, if you have set that up. This may save you some data. Other then that, there is no known system.

For older Cryptolocker, there is a website https://www.decryptcryptolocker.com/  which may decrypt some data.

Regards,
0

Featured Post

Maximize Your Threat Intelligence Reporting

Reporting is one of the most important and least talked about aspects of a world-class threat intelligence program. Here’s how to do it right.

Join & Write a Comment

These are on the increase and getting more common these days. Users who use the Google search engine may complain of having their search redirected to unwanted sites, regardless of what browser is used. This happens when the system is infected with…
Sub-Titled: “My Way” (with apologies to Francis Albert Sinatra) Let me start by stating emphatically that I am one of those Experts who prefer doing things “My Way”. It’s kind of a no-brainer. “The following procedure works for me, so here is …
This Micro Tutorial will give you a basic overview of Windows DVD Burner through its features and interface. This will be demonstrated using Windows 7 operating system.
The Task Scheduler is a powerful tool that is built into Windows. It allows you to schedule tasks (actions) on a recurring basis, such as hourly, daily, weekly, monthly, at log on, at startup, on idle, etc. This video Micro Tutorial is a brief intro…

758 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now