Had a client open what looked like a legitimate email and clicked on the .zip file.
By the time I was called it was way too late. All the document and database type files on the workstation were encrypted and locked, and so were all the files on the Server shares.
The Server was a no brainer. Restored all the drives from the last backups with no files lost.
This nasty piece of work walked walk through the Sonicwall and the local AV software like it didn't exist.
It turned out to be the new variant of Cryptowall v 3.0.
So my question is, does anyone have any ideas, short of paying their extortion fee, on how to get the workstation files back. The user was doing the work on her workstation and not considering putting them on the Server.
None of the techniques that worked with the earlier varient of Cryptowall work with 3.0.
The workstation is Windows XP Pro, and please retrain from pointing out that MS is not generally supporting XP anymore.
Thanks - Al