Threat Finder v2.4 encrypted files

Hello,

A customer of mine has been infected with Threat Finder v2.4 trojan that encrypted lots of files on his NAS. We were able to restore several items from backup but unfortunately not everything.

I was wondering now if it would be possible to find the encryption key by some comparison of both the encrypted and original version of several files. Or is that just too wishful thinking?

Thanks a lot for any advice.
IT Belgium UserAsked:
Who is Participating?

[Product update] Infrastructure Analysis Tool is now available with Business Accounts.Learn More

x
I wear a lot of hats...

"The solutions and answers provided on Experts Exchange have been extremely helpful to me over the last few years. I wear a lot of hats - Developer, Database Administrator, Help Desk, etc., so I know a lot of things but not a lot about one thing. Experts Exchange gives me answers from people who do know a lot about one thing, in a easy to use platform." -Todd S.

EirmanChief Operations ManagerCommented:
This type of ransomware uses strong encryption and you generally can't get your data back without handing over money. You should not do so unless the files irreplaceable. Don't deal with criminals if you can avoid it.

It spreads from network share to share, so beware!
For this reason, you should leave backup devices disconnected unless needed.

Once you have removed the infection, you won't get your data back even if you pay up.
If the time is up you won't get your data back even if you pay up. (The decryption key is destroyed)

You will find some possible recovery hints relating to shadow copies etc. here
http://deletemalware.blogspot.ie/2015/01/how-to-remove-threat-finder-virus-and.html

If it was my PC, I would wipe it and install everything again .....
AND then take an image for a future quick re-install.

Be very wary of running email attachments (Even from people you trust)
and consider using this in the future
http://www.foolishit.com/vb6-projects/cryptoprevent/cryptoprevent-auto-update/

Experts Exchange Solution brought to you by

Your issues matter to us.

Facing a tech roadblock? Get the help and guidance you need from experienced professionals who care. Ask your question anytime, anywhere, with no hassle.

Start your 7-day free trial
*** Hopeleonie ***IT ManagerCommented:
Not for points agree Eirman.
McKnifeCommented:
Hi.

"find the encryption key by some comparison of both the encrypted and original version of several files. Or is that just too wishful thinking?" - unfortunately, this is a total misunderstanding of how modern encryption works. No, sorry, comparing will not reveal anything and, like said before, the encryption is strong and breaking it would take years even if you had access to superior computing powers.
It's more than this solution.Get answers and train to solve all your tech problems - anytime, anywhere.Try it for free Edge Out The Competitionfor your dream job with proven skills and certifications.Get started today Stand Outas the employee with proven skills.Start learning today for free Move Your Career Forwardwith certification training in the latest technologies.Start your trial today
Security

From novice to tech pro — start learning today.