Datas crypted by cryptolocker after zip attachement opened

One of the computers of the company was misconfigured regarding the virus detection. An employee opened an attachment containing the virus cryptolocker and it encrypted the entire PC and a large part of the main server.
The former head of the IT has not enabled the shadow copy :-(.
It is proposed to pay a ransom to send a decryption key :-(
The second problem we have is that our bakup is corrupt.
We absolutely must recover some of the data contained on the pc of the employee.
Do you know a method or a specialized company to help us in this task.
Thank you for your help.
Who is Participating?

[Product update] Infrastructure Analysis Tool is now available with Business Accounts.Learn More

I wear a lot of hats...

"The solutions and answers provided on Experts Exchange have been extremely helpful to me over the last few years. I wear a lot of hats - Developer, Database Administrator, Help Desk, etc., so I know a lot of things but not a lot about one thing. Experts Exchange gives me answers from people who do know a lot about one thing, in a easy to use platform." -Todd S.

Peter HutchisonSenior Network Systems SpecialistCommented:
No, do not send any ransom to the virus writer.
It is not possible to recover data encrypted by the virus, a restore from backup is the only choice.

There are plenty of data recovery companies, ask them about if its possible or not:
andreasSystem AdminCommented:
Modern versions of cryptologger will disable shadow copies before starting encryption, it would only have saved you for the files on the server.

if you want some files back you need

IMMEDIATELY HALT ALL OPERATIONS on ANY disk which holds files that are encrypted, every write access will overwrite more and more data fragments that cant be recoverd anymore if overwritten.

Then you only have a chance to use FORENSIC disk analysis to recover deleted files and to scan disk sectors for file content. Im namy cases you will not get back the original filename, and sometimes if files were fragmentet you only get the beginnings of the fragmented files as the forensic tools dont know where to find the rest of the file if no information about this is left in the metadata of the filesystems.

If data is important ask recovery labs to do this for you, you usually need to send in the affected disks.  to be able to continue working you can clone the disks to a new IDENTICAL drive and use the clone to continue working.

The machine wich had caught the virus should be REBUILD from backup or from scratch, do not try to clean it, if you overlook something the attacker might be back fast.
Send your corrupt backups to a data recovery agency. That is your only chance of getting any data back. A good one is Gillware:

Experts Exchange Solution brought to you by

Your issues matter to us.

Facing a tech roadblock? Get the help and guidance you need from experienced professionals who care. Ask your question anytime, anywhere, with no hassle.

Start your 7-day free trial
It's more than this solution.Get answers and train to solve all your tech problems - anytime, anywhere.Try it for free Edge Out The Competitionfor your dream job with proven skills and certifications.Get started today Stand Outas the employee with proven skills.Start learning today for free Move Your Career Forwardwith certification training in the latest technologies.Start your trial today

From novice to tech pro — start learning today.