Solved

how to decrypt zepto files

Posted on 2016-07-19
3
2,558 Views
Last Modified: 2016-07-20
zepto virus created zepto encrypted files. How to decrypt them?
0
Comment
Question by:wendellpayne
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 11

Expert Comment

by:Old User
ID: 41719949
You can't without paying the ransome, this is never advised as there is still no guarantee and it just encourages further use of these viruses.

You need to rebuild your PC, laptop, server and restore the data from a back up.
0
 
LVL 20

Accepted Solution

by:
Russ Suter earned 500 total points
ID: 41719989
The Zepto ransomware is a variant of Locky. It uses AES-256 asymmetric encryption, the strongest known encryption at this time. Brute force is the only known vulnerability and this approach is estimated to take hundreds of years on an AES-256 encryption model using currently available hardware.

Depending on how far the virus got before you stopped it you might be able to recover some files from shadow copies using Shadow Explorer. http://www.shadowexplorer.com/

Barring that your only option is to recover your data from a recent backup.

There are several online guides that tell you how to remove the ransomware but I tend not to bother with those. The best way to be 100% certain that the virus is gone is to reformat your hard drive and install a fresh OS and applications.
0
 
LVL 28

Expert Comment

by:Thomas Zucker-Scharff
ID: 41720067
AES 256bit encryption can be brute forced but it would take ~6.7 x 10e254 tines the life of the universe to decrypt half the key space.
0

Featured Post

When ransomware hits your clients, what do you do?

MSPs: Endpoint security isn’t enough to prevent ransomware.
As the impact and severity of crypto ransomware attacks has grown, Webroot has fought back, not just by building a next-gen endpoint solution capable of preventing ransomware attacks but also by being a thought leader.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Since pre-biblical times, humans have sought ways to keep secrets, and share the secrets selectively.  This article explores the ways PHP can be used to hide and encrypt information.
The conference as a whole was very interesting, although if one has to make a choice between this one and some others, you may want to check out the others.  This conference is aimed mainly at government agencies.  So it addresses the various compli…
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

707 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question