Solved

how to decrypt zepto files

Posted on 2016-07-19
3
2,406 Views
Last Modified: 2016-07-20
zepto virus created zepto encrypted files. How to decrypt them?
0
Comment
Question by:wendellpayne
3 Comments
 
LVL 11

Expert Comment

by:Old User
ID: 41719949
You can't without paying the ransome, this is never advised as there is still no guarantee and it just encourages further use of these viruses.

You need to rebuild your PC, laptop, server and restore the data from a back up.
0
 
LVL 20

Accepted Solution

by:
Russ Suter earned 500 total points
ID: 41719989
The Zepto ransomware is a variant of Locky. It uses AES-256 asymmetric encryption, the strongest known encryption at this time. Brute force is the only known vulnerability and this approach is estimated to take hundreds of years on an AES-256 encryption model using currently available hardware.

Depending on how far the virus got before you stopped it you might be able to recover some files from shadow copies using Shadow Explorer. http://www.shadowexplorer.com/

Barring that your only option is to recover your data from a recent backup.

There are several online guides that tell you how to remove the ransomware but I tend not to bother with those. The best way to be 100% certain that the virus is gone is to reformat your hard drive and install a fresh OS and applications.
0
 
LVL 26

Expert Comment

by:Thomas Zucker-Scharff
ID: 41720067
AES 256bit encryption can be brute forced but it would take ~6.7 x 10e254 tines the life of the universe to decrypt half the key space.
0

Featured Post

Enabling OSINT in Activity Based Intelligence

Activity based intelligence (ABI) requires access to all available sources of data. Recorded Future allows analysts to observe structured data on the open, deep, and dark web.

Join & Write a Comment

Explore the encryption capabilities built into Google Apps and how these features can help you meet privacy policy and regulatory compliance, but are not a full solution. Understand and compare the most popular email encryption services for Google A…
Envision that you are chipping away at another e-business site with a team of pundit developers and designers. Everything seems, by all accounts, to be going easily.
In this seventh video of the Xpdf series, we discuss and demonstrate the PDFfonts utility, which lists all the fonts used in a PDF file. It does this via a command line interface, making it suitable for use in programs, scripts, batch files — any pl…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

746 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now