Solved

how to decrypt zepto files

Posted on 2016-07-19
3
2,521 Views
Last Modified: 2016-07-20
zepto virus created zepto encrypted files. How to decrypt them?
0
Comment
Question by:wendellpayne
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 11

Expert Comment

by:Old User
ID: 41719949
You can't without paying the ransome, this is never advised as there is still no guarantee and it just encourages further use of these viruses.

You need to rebuild your PC, laptop, server and restore the data from a back up.
0
 
LVL 20

Accepted Solution

by:
Russ Suter earned 500 total points
ID: 41719989
The Zepto ransomware is a variant of Locky. It uses AES-256 asymmetric encryption, the strongest known encryption at this time. Brute force is the only known vulnerability and this approach is estimated to take hundreds of years on an AES-256 encryption model using currently available hardware.

Depending on how far the virus got before you stopped it you might be able to recover some files from shadow copies using Shadow Explorer. http://www.shadowexplorer.com/

Barring that your only option is to recover your data from a recent backup.

There are several online guides that tell you how to remove the ransomware but I tend not to bother with those. The best way to be 100% certain that the virus is gone is to reformat your hard drive and install a fresh OS and applications.
0
 
LVL 27

Expert Comment

by:Thomas Zucker-Scharff
ID: 41720067
AES 256bit encryption can be brute forced but it would take ~6.7 x 10e254 tines the life of the universe to decrypt half the key space.
0

Featured Post

Free Tool: SSL Checker

Scans your site and returns information about your SSL implementation and certificate. Helpful for debugging and validating your SSL configuration.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Explore the encryption capabilities built into Google Apps and how these features can help you meet privacy policy and regulatory compliance, but are not a full solution. Understand and compare the most popular email encryption services for Google A…
There are many Password Managers (PM) out there to choose from. PM's can help with your password habits and routines, but they should not be a crutch you rely on too heavily. I also have an article for company/enterprise PM's.
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

726 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question