Solved

how to decrypt zepto files

Posted on 2016-07-19
3
2,503 Views
Last Modified: 2016-07-20
zepto virus created zepto encrypted files. How to decrypt them?
0
Comment
Question by:wendellpayne
3 Comments
 
LVL 11

Expert Comment

by:Old User
ID: 41719949
You can't without paying the ransome, this is never advised as there is still no guarantee and it just encourages further use of these viruses.

You need to rebuild your PC, laptop, server and restore the data from a back up.
0
 
LVL 20

Accepted Solution

by:
Russ Suter earned 500 total points
ID: 41719989
The Zepto ransomware is a variant of Locky. It uses AES-256 asymmetric encryption, the strongest known encryption at this time. Brute force is the only known vulnerability and this approach is estimated to take hundreds of years on an AES-256 encryption model using currently available hardware.

Depending on how far the virus got before you stopped it you might be able to recover some files from shadow copies using Shadow Explorer. http://www.shadowexplorer.com/

Barring that your only option is to recover your data from a recent backup.

There are several online guides that tell you how to remove the ransomware but I tend not to bother with those. The best way to be 100% certain that the virus is gone is to reformat your hard drive and install a fresh OS and applications.
0
 
LVL 27

Expert Comment

by:Thomas Zucker-Scharff
ID: 41720067
AES 256bit encryption can be brute forced but it would take ~6.7 x 10e254 tines the life of the universe to decrypt half the key space.
0

Featured Post

Announcing the Most Valuable Experts of 2016

MVEs are more concerned with the satisfaction of those they help than with the considerable points they can earn. They are the types of people you feel privileged to call colleagues. Join us in honoring this amazing group of Experts.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Which is 'Static Key Ciphers' reported in PT scan? 4 452
Upgrade Symantec EndPoint Protection 14 13 262
Samsung S5 - Bricked?? 5 63
Data encryption when using public Wi-Fi 4 34
Ransomware continues to be a growing problem for both personal and business users alike and Antivirus companies are still struggling to find a reliable way to protect you from this dangerous threat.
Businesses who process credit card payments have to adhere to PCI Compliance standards. Here’s why that’s important.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

856 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question